diff --git a/.github/CONTRIBUTING.md b/.github/CONTRIBUTING.md
new file mode 100644
index 00000000..f60cd2d5
--- /dev/null
+++ b/.github/CONTRIBUTING.md
@@ -0,0 +1,28 @@
+# Contributing Guidelines
+
+Please read this before contributing.
+
+## Rules
+
+- Be nice and respectful.
+- English only.
+- Be constructive.
+
+## Quality over Quantity
+
+We're trying to keep it simple and promote the best tools, not all of them. Maximum are three software choices, but it's possible to add more under "Worth Mentioning" headlines. ([example](https://privacytoolsio.github.io/privacytools.io/#im))
+
+## Software Criteria
+
+- Open Source
+- Cross-platform
+- Easy to use
+- Privacy respecting
+
+There can be exceptions if no software is available that meet the criteria.
+
+## Images
+
+- Provider logos should be exactly 200 x 70 ([example](https://www.privacytools.io/assets/img/provider/AirVPN.gif))
+- Tool logos should be exactly 120 x 120 ([example](https://www.privacytools.io/assets/img/tools/ChatSecure.png))
+
diff --git a/.github/ISSUE_TEMPLATE/1_Software_Suggestion.md b/.github/ISSUE_TEMPLATE/1_Software_Suggestion.md
new file mode 100644
index 00000000..2b018612
--- /dev/null
+++ b/.github/ISSUE_TEMPLATE/1_Software_Suggestion.md
@@ -0,0 +1,14 @@
+---
+name: "๐ Software Suggestion"
+about: Suggest new software that enhances privacy.
+title: "๐ Software Suggestion | "
+labels: ๐ software suggestion
+---
+
+## Basic Information
+
+**Name:**
+**Category:**
+**URL:**
+
+## Description
diff --git a/.github/ISSUE_TEMPLATE/2_Software_Removal.md b/.github/ISSUE_TEMPLATE/2_Software_Removal.md
new file mode 100644
index 00000000..f615cd64
--- /dev/null
+++ b/.github/ISSUE_TEMPLATE/2_Software_Removal.md
@@ -0,0 +1,9 @@
+---
+name: "โ Software Removal"
+about: Suggest the removal of outdated, insecure, or otherwise bad software.
+title: "โ Software Removal | "
+labels: โ software removal
+---
+
+## Description
+
diff --git a/.github/ISSUE_TEMPLATE/3_Discussion.md b/.github/ISSUE_TEMPLATE/3_Discussion.md
new file mode 100644
index 00000000..506b96e2
--- /dev/null
+++ b/.github/ISSUE_TEMPLATE/3_Discussion.md
@@ -0,0 +1,8 @@
+---
+name: "๐ฌ Discussion"
+about: Discuss the website or any mentioned software in general.
+title: "๐ฌ Discussion | "
+labels: ๐ฌ discussion, feedback wanted
+---
+
+
diff --git a/.github/ISSUE_TEMPLATE/4_Feature.md b/.github/ISSUE_TEMPLATE/4_Feature.md
new file mode 100644
index 00000000..f4affecc
--- /dev/null
+++ b/.github/ISSUE_TEMPLATE/4_Feature.md
@@ -0,0 +1,9 @@
+---
+name: "โจ Feature Suggestion"
+about: Suggest a new feature for the website.
+title: "โจ Feature Suggestion | "
+labels: โจ enhancement
+---
+
+## Description:
+
diff --git a/.github/ISSUE_TEMPLATE/5_Website_Issues.md b/.github/ISSUE_TEMPLATE/5_Website_Issues.md
new file mode 100644
index 00000000..ed9d01dd
--- /dev/null
+++ b/.github/ISSUE_TEMPLATE/5_Website_Issues.md
@@ -0,0 +1,14 @@
+---
+name: "๐ Website Issue"
+about: Report an issue with the website.
