diff --git a/content/tools/advanced/alternative-networks/_index.md b/content/tools/advanced/alternative-networks/_index.md index d1a3c0ae..b84a18ea 100644 --- a/content/tools/advanced/alternative-networks/_index.md +++ b/content/tools/advanced/alternative-networks/_index.md @@ -3,7 +3,6 @@ title: "Alternative Networks" description: These tools allow you to access networks other than the World Wide Web. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) [{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs) [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) diff --git a/content/tools/advanced/device-integrity/_index.md b/content/tools/advanced/device-integrity/_index.md index 77c6e100..ca995ece 100644 --- a/content/tools/advanced/device-integrity/_index.md +++ b/content/tools/advanced/device-integrity/_index.md @@ -52,7 +52,6 @@ These tools provide analysis based on the information they have the ability to a ## External Verification Tools Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) External verification tools run on your computer and scan your mobile device for forensic traces, which are helpful to identify potential compromise. @@ -119,7 +118,6 @@ iMazing automates and interactively guides you through the process of using [MVT ## On-Device Verification Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) diff --git a/content/tools/hardware/mobile-phones/_index.md b/content/tools/hardware/mobile-phones/_index.md index 9b315872..50870b09 100644 --- a/content/tools/hardware/mobile-phones/_index.md +++ b/content/tools/hardware/mobile-phones/_index.md @@ -3,7 +3,6 @@ title: Mobile Phones description: These mobile devices provide the best hardware security support for custom Android operating systems. --- Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) diff --git a/content/tools/hardware/security-keys/_index.md b/content/tools/hardware/security-keys/_index.md index 628908ee..b6b3b4f9 100644 --- a/content/tools/hardware/security-keys/_index.md +++ b/content/tools/hardware/security-keys/_index.md @@ -3,7 +3,6 @@ title: Security Keys description: These security keys provide a form of phishing-immune authentication for accounts that support it. --- Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) diff --git a/content/tools/os/android/distributions/_index.md b/content/tools/os/android/distributions/_index.md index 960343f5..b4326aa1 100644 --- a/content/tools/os/android/distributions/_index.md +++ b/content/tools/os/android/distributions/_index.md @@ -3,7 +3,6 @@ title: Alternative Distributions description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. --- Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) diff --git a/content/tools/os/android/general-apps/_index.md b/content/tools/os/android/general-apps/_index.md index 280930ad..88f9abcc 100644 --- a/content/tools/os/android/general-apps/_index.md +++ b/content/tools/os/android/general-apps/_index.md @@ -3,7 +3,6 @@ title: "General Apps" description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. --- Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. @@ -41,7 +40,6 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a ## Secure Camera Protects against the following threat(s): - [{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats.md#limiting-public-information) **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. @@ -73,7 +71,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure ## Secure PDF Viewer Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) **Secure PDF Viewer** is a PDF viewer based on [pdf.js](https://en.wikipedia.org/wiki/PDF.js) that doesn't require any permissions. The PDF is fed into a [sandboxed](https://en.wikipedia.org/wiki/Sandbox_(software_development)) [WebView](https://developer.android.com/guide/webapps/webview). This means that it doesn't require permission directly to access content or files. diff --git a/content/tools/os/desktop/_index.md b/content/tools/os/desktop/_index.md index 1f2d5ce7..21a38cab 100644 --- a/content/tools/os/desktop/_index.md +++ b/content/tools/os/desktop/_index.md @@ -3,7 +3,6 @@ title: "Desktop/PC" description: Linux distributions are commonly recommended for privacy protection and software freedom. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. @@ -152,7 +151,6 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) ### Qubes OS diff --git a/content/tools/os/router-firmware/_index.md b/content/tools/os/router-firmware/_index.md index 2b5951ba..cc7f4eb4 100644 --- a/content/tools/os/router-firmware/_index.md +++ b/content/tools/os/router-firmware/_index.md @@ -3,7 +3,6 @@ title: "Router Firmware" description: Alternative operating systems for securing your router or Wi-Fi access point. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) diff --git a/content/tools/self-hosting/_index.md b/content/tools/self-hosting/_index.md index 5145726e..4eb13640 100644 --- a/content/tools/self-hosting/_index.md +++ b/content/tools/self-hosting/_index.md @@ -4,7 +4,6 @@ description: For our more technical readers, self-hosting software and services weight: 60 --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../wiki/basics/common-threats.md#privacy-from-service-providers) **Self-hosting** software and services can be a way to achieve a higher level of privacy through digital sovereignty, particularly independence from cloud servers controlled by product developers or vendors. By self-hosting, we mean hosting applications and data on your own hardware. diff --git a/content/tools/self-hosting/dns-filtering/_index.md b/content/tools/self-hosting/dns-filtering/_index.md index a5c1af3a..548910fd 100644 --- a/content/tools/self-hosting/dns-filtering/_index.md +++ b/content/tools/self-hosting/dns-filtering/_index.md @@ -3,7 +3,6 @@ title: DNS Filtering description: For our more technical readers, self-hosting a DNS solution can provide filtering for devices not covered by cloud-based DNS solutions. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) diff --git a/content/tools/self-hosting/email-servers/_index.md b/content/tools/self-hosting/email-servers/_index.md index d76b9e12..941d1ccc 100644 --- a/content/tools/self-hosting/email-servers/_index.md +++ b/content/tools/self-hosting/email-servers/_index.md @@ -3,7 +3,6 @@ title: Email Servers description: For our more technical readers, self-hosting your own email can provide additional privacy assurances by having maximum control over your data. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) Advanced system administrators may consider setting up their own **email server**. Mail servers require attention and continuous maintenance in order to keep things secure and mail delivery reliable. In addition to the "all-in-one" solutions below, we've picked out a few articles that cover a more manual approach: diff --git a/content/tools/self-hosting/file-management/_index.md b/content/tools/self-hosting/file-management/_index.md index eeddb353..50055e45 100644 --- a/content/tools/self-hosting/file-management/_index.md +++ b/content/tools/self-hosting/file-management/_index.md @@ -3,7 +3,6 @@ title: File Management description: For our more technical readers, self-hosting file management tools can provide additional privacy assurances by having maximum control over your data. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) Self-hosting your own **file management** tools may be a good idea to reduce the risk of encryption flaws in a cloud provider's native clients. diff --git a/content/tools/services/calendar/_index.md b/content/tools/services/calendar/_index.md index 10aec6ab..e37d5362 100644 --- a/content/tools/services/calendar/_index.md +++ b/content/tools/services/calendar/_index.md @@ -4,7 +4,6 @@ description: Calendars contain some of your most sensitive data; use products th --- Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) diff --git a/content/tools/services/cloud/_index.md b/content/tools/services/cloud/_index.md index 0b198d2e..45766955 100644 --- a/content/tools/services/cloud/_index.md +++ b/content/tools/services/cloud/_index.md @@ -3,7 +3,6 @@ title: Cloud Storage description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! --- Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) diff --git a/content/tools/services/data-broker-removals/_index.md b/content/tools/services/data-broker-removals/_index.md index 7ede3ca2..fe677321 100644 --- a/content/tools/services/data-broker-removals/_index.md +++ b/content/tools/services/data-broker-removals/_index.md @@ -4,7 +4,6 @@ description: Our recommended methods for removing your personal information from --- Protects against the following threat(s): - [{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-misconceptions.md)
diff --git a/content/tools/services/dns/_index.md b/content/tools/services/dns/_index.md index d9078d80..41ff59f8 100644 --- a/content/tools/services/dns/_index.md +++ b/content/tools/services/dns/_index.md @@ -3,7 +3,6 @@ title: DNS Resolvers description: We recommend choosing these encrypted DNS providers to replace your ISP's default configuration. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
diff --git a/content/tools/services/email-aliasing/_index.md b/content/tools/services/email-aliasing/_index.md index 663187a8..c68af54d 100644 --- a/content/tools/services/email-aliasing/_index.md +++ b/content/tools/services/email-aliasing/_index.md @@ -4,7 +4,6 @@ description: An email aliasing service allows you to easily generate a new email --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) [{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats.md#limiting-public-information) diff --git a/content/tools/services/email/_index.md b/content/tools/services/email/_index.md index b887c64f..3c752651 100644 --- a/content/tools/services/email/_index.md +++ b/content/tools/services/email/_index.md @@ -3,7 +3,6 @@ title: Email Services description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
