1
1
mirror of https://github.com/privacyguides/privacyguides.org.git synced 2026-05-15 08:01:22 +00:00

style: Fix look of common threat badges

This commit is contained in:
2026-05-12 15:57:50 -05:00
parent fef1ed372f
commit 96b28f0bc2
45 changed files with 0 additions and 55 deletions
@@ -3,7 +3,6 @@ title: "Alternative Networks"
description: These tools allow you to access networks other than the World Wide Web.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
[{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs)
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
@@ -52,7 +52,6 @@ These tools provide analysis based on the information they have the ability to a
## External Verification Tools
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
External verification tools run on your computer and scan your mobile device for forensic traces, which are helpful to identify potential compromise.
@@ -119,7 +118,6 @@ iMazing automates and interactively guides you through the process of using [MVT
## On-Device Verification
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
@@ -3,7 +3,6 @@ title: Mobile Phones
description: These mobile devices provide the best hardware security support for custom Android operating systems.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
@@ -3,7 +3,6 @@ title: Security Keys
description: These security keys provide a form of phishing-immune authentication for accounts that support it.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
@@ -3,7 +3,6 @@ title: Alternative Distributions
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
@@ -3,7 +3,6 @@ title: "General Apps"
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
@@ -41,7 +40,6 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a
## Secure Camera
<small>Protects against the following threat(s):</small>
[{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats.md#limiting-public-information)
**Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices.
@@ -73,7 +71,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure
## Secure PDF Viewer
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
**Secure PDF Viewer** is a PDF viewer based on [pdf.js](https://en.wikipedia.org/wiki/PDF.js) that doesn't require any permissions. The PDF is fed into a [sandboxed](https://en.wikipedia.org/wiki/Sandbox_(software_development)) [WebView](https://developer.android.com/guide/webapps/webview). This means that it doesn't require permission directly to access content or files.
-2
View File
@@ -3,7 +3,6 @@ title: "Desktop/PC"
description: Linux distributions are commonly recommended for privacy protection and software freedom.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.
@@ -152,7 +151,6 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
## Security-focused Distributions
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
### Qubes OS
@@ -3,7 +3,6 @@ title: "Router Firmware"
description: Alternative operating systems for securing your router or Wi-Fi access point.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
-1
View File
@@ -4,7 +4,6 @@ description: For our more technical readers, self-hosting software and services
weight: 60
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../wiki/basics/common-threats.md#privacy-from-service-providers)
**Self-hosting** software and services can be a way to achieve a higher level of privacy through digital sovereignty, particularly independence from cloud servers controlled by product developers or vendors. By self-hosting, we mean hosting applications and data on your own hardware.
@@ -3,7 +3,6 @@ title: DNS Filtering
description: For our more technical readers, self-hosting a DNS solution can provide filtering for devices not covered by cloud-based DNS solutions.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
@@ -3,7 +3,6 @@ title: Email Servers
description: For our more technical readers, self-hosting your own email can provide additional privacy assurances by having maximum control over your data.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
Advanced system administrators may consider setting up their own **email server**. Mail servers require attention and continuous maintenance in order to keep things secure and mail delivery reliable. In addition to the "all-in-one" solutions below, we've picked out a few articles that cover a more manual approach:
@@ -3,7 +3,6 @@ title: File Management
description: For our more technical readers, self-hosting file management tools can provide additional privacy assurances by having maximum control over your data.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
Self-hosting your own **file management** tools may be a good idea to reduce the risk of encryption flaws in a cloud provider's native clients.
@@ -4,7 +4,6 @@ description: Calendars contain some of your most sensitive data; use products th
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
-1
View File
@@ -3,7 +3,6 @@ title: Cloud Storage
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
@@ -4,7 +4,6 @@ description: Our recommended methods for removing your personal information from
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-misconceptions.md)
<div class="pg-card-logos">
-1
View File
@@ -3,7 +3,6 @@ title: DNS Resolvers
description: We recommend choosing these encrypted DNS providers to replace your ISP's default configuration.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
<div class="pg-card-logos">
@@ -4,7 +4,6 @@ description: An email aliasing service allows you to easily generate a new email
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
[{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats.md#limiting-public-information)
-1
View File
@@ -3,7 +3,6 @@ title: Email Services
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
<div class="pg-card-logos">
@@ -3,7 +3,6 @@ title: Financial Services
description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
@@ -13,7 +12,6 @@ Making payments online is one of the biggest challenges to privacy. These servic
## Payment Masking Services
<small>Protects against the following threat(s):</small>
[{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats.md#limiting-public-information)
<div class="pg-card-logos">
@@ -64,7 +62,6 @@ MySudo's virtual cards are currently only available via their iOS app.
## Gift Card Marketplaces
<small>Protects against the following threat(s):</small>
[{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs)
<div class="pg-card-logos">
@@ -3,7 +3,6 @@ title: Instant Messengers
description: Encrypted messengers like Signal and SimpleX keep your sensitive communications secure from prying eyes.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
[{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs)
@@ -3,7 +3,6 @@ title: Password Managers
description: Password managers allow you to securely store and manage passwords and other credentials.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
@@ -4,7 +4,6 @@ description: These photo backup tools keep your personal photos safe from the pr
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
@@ -4,7 +4,6 @@ description: Use privacy-respecting search engines which don't build an advertis
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
<div class="pg-card-logos">
-1
View File
@@ -3,7 +3,6 @@ title: VPN Services
description: The best VPN services for protecting your privacy and security online. Find a provider here that isn't out to spy on you.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
<div class="pg-card-logos">
-1
View File
@@ -3,7 +3,6 @@ title: "AI Chat"
description: Unlike OpenAI's ChatGPT and its Big Tech competitors, these AI tools run locally so your data never leaves your desktop device.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
[{{< badge content="Censorship" >}}](../../../wiki/basics/common-threats.md#avoiding-censorship)
@@ -3,7 +3,6 @@ title: Browser Extensions
description: These browser extensions can enhance your browsing experience and protect your privacy.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface. They have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.