+title: "๐ Website Issue | "
+labels: ๐ website issue, high priority
+---
+
+## Description
+
+
diff --git a/.github/PULL_REQUEST_TEMPLATE.md b/.github/PULL_REQUEST_TEMPLATE.md
index 497292ee..e2c31e15 100644
--- a/.github/PULL_REQUEST_TEMPLATE.md
+++ b/.github/PULL_REQUEST_TEMPLATE.md
@@ -1,9 +1,11 @@
-### Description
+
+## Description
+Resolves: #none
-### HTML Preview
+
diff --git a/.gitignore b/.gitignore
new file mode 100644
index 00000000..af408d27
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,5 @@
+_site/
+Gemfile
+Gemfile.lock
+.sass-cache/
+.DS_Store
diff --git a/.htaccess b/.htaccess
deleted file mode 100644
index 7e10b6df..00000000
--- a/.htaccess
+++ /dev/null
@@ -1,10 +0,0 @@
-Options +FollowSymLinks
-RewriteEngine On
-
-RewriteCond %{HTTP:X-Forwarded-Proto} =http
-RewriteRule ^ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301]
-
-RewriteCond %{HTTP_HOST} !^www\.privacytools\.io$
-RewriteRule ^(.*)$ https://www.privacytools.io/$1 [L,R=301]
-
-RewriteRule ^pw.php$ /password.html [R=301,L]
\ No newline at end of file
diff --git a/404.html b/404.html
new file mode 100644
index 00000000..7d7cf9b7
--- /dev/null
+++ b/404.html
@@ -0,0 +1,14 @@
+---
+layout: default
+active_page: 404
+---
+
+
+
404
+
Page not found :(
+
We're redirecting you to the home page in 5 seconds. It this doesn't work, click here.
+
+
+
diff --git a/CNAME b/CNAME
new file mode 100644
index 00000000..916e25fe
--- /dev/null
+++ b/CNAME
@@ -0,0 +1 @@
+www.privacytools.io
\ No newline at end of file
diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md
deleted file mode 100644
index be7c6aa6..00000000
--- a/CONTRIBUTING.md
+++ /dev/null
@@ -1 +0,0 @@
-Please refer to the **Contributing** and **Contributing Guidelines** sections of our [readme](https://github.com/privacytoolsIO/privacytools.io/blob/master/README.md) for the most up-to-date guidelines. Thank you.
diff --git a/Gemfile b/Gemfile
new file mode 100644
index 00000000..70f8d954
--- /dev/null
+++ b/Gemfile
@@ -0,0 +1,16 @@
+source "https://rubygems.org"
+
+# Install github-pages gem (https://jekyllrb.com/docs/github-pages/)
+gem "github-pages", group: :jekyll_plugins
+
+# Plugins
+group :jekyll_plugins do
+ # example: gem "jekyll-feed", "~> 0.6"
+end
+
+# Windows does not include zoneinfo files, so bundle the tzinfo-data gem
+gem "tzinfo-data", platforms: [:mingw, :mswin, :x64_mingw, :jruby]
+
+# Performance-booster for watching directories on Windows
+gem "wdm", "~> 0.1.0" if Gem.win_platform?
+
diff --git a/LICENSE.txt b/LICENSE.txt
index 30ace6a8..5c93f456 100644
--- a/LICENSE.txt
+++ b/LICENSE.txt
@@ -1,674 +1,13 @@
- GNU GENERAL PUBLIC LICENSE
- Version 3, 29 June 2007
+ DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
+ Version 2, December 2004
- Copyright (C) 2007 Free Software Foundation, Inc.
- Everyone is permitted to copy and distribute verbatim copies
- of this license document, but changing it is not allowed.
+ Copyright (C) 2004 Sam Hocevar
- Preamble
+ Everyone is permitted to copy and distribute verbatim or modified
+ copies of this license document, and changing it is allowed as long
+ as the name is changed.
- The GNU General Public License is a free, copyleft license for
-software and other kinds of works.
+ DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
+ TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
- The licenses for most software and other practical works are designed
-to take away your freedom to share and change the works. By contrast,
-the GNU General Public License is intended to guarantee your freedom to
-share and change all versions of a program--to make sure it remains free
-software for all its users. We, the Free Software Foundation, use the
-GNU General Public License for most of our software; it applies also to
-any other work released this way by its authors. You can apply it to
-your programs, too.
-
- When we speak of free software, we are referring to freedom, not
-price. Our General Public Licenses are designed to make sure that you
-have the freedom to distribute copies of free software (and charge for
-them if you wish), that you receive source code or can get it if you
-want it, that you can change the software or use pieces of it in new
-free programs, and that you know you can do these things.
-
- To protect your rights, we need to prevent others from denying you
-these rights or asking you to surrender the rights. Therefore, you have
-certain responsibilities if you distribute copies of the software, or if
-you modify it: responsibilities to respect the freedom of others.
-
- For example, if you distribute copies of such a program, whether
-gratis or for a fee, you must pass on to the recipients the same
-freedoms that you received. You must make sure that they, too, receive
-or can get the source code. And you must show them these terms so they
-know their rights.
-
- Developers that use the GNU GPL protect your rights with two steps:
-(1) assert copyright on the software, and (2) offer you this License
-giving you legal permission to copy, distribute and/or modify it.
-
- For the developers' and authors' protection, the GPL clearly explains
-that there is no warranty for this free software. For both users' and
-authors' sake, the GPL requires that modified versions be marked as
-changed, so that their problems will not be attributed erroneously to
-authors of previous versions.
-
- Some devices are designed to deny users access to install or run
-modified versions of the software inside them, although the manufacturer
-can do so. This is fundamentally incompatible with the aim of
-protecting users' freedom to change the software. The systematic
-pattern of such abuse occurs in the area of products for individuals to
-use, which is precisely where it is most unacceptable. Therefore, we
-have designed this version of the GPL to prohibit the practice for those
-products. If such problems arise substantially in other domains, we
-stand ready to extend this provision to those domains in future versions
-of the GPL, as needed to protect the freedom of users.
-
- Finally, every program is threatened constantly by software patents.
-States should not allow patents to restrict development and use of
-software on general-purpose computers, but in those that do, we wish to
-avoid the special danger that patents applied to a free program could
-make it effectively proprietary. To prevent this, the GPL assures that
-patents cannot be used to render the program non-free.
-
- The precise terms and conditions for copying, distribution and
-modification follow.
-
- TERMS AND CONDITIONS
-
- 0. Definitions.
-
- "This License" refers to version 3 of the GNU General Public License.
-
- "Copyright" also means copyright-like laws that apply to other kinds of
-works, such as semiconductor masks.
-
- "The Program" refers to any copyrightable work licensed under this
-License. Each licensee is addressed as "you". "Licensees" and
-"recipients" may be individuals or organizations.
-
- To "modify" a work means to copy from or adapt all or part of the work
-in a fashion requiring copyright permission, other than the making of an
-exact copy. The resulting work is called a "modified version" of the
-earlier work or a work "based on" the earlier work.
-
- A "covered work" means either the unmodified Program or a work based
-on the Program.
-
- To "propagate" a work means to do anything with it that, without
-permission, would make you directly or secondarily liable for
-infringement under applicable copyright law, except executing it on a
-computer or modifying a private copy. Propagation includes copying,
-distribution (with or without modification), making available to the
-public, and in some countries other activities as well.
-
- To "convey" a work means any kind of propagation that enables other
-parties to make or receive copies. Mere interaction with a user through
-a computer network, with no transfer of a copy, is not conveying.
-
- An interactive user interface displays "Appropriate Legal Notices"
-to the extent that it includes a convenient and prominently visible
-feature that (1) displays an appropriate copyright notice, and (2)
-tells the user that there is no warranty for the work (except to the
-extent that warranties are provided), that licensees may convey the
-work under this License, and how to view a copy of this License. If
-the interface presents a list of user commands or options, such as a
-menu, a prominent item in the list meets this criterion.
-
- 1. Source Code.