diff --git a/content/tools/services/financial-services/_index.md b/content/tools/services/financial-services/_index.md index a82a7260..f9443e30 100644 --- a/content/tools/services/financial-services/_index.md +++ b/content/tools/services/financial-services/_index.md @@ -3,7 +3,6 @@ title: Financial Services description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: @@ -13,7 +12,6 @@ Making payments online is one of the biggest challenges to privacy. These servic ## Payment Masking Services Protects against the following threat(s): - [{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats.md#limiting-public-information)
@@ -64,7 +62,6 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces Protects against the following threat(s): - [{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs)
diff --git a/content/tools/services/messengers/_index.md b/content/tools/services/messengers/_index.md index 7f65d98a..7fe37cfb 100644 --- a/content/tools/services/messengers/_index.md +++ b/content/tools/services/messengers/_index.md @@ -3,7 +3,6 @@ title: Instant Messengers description: Encrypted messengers like Signal and SimpleX keep your sensitive communications secure from prying eyes. --- Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) [{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs) diff --git a/content/tools/services/passwords/_index.md b/content/tools/services/passwords/_index.md index 20d9c9c8..858e0558 100644 --- a/content/tools/services/passwords/_index.md +++ b/content/tools/services/passwords/_index.md @@ -3,7 +3,6 @@ title: Password Managers description: Password managers allow you to securely store and manage passwords and other credentials. --- Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) diff --git a/content/tools/services/photo-backups/_index.md b/content/tools/services/photo-backups/_index.md index 9ac2e8f5..87af4c4a 100644 --- a/content/tools/services/photo-backups/_index.md +++ b/content/tools/services/photo-backups/_index.md @@ -4,7 +4,6 @@ description: These photo backup tools keep your personal photos safe from the pr --- Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) diff --git a/content/tools/services/search-engines/_index.md b/content/tools/services/search-engines/_index.md index ee9a42bd..fbf93ef6 100644 --- a/content/tools/services/search-engines/_index.md +++ b/content/tools/services/search-engines/_index.md @@ -4,7 +4,6 @@ description: Use privacy-respecting search engines which don't build an advertis --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
diff --git a/content/tools/services/vpn/_index.md b/content/tools/services/vpn/_index.md index f8e644d1..78c5349f 100644 --- a/content/tools/services/vpn/_index.md +++ b/content/tools/services/vpn/_index.md @@ -3,7 +3,6 @@ title: VPN Services description: The best VPN services for protecting your privacy and security online. Find a provider here that isn't out to spy on you. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
diff --git a/content/tools/software/ai-chat/_index.md b/content/tools/software/ai-chat/_index.md index caee4f61..400e5870 100755 --- a/content/tools/software/ai-chat/_index.md +++ b/content/tools/software/ai-chat/_index.md @@ -3,7 +3,6 @@ title: "AI Chat" description: Unlike OpenAI's ChatGPT and its Big Tech competitors, these AI tools run locally so your data never leaves your desktop device. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) [{{< badge content="Censorship" >}}](../../../wiki/basics/common-threats.md#avoiding-censorship) diff --git a/content/tools/software/browser-extensions/_index.md b/content/tools/software/browser-extensions/_index.md index e23c0a2a..49493681 100644 --- a/content/tools/software/browser-extensions/_index.md +++ b/content/tools/software/browser-extensions/_index.md @@ -3,7 +3,6 @@ title: Browser Extensions description: These browser extensions can enhance your browsing experience and protect your privacy. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface. They have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. diff --git a/content/tools/software/cryptocurrency/_index.md b/content/tools/software/cryptocurrency/_index.md index fa26e573..50bc2707 100644 --- a/content/tools/software/cryptocurrency/_index.md +++ b/content/tools/software/cryptocurrency/_index.md @@ -3,7 +3,6 @@ description: Unlike most cryptocurrencies, these ones provide transaction privac title: Cryptocurrency --- Protects against the following threat(s): - [{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs) [{{< badge content="Censorship" >}}](../../../wiki/basics/common-threats.md#avoiding-censorship) diff --git a/content/tools/software/data-redaction/_index.md b/content/tools/software/data-redaction/_index.md index e7475d7b..458b2e70 100644 --- a/content/tools/software/data-redaction/_index.md +++ b/content/tools/software/data-redaction/_index.md @@ -3,7 +3,6 @@ title: "Data and Metadata Redaction" description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. --- Protects against the following threat(s): - [{{< badge content="Public Exposure" color="green" >}}](../../../wiki/basics/common-threats.md#limiting-public-information) When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/content/tools/software/desktop-browsers/_index.md b/content/tools/software/desktop-browsers/_index.md index dd5a9c2f..2e5f07c8 100644 --- a/content/tools/software/desktop-browsers/_index.md +++ b/content/tools/software/desktop-browsers/_index.md @@ -3,7 +3,6 @@ title: Desktop Browsers description: These privacy-protecting browsers are what we currently recommend for standard/non-anonymous internet browsing on desktop systems. