diff --git a/content/tools/advanced/alternative-networks/_index.md b/content/tools/advanced/alternative-networks/_index.md index d1a3c0ae..b84a18ea 100644 --- a/content/tools/advanced/alternative-networks/_index.md +++ b/content/tools/advanced/alternative-networks/_index.md @@ -3,7 +3,6 @@ title: "Alternative Networks" description: These tools allow you to access networks other than the World Wide Web. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) [{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs) [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) diff --git a/content/tools/advanced/device-integrity/_index.md b/content/tools/advanced/device-integrity/_index.md index 77c6e100..ca995ece 100644 --- a/content/tools/advanced/device-integrity/_index.md +++ b/content/tools/advanced/device-integrity/_index.md @@ -52,7 +52,6 @@ These tools provide analysis based on the information they have the ability to a ## External Verification Tools Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) External verification tools run on your computer and scan your mobile device for forensic traces, which are helpful to identify potential compromise. @@ -119,7 +118,6 @@ iMazing automates and interactively guides you through the process of using [MVT ## On-Device Verification Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) diff --git a/content/tools/hardware/mobile-phones/_index.md b/content/tools/hardware/mobile-phones/_index.md index 9b315872..50870b09 100644 --- a/content/tools/hardware/mobile-phones/_index.md +++ b/content/tools/hardware/mobile-phones/_index.md @@ -3,7 +3,6 @@ title: Mobile Phones description: These mobile devices provide the best hardware security support for custom Android operating systems. --- Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) diff --git a/content/tools/hardware/security-keys/_index.md b/content/tools/hardware/security-keys/_index.md index 628908ee..b6b3b4f9 100644 --- a/content/tools/hardware/security-keys/_index.md +++ b/content/tools/hardware/security-keys/_index.md @@ -3,7 +3,6 @@ title: Security Keys description: These security keys provide a form of phishing-immune authentication for accounts that support it. --- Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) diff --git a/content/tools/os/android/distributions/_index.md b/content/tools/os/android/distributions/_index.md index 960343f5..b4326aa1 100644 --- a/content/tools/os/android/distributions/_index.md +++ b/content/tools/os/android/distributions/_index.md @@ -3,7 +3,6 @@ title: Alternative Distributions description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. --- Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) diff --git a/content/tools/os/android/general-apps/_index.md b/content/tools/os/android/general-apps/_index.md index 280930ad..88f9abcc 100644 --- a/content/tools/os/android/general-apps/_index.md +++ b/content/tools/os/android/general-apps/_index.md @@ -3,7 +3,6 @@ title: "General Apps" description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. --- Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. @@ -41,7 +40,6 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a ## Secure Camera Protects against the following threat(s): - [{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats.md#limiting-public-information) **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. @@ -73,7 +71,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure ## Secure PDF Viewer Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) **Secure PDF Viewer** is a PDF viewer based on [pdf.js](https://en.wikipedia.org/wiki/PDF.js) that doesn't require any permissions. The PDF is fed into a [sandboxed](https://en.wikipedia.org/wiki/Sandbox_(software_development)) [WebView](https://developer.android.com/guide/webapps/webview). This means that it doesn't require permission directly to access content or files. diff --git a/content/tools/os/desktop/_index.md b/content/tools/os/desktop/_index.md index 1f2d5ce7..21a38cab 100644 --- a/content/tools/os/desktop/_index.md +++ b/content/tools/os/desktop/_index.md @@ -3,7 +3,6 @@ title: "Desktop/PC" description: Linux distributions are commonly recommended for privacy protection and software freedom. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. @@ -152,7 +151,6 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) ### Qubes OS diff --git a/content/tools/os/router-firmware/_index.md b/content/tools/os/router-firmware/_index.md index 2b5951ba..cc7f4eb4 100644 --- a/content/tools/os/router-firmware/_index.md +++ b/content/tools/os/router-firmware/_index.md @@ -3,7 +3,6 @@ title: "Router Firmware" description: Alternative operating systems for securing your router or Wi-Fi access point. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) diff --git a/content/tools/self-hosting/_index.md b/content/tools/self-hosting/_index.md index 5145726e..4eb13640 100644 --- a/content/tools/self-hosting/_index.md +++ b/content/tools/self-hosting/_index.md @@ -4,7 +4,6 @@ description: For our more technical readers, self-hosting software and services weight: 60 --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../wiki/basics/common-threats.md#privacy-from-service-providers) **Self-hosting** software and services can be a way to achieve a higher level of privacy through digital sovereignty, particularly independence from cloud servers controlled by product developers or vendors. By self-hosting, we mean hosting applications and data on your own hardware. diff --git a/content/tools/self-hosting/dns-filtering/_index.md b/content/tools/self-hosting/dns-filtering/_index.md index a5c1af3a..548910fd 100644 --- a/content/tools/self-hosting/dns-filtering/_index.md +++ b/content/tools/self-hosting/dns-filtering/_index.md @@ -3,7 +3,6 @@ title: DNS Filtering description: For our more technical readers, self-hosting a DNS solution can provide filtering for devices not covered by cloud-based DNS solutions. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) diff --git a/content/tools/self-hosting/email-servers/_index.md b/content/tools/self-hosting/email-servers/_index.md index d76b9e12..941d1ccc 100644 --- a/content/tools/self-hosting/email-servers/_index.md +++ b/content/tools/self-hosting/email-servers/_index.md @@ -3,7 +3,6 @@ title: Email Servers description: For our more technical readers, self-hosting your own email can provide additional privacy assurances by having maximum control over your data. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) Advanced system administrators may consider setting up their own **email server**. Mail servers require attention and continuous maintenance in order to keep things secure and mail delivery reliable. In addition to the "all-in-one" solutions below, we've picked out a few articles that cover a more manual approach: diff --git a/content/tools/self-hosting/file-management/_index.md b/content/tools/self-hosting/file-management/_index.md index eeddb353..50055e45 100644 --- a/content/tools/self-hosting/file-management/_index.md +++ b/content/tools/self-hosting/file-management/_index.md @@ -3,7 +3,6 @@ title: File Management description: For our more technical readers, self-hosting file management tools can provide additional privacy assurances by having maximum control over your data. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) Self-hosting your own **file management** tools may be a good idea to reduce the risk of encryption flaws in a cloud provider's native clients. diff --git a/content/tools/services/calendar/_index.md b/content/tools/services/calendar/_index.md index 10aec6ab..e37d5362 100644 --- a/content/tools/services/calendar/_index.md +++ b/content/tools/services/calendar/_index.md @@ -4,7 +4,6 @@ description: Calendars contain some of your most sensitive data; use products th --- Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) diff --git a/content/tools/services/cloud/_index.md b/content/tools/services/cloud/_index.md index 0b198d2e..45766955 100644 --- a/content/tools/services/cloud/_index.md +++ b/content/tools/services/cloud/_index.md @@ -3,7 +3,6 @@ title: Cloud Storage description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! --- Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) diff --git a/content/tools/services/data-broker-removals/_index.md b/content/tools/services/data-broker-removals/_index.md index 7ede3ca2..fe677321 100644 --- a/content/tools/services/data-broker-removals/_index.md +++ b/content/tools/services/data-broker-removals/_index.md @@ -4,7 +4,6 @@ description: Our recommended methods for removing your personal information from --- Protects against the following threat(s): - [{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-misconceptions.md)