-
- The "source code" for a work means the preferred form of the work
-for making modifications to it. "Object code" means any non-source
-form of a work.
-
- A "Standard Interface" means an interface that either is an official
-standard defined by a recognized standards body, or, in the case of
-interfaces specified for a particular programming language, one that
-is widely used among developers working in that language.
-
- The "System Libraries" of an executable work include anything, other
-than the work as a whole, that (a) is included in the normal form of
-packaging a Major Component, but which is not part of that Major
-Component, and (b) serves only to enable use of the work with that
-Major Component, or to implement a Standard Interface for which an
-implementation is available to the public in source code form. A
-"Major Component", in this context, means a major essential component
-(kernel, window system, and so on) of the specific operating system
-(if any) on which the executable work runs, or a compiler used to
-produce the work, or an object code interpreter used to run it.
-
- The "Corresponding Source" for a work in object code form means all
-the source code needed to generate, install, and (for an executable
-work) run the object code and to modify the work, including scripts to
-control those activities. However, it does not include the work's
-System Libraries, or general-purpose tools or generally available free
-programs which are used unmodified in performing those activities but
-which are not part of the work. For example, Corresponding Source
-includes interface definition files associated with source files for
-the work, and the source code for shared libraries and dynamically
-linked subprograms that the work is specifically designed to require,
-such as by intimate data communication or control flow between those
-subprograms and other parts of the work.
-
- The Corresponding Source need not include anything that users
-can regenerate automatically from other parts of the Corresponding
-Source.
-
- The Corresponding Source for a work in source code form is that
-same work.
-
- 2. Basic Permissions.
-
- All rights granted under this License are granted for the term of
-copyright on the Program, and are irrevocable provided the stated
-conditions are met. This License explicitly affirms your unlimited
-permission to run the unmodified Program. The output from running a
-covered work is covered by this License only if the output, given its
-content, constitutes a covered work. This License acknowledges your
-rights of fair use or other equivalent, as provided by copyright law.
-
- You may make, run and propagate covered works that you do not
-convey, without conditions so long as your license otherwise remains
-in force. You may convey covered works to others for the sole purpose
-of having them make modifications exclusively for you, or provide you
-with facilities for running those works, provided that you comply with
-the terms of this License in conveying all material for which you do
-not control copyright. Those thus making or running the covered works
-for you must do so exclusively on your behalf, under your direction
-and control, on terms that prohibit them from making any copies of
-your copyrighted material outside their relationship with you.
-
- Conveying under any other circumstances is permitted solely under
-the conditions stated below. Sublicensing is not allowed; section 10
-makes it unnecessary.
-
- 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
-
- No covered work shall be deemed part of an effective technological
-measure under any applicable law fulfilling obligations under article
-11 of the WIPO copyright treaty adopted on 20 December 1996, or
-similar laws prohibiting or restricting circumvention of such
-measures.
-
- When you convey a covered work, you waive any legal power to forbid
-circumvention of technological measures to the extent such circumvention
-is effected by exercising rights under this License with respect to
-the covered work, and you disclaim any intention to limit operation or
-modification of the work as a means of enforcing, against the work's
-users, your or third parties' legal rights to forbid circumvention of
-technological measures.
-
- 4. Conveying Verbatim Copies.
-
- You may convey verbatim copies of the Program's source code as you
-receive it, in any medium, provided that you conspicuously and
-appropriately publish on each copy an appropriate copyright notice;
-keep intact all notices stating that this License and any
-non-permissive terms added in accord with section 7 apply to the code;
-keep intact all notices of the absence of any warranty; and give all
-recipients a copy of this License along with the Program.
-
- You may charge any price or no price for each copy that you convey,
-and you may offer support or warranty protection for a fee.
-
- 5. Conveying Modified Source Versions.
-
- You may convey a work based on the Program, or the modifications to
-produce it from the Program, in the form of source code under the
-terms of section 4, provided that you also meet all of these conditions:
-
- a) The work must carry prominent notices stating that you modified
- it, and giving a relevant date.
