From caed4eb4b6c3d5c4087c3c8c6e970c0c3a42b661 Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Tue, 12 May 2026 13:09:57 -0500 Subject: [PATCH] style: Update frontmatter/intros to tool pages --- content/tools/_index.md | 1 - .../advanced/alternative-networks/_index.md | 14 +- .../tools/advanced/device-integrity/_index.md | 11 +- content/tools/all.md | 1 - .../tools/hardware/mobile-phones/_index.md | 27 +--- .../tools/hardware/security-keys/_index.md | 8 +- content/tools/os/android/_index.md | 16 --- content/tools/os/android/distributions.md | 25 +--- content/tools/os/android/general-apps.md | 31 +---- content/tools/os/desktop/_index.md | 14 +- content/tools/os/router-firmware/_index.md | 6 +- content/tools/self-hosting/_index.md | 4 +- .../self-hosting/dns-filtering/_index.md | 7 +- .../self-hosting/email-servers/_index.md | 5 +- .../self-hosting/file-management/_index.md | 5 +- content/tools/services/calendar/_index.md | 6 +- content/tools/services/cloud/_index.md | 22 +-- .../services/data-broker-removals/_index.md | 4 +- content/tools/services/dns/_index.md | 26 ++-- .../tools/services/email-aliasing/_index.md | 6 +- content/tools/services/email/_index.md | 43 +++--- .../services/financial-services/_index.md | 10 +- content/tools/services/messengers/_index.md | 20 ++- content/tools/services/passwords/_index.md | 125 +----------------- .../tools/services/photo-backups/_index.md | 6 +- .../tools/services/search-engines/_index.md | 7 +- content/tools/services/vpn/_index.md | 16 +-- content/tools/software/ai-chat/_index.md | 9 +- .../software/browser-extensions/_index.md | 9 +- .../tools/software/cryptocurrency/_index.md | 13 +- .../tools/software/data-redaction/_index.md | 5 +- .../tools/software/desktop-browsers/_index.md | 60 +-------- .../software/document-collaboration/_index.md | 4 +- .../tools/software/email-clients/_index.md | 16 +-- content/tools/software/encryption/_index.md | 22 ++- content/tools/software/file-sharing/_index.md | 8 +- content/tools/software/frontends/_index.md | 10 +- .../software/health-and-wellness/_index.md | 5 +- .../tools/software/language-tools/_index.md | 6 +- content/tools/software/maps/_index.md | 5 +- .../tools/software/mobile-browsers/_index.md | 49 +------ .../multi-factor-authentication/_index.md | 4 +- .../tools/software/news-aggregators/_index.md | 4 +- content/tools/software/notebooks/_index.md | 4 +- .../tools/software/office-suites/_index.md | 4 +- content/tools/software/pastebins/_index.md | 4 +- .../tools/software/social-networks/_index.md | 6 +- content/tools/software/tor/_index.md | 32 +---- 48 files changed, 162 insertions(+), 583 deletions(-) diff --git a/content/tools/_index.md b/content/tools/_index.md index f9412cb1..4d8f57a2 100644 --- a/content/tools/_index.md +++ b/content/tools/_index.md @@ -8,7 +8,6 @@ cascade: type: docs contextMenu: true --- - If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. {{< cards >}} diff --git a/content/tools/advanced/alternative-networks/_index.md b/content/tools/advanced/alternative-networks/_index.md index 5d5ebd84..8a8c8b56 100644 --- a/content/tools/advanced/alternative-networks/_index.md +++ b/content/tools/advanced/alternative-networks/_index.md @@ -1,18 +1,16 @@ --- title: "Alternative Networks" -icon: material/vector-polygon description: These tools allow you to access networks other than the World Wide Web. -cover: alternative-networks.webp --- Protects against the following threat(s): -- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } +[{{< badge content="Service Providers" color="indigo" >}}](../../../wiki/basics/common-threats.md#privacy-from-service-providers) +[{{< badge content="Mass Surveillance" color="blue" >}}](../../../wiki/basics/common-threats.md#mass-surveillance-programs) +[{{< badge content="Surveillance Capitalism" color="purple" >}}](../../../wiki/basics/common-threats.md#surveillance-as-a-business-model) ## Anonymizing Networks -When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple }, unless you know what you're doing. +When it comes to anonymizing networks, we want to specially note that [Tor](../../../wiki/advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your [:material-incognito: Anonymity](../../../wiki/basics/common-threats.md#anonymity-vs-privacy){ .pg-purple }, unless you know what you're doing. ### Tor @@ -20,7 +18,7 @@ When it comes to anonymizing networks, we want to specially note that [Tor](adva ![Tor logo](tor.svg){ align=right } -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } circumvention tool. +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective [:material-close-outline: Censorship](../../../wiki/basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } circumvention tool. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -32,7 +30,7 @@ The **Tor** network is a group of volunteer-operated servers that allows you to The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: -[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](../../../wiki/advanced/tor-overview.md){ .md-button } You can access the Tor network using other tools; making this determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using apps like [Orbot](#orbot) or mobile browser apps to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. diff --git a/content/tools/advanced/device-integrity/_index.md b/content/tools/advanced/device-integrity/_index.md index cb7ec4ce..eba8d1e9 100644 --- a/content/tools/advanced/device-integrity/_index.md +++ b/content/tools/advanced/device-integrity/_index.md @@ -1,11 +1,8 @@ --- title: "Device Integrity" -icon: material/security description: These tools can be used to check your devices for compromise. -cover: device-integrity.webp robots: nofollow, max-snippet:-1, max-image-preview:large --- - These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
@@ -48,7 +45,7 @@ These tools provide analysis based on the information they have the ability to a Protects against the following threat(s): -- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } +[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) External verification tools run on your computer and scan your mobile device for forensic traces, which are helpful to identify potential compromise. @@ -135,8 +132,8 @@ iMazing automates and interactively guides you through the process of using [MVT Protects against the following threat(s): -- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange } +[{{< badge content="Targeted Attacks" color="red" >}}](../../../wiki/basics/common-threats.md#attacks-against-specific-individuals) +[{{< badge content="Passive Attacks" color="amber" >}}](../../../wiki/basics/common-threats.md#security-and-privacy) These are apps you can install which check your device and operating system for signs of tampering, and validate the identity of your device. @@ -187,4 +184,4 @@ It is important to note that Auditor can only effectively detect changes **after No personally identifiable information is submitted to the attestation service. We recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring. -If your [threat model](basics/threat-modeling.md) requires hiding your IP address from the attestation service, you could consider using [Orbot](alternative-networks.md#orbot) or a [VPN](vpn.md). +If your [threat model](../../../wiki/basics/threat-modeling.md requires hiding your IP address from the attestation service, you could consider using [Orbot](alternative-networks.md#orbot) or a [VPN](vpn.md). diff --git a/content/tools/all.md b/content/tools/all.md index d4312f7a..3f70b549 100644 --- a/content/tools/all.md +++ b/content/tools/all.md @@ -2,7 +2,6 @@ title: All Privacy Tools weight: 10 --- -