@@ -3,7 +3,6 @@ description: Unlike most cryptocurrencies, these ones provide transaction privac
title: Cryptocurrency
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs)
[{{< badge content="Censorship" >}}](../../../wiki/basics/common-threats.md#avoiding-censorship)
@@ -3,7 +3,6 @@ title: "Data and Metadata Redaction"
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats.md#limiting-public-information)
When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata.
@@ -3,7 +3,6 @@ title: Desktop Browsers
description: These privacy-protecting browsers are what we currently recommend for standard/non-anonymous internet browsing on desktop systems.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
These are our currently recommended **desktop web browsers** and configurations for standard/non-anonymous browsing. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility.
@@ -3,7 +3,6 @@ title: Document Collaboration
description: Most online office suites do not support end-to-end encryption, meaning the cloud provider has access to everything you do.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
<div class="pg-card-logos">
@@ -3,7 +3,6 @@ title: "Email Clients"
description: These email clients are privacy-respecting and support OpenPGP email encryption.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
@@ -27,7 +27,6 @@ The options listed here are available on multiple platforms and great for creati
### Cryptomator (Cloud)
<small>Protects against the following threat(s):</small>
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
**Cryptomator** is an encryption solution designed for privately saving files to any cloud [:material-server-network: Service Provider](../../../wiki/basics/common-threats.md#privacy-from-service-providers){ .pg-teal }, eliminating the need to trust that they won't access your files. It allows you to create vaults that are stored on a virtual drive, the contents of which are encrypted and synced with your cloud storage provider.
@@ -56,7 +55,6 @@ Cryptomator's documentation details its intended [security target](https://docs.
### VeraCrypt (Disk)
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
**VeraCrypt** is a source-available freeware utility used for on-the-fly encryption. It can create a virtual encrypted disk within a file, encrypt a partition, or encrypt the entire storage device with pre-boot authentication.
@@ -79,7 +77,6 @@ TrueCrypt has been [audited a number of times](https://en.wikipedia.org/wiki/Tru
## Operating System Encryption
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
Built-in OS encryption solutions generally leverage hardware security features such as a [secure cryptoprocessor](../../../wiki/basics/hardware.md#tpmsecure-cryptoprocessor). Therefore, we recommend using the built-in encryption solutions for your operating system. For cross-platform encryption, we still recommend [cross-platform tools](#multi-platform) for additional flexibility and to avoid vendor lock-in.
@@ -158,7 +155,6 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im
## Command-line
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script).
@@ -188,7 +184,6 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht
## OpenPGP
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy)
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
@@ -3,7 +3,6 @@ title: File Sharing and Sync
description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
@@ -3,7 +3,6 @@ title: "Frontends"
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions.
@@ -3,7 +3,6 @@ title: "Health and Wellness"
description: These applications are what we currently recommend for all health- and fitness-related activites on your phone.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
Keep track of your health and fitness-related goals with these apps. Unlike their mainstream alternatives, your personal health information will be kept private.
@@ -3,7 +3,6 @@ title: "Language Tools"
description: These language tools do not send your input text to a server and can be used offline and self-hosted.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
-1
View File
@@ -3,7 +3,6 @@ title: Maps and Navigation
description: Privacy-respecting map providers and navigation apps which don't build an advertising profile based on your searches and locations.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
<div class="pg-card-logos">
@@ -3,7 +3,6 @@ title: Mobile Browsers
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
<div class="pg-card-logos">
@@ -3,7 +3,6 @@ title: Multifactor Authentication
description: These tools assist you with securing your internet accounts with multifactor authentication without sending your secrets to a third party.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
<div class="admonition note" markdown>
@@ -3,7 +3,6 @@ title: "News Aggregators"
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
A **news aggregator** is software which aggregates digital content from online newspapers, blogs, podcasts, and other resources to one location for easy viewing. Using one can be a great way to keep up with your favorite content.
@@ -3,7 +3,6 @@ title: "Notebooks"
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
Keep track of your notes and journals without giving them to a third party.
@@ -3,7 +3,6 @@ title: "Office Suites"
description: These office suites offer their full functionality without an account and can be used offline.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
<div class="pg-card-logos">
@@ -3,7 +3,6 @@ title: "Pastebins"
description: These tools allow you to have full control of any pasted data you share to other parties.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
<div class="pg-card-logos">
@@ -3,7 +3,6 @@ title: Social Networks
description: Find a new social network that doesnt pry into your data or monetize your profile.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Censorship" >}}](../../../wiki/basics/common-threats.md#avoiding-censorship)
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
-1
View File
@@ -3,7 +3,6 @@ title: "Tor Browser"
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
---
<small>Protects against the following threat(s):</small>
[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
[{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs)
[{{< badge content="Censorship" >}}](../../../wiki/basics/common-threats.md#avoiding-censorship)