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) These are our currently recommended **desktop web browsers** and configurations for standard/non-anonymous browsing. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility. diff --git a/content/tools/software/document-collaboration/_index.md b/content/tools/software/document-collaboration/_index.md index b3c824c4..97270a23 100644 --- a/content/tools/software/document-collaboration/_index.md +++ b/content/tools/software/document-collaboration/_index.md @@ -3,7 +3,6 @@ title: Document Collaboration description: Most online office suites do not support end-to-end encryption, meaning the cloud provider has access to everything you do. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
diff --git a/content/tools/software/email-clients/_index.md b/content/tools/software/email-clients/_index.md index a78d36aa..5083f522 100644 --- a/content/tools/software/email-clients/_index.md +++ b/content/tools/software/email-clients/_index.md @@ -3,7 +3,6 @@ title: "Email Clients" description: These email clients are privacy-respecting and support OpenPGP email encryption. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) diff --git a/content/tools/software/encryption/_index.md b/content/tools/software/encryption/_index.md index d21c2bd9..9960359e 100644 --- a/content/tools/software/encryption/_index.md +++ b/content/tools/software/encryption/_index.md @@ -27,7 +27,6 @@ The options listed here are available on multiple platforms and great for creati ### Cryptomator (Cloud) Protects against the following threat(s): - [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) **Cryptomator** is an encryption solution designed for privately saving files to any cloud [:material-server-network: Service Provider](../../../wiki/basics/common-threats.md#privacy-from-service-providers){ .pg-teal }, eliminating the need to trust that they won't access your files. It allows you to create vaults that are stored on a virtual drive, the contents of which are encrypted and synced with your cloud storage provider. @@ -56,7 +55,6 @@ Cryptomator's documentation details its intended [security target](https://docs. ### VeraCrypt (Disk) Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) **VeraCrypt** is a source-available freeware utility used for on-the-fly encryption. It can create a virtual encrypted disk within a file, encrypt a partition, or encrypt the entire storage device with pre-boot authentication. @@ -79,7 +77,6 @@ TrueCrypt has been [audited a number of times](https://en.wikipedia.org/wiki/Tru ## Operating System Encryption Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) Built-in OS encryption solutions generally leverage hardware security features such as a [secure cryptoprocessor](../../../wiki/basics/hardware.md#tpmsecure-cryptoprocessor). Therefore, we recommend using the built-in encryption solutions for your operating system. For cross-platform encryption, we still recommend [cross-platform tools](#multi-platform) for additional flexibility and to avoid vendor lock-in. @@ -158,7 +155,6 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im ## Command-line Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). @@ -188,7 +184,6 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ## OpenPGP Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) [{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) diff --git a/content/tools/software/file-sharing/_index.md b/content/tools/software/file-sharing/_index.md index 8749ed8c..4d34bf53 100644 --- a/content/tools/software/file-sharing/_index.md +++ b/content/tools/software/file-sharing/_index.md @@ -3,7 +3,6 @@ title: File Sharing and Sync description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/content/tools/software/frontends/_index.md b/content/tools/software/frontends/_index.md index 0bf7c377..c8254d82 100644 --- a/content/tools/software/frontends/_index.md +++ b/content/tools/software/frontends/_index.md @@ -3,7 +3,6 @@ title: "Frontends" description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. diff --git a/content/tools/software/health-and-wellness/_index.md b/content/tools/software/health-and-wellness/_index.md index 039b7153..40bbd93b 100644 --- a/content/tools/software/health-and-wellness/_index.md +++ b/content/tools/software/health-and-wellness/_index.md @@ -3,7 +3,6 @@ title: "Health and Wellness" description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) Keep track of your health and fitness-related goals with these apps. Unlike their mainstream alternatives, your personal health information will be kept private. diff --git a/content/tools/software/language-tools/_index.md b/content/tools/software/language-tools/_index.md index 3ba5aee0..5ff29c7e 100644 --- a/content/tools/software/language-tools/_index.md +++ b/content/tools/software/language-tools/_index.md @@ -3,7 +3,6 @@ title: "Language Tools" description: These language tools do not send your input text to a server and can be used offline and self-hosted. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) diff --git a/content/tools/software/maps/_index.md b/content/tools/software/maps/_index.md index 98e65b45..c59e77cd 100644 --- a/content/tools/software/maps/_index.md +++ b/content/tools/software/maps/_index.md @@ -3,7 +3,6 @@ title: Maps and Navigation description: Privacy-respecting map providers and navigation apps which don't build an advertising profile based on your searches and locations. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
diff --git a/content/tools/software/mobile-browsers/_index.md b/content/tools/software/mobile-browsers/_index.md index db6ea51f..db6ea844 100644 --- a/content/tools/software/mobile-browsers/_index.md +++ b/content/tools/software/mobile-browsers/_index.md @@ -3,7 +3,6 @@ title: Mobile Browsers description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model)
diff --git a/content/tools/software/multi-factor-authentication/_index.md b/content/tools/software/multi-factor-authentication/_index.md index 65b75af4..79d40703 100644 --- a/content/tools/software/multi-factor-authentication/_index.md +++ b/content/tools/software/multi-factor-authentication/_index.md @@ -3,7 +3,6 @@ title: Multifactor Authentication description: These tools assist you with securing your internet accounts with multifactor authentication without sending your secrets to a third party. --- Protects against the following threat(s): - [{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals)
diff --git a/content/tools/software/news-aggregators/_index.md b/content/tools/software/news-aggregators/_index.md index 6fb6179e..593bda5c 100644 --- a/content/tools/software/news-aggregators/_index.md +++ b/content/tools/software/news-aggregators/_index.md @@ -3,7 +3,6 @@ title: "News Aggregators" description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) A **news aggregator** is software which aggregates digital content from online newspapers, blogs, podcasts, and other resources to one location for easy viewing. Using one can be a great way to keep up with your favorite content. diff --git a/content/tools/software/notebooks/_index.md b/content/tools/software/notebooks/_index.md index bab951db..b01244f8 100644 --- a/content/tools/software/notebooks/_index.md +++ b/content/tools/software/notebooks/_index.md @@ -3,7 +3,6 @@ title: "Notebooks" description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) Keep track of your notes and journals without giving them to a third party. diff --git a/content/tools/software/office-suites/_index.md b/content/tools/software/office-suites/_index.md index f4badea1..f27d2f7a 100644 --- a/content/tools/software/office-suites/_index.md +++ b/content/tools/software/office-suites/_index.md @@ -3,7 +3,6 @@ title: "Office Suites" description: These office suites offer their full functionality without an account and can be used offline. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
diff --git a/content/tools/software/pastebins/_index.md b/content/tools/software/pastebins/_index.md index 38844713..3b7ec806 100644 --- a/content/tools/software/pastebins/_index.md +++ b/content/tools/software/pastebins/_index.md @@ -3,7 +3,6 @@ title: "Pastebins" description: These tools allow you to have full control of any pasted data you share to other parties. --- Protects against the following threat(s): - [{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers)
diff --git a/content/tools/software/social-networks/_index.md b/content/tools/software/social-networks/_index.md index f78f245c..4f903f15 100644 --- a/content/tools/software/social-networks/_index.md +++ b/content/tools/software/social-networks/_index.md @@ -3,7 +3,6 @@ title: Social Networks description: Find a new social network that doesn’t pry into your data or monetize your profile. --- Protects against the following threat(s): - [{{< badge content="Censorship" >}}](../../../wiki/basics/common-threats.md#avoiding-censorship) [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) diff --git a/content/tools/software/tor/_index.md b/content/tools/software/tor/_index.md index 7f638537..ba5c5d68 100644 --- a/content/tools/software/tor/_index.md +++ b/content/tools/software/tor/_index.md @@ -3,7 +3,6 @@ title: "Tor Browser" description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. --- Protects against the following threat(s): - [{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) [{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs) [{{< badge content="Censorship" >}}](../../../wiki/basics/common-threats.md#avoiding-censorship)