-
- b) The work must carry prominent notices stating that it is
- released under this License and any conditions added under section
- 7. This requirement modifies the requirement in section 4 to
- "keep intact all notices".
-
- c) You must license the entire work, as a whole, under this
- License to anyone who comes into possession of a copy. This
- License will therefore apply, along with any applicable section 7
- additional terms, to the whole of the work, and all its parts,
- regardless of how they are packaged. This License gives no
- permission to license the work in any other way, but it does not
- invalidate such permission if you have separately received it.
-
- d) If the work has interactive user interfaces, each must display
- Appropriate Legal Notices; however, if the Program has interactive
- interfaces that do not display Appropriate Legal Notices, your
- work need not make them do so.
-
- A compilation of a covered work with other separate and independent
-works, which are not by their nature extensions of the covered work,
-and which are not combined with it such as to form a larger program,
-in or on a volume of a storage or distribution medium, is called an
-"aggregate" if the compilation and its resulting copyright are not
-used to limit the access or legal rights of the compilation's users
-beyond what the individual works permit. Inclusion of a covered work
-in an aggregate does not cause this License to apply to the other
-parts of the aggregate.
-
- 6. Conveying Non-Source Forms.
-
- You may convey a covered work in object code form under the terms
-of sections 4 and 5, provided that you also convey the
-machine-readable Corresponding Source under the terms of this License,
-in one of these ways:
-
- a) Convey the object code in, or embodied in, a physical product
- (including a physical distribution medium), accompanied by the
- Corresponding Source fixed on a durable physical medium
- customarily used for software interchange.
-
- b) Convey the object code in, or embodied in, a physical product
- (including a physical distribution medium), accompanied by a
- written offer, valid for at least three years and valid for as
- long as you offer spare parts or customer support for that product
- model, to give anyone who possesses the object code either (1) a
- copy of the Corresponding Source for all the software in the
- product that is covered by this License, on a durable physical
- medium customarily used for software interchange, for a price no
- more than your reasonable cost of physically performing this
- conveying of source, or (2) access to copy the
- Corresponding Source from a network server at no charge.
-
- c) Convey individual copies of the object code with a copy of the
- written offer to provide the Corresponding Source. This
- alternative is allowed only occasionally and noncommercially, and
- only if you received the object code with such an offer, in accord
- with subsection 6b.
-
- d) Convey the object code by offering access from a designated
- place (gratis or for a charge), and offer equivalent access to the
- Corresponding Source in the same way through the same place at no
- further charge. You need not require recipients to copy the
- Corresponding Source along with the object code. If the place to
- copy the object code is a network server, the Corresponding Source
- may be on a different server (operated by you or a third party)
- that supports equivalent copying facilities, provided you maintain
- clear directions next to the object code saying where to find the
- Corresponding Source. Regardless of what server hosts the
- Corresponding Source, you remain obligated to ensure that it is
- available for as long as needed to satisfy these requirements.
-
- e) Convey the object code using peer-to-peer transmission, provided
- you inform other peers where the object code and Corresponding
- Source of the work are being offered to the general public at no
- charge under subsection 6d.
-
- A separable portion of the object code, whose source code is excluded
-from the Corresponding Source as a System Library, need not be
-included in conveying the object code work.
-
- A "User Product" is either (1) a "consumer product", which means any
-tangible personal property which is normally used for personal, family,
-or household purposes, or (2) anything designed or sold for incorporation
-into a dwelling. In determining whether a product is a consumer product,
-doubtful cases shall be resolved in favor of coverage. For a particular
-product received by a particular user, "normally used" refers to a
-typical or common use of that class of product, regardless of the status
-of the particular user or of the way in which the particular user
-actually uses, or expects or is expected to use, the product. A product
-is a consumer product regardless of whether the product has substantial
-commercial, industrial or non-consumer uses, unless such uses represent
-the only significant mode of use of the product.
-
- "Installation Information" for a User Product means any methods,
-procedures, authorization keys, or other information required to install
-and execute modified versions of a covered work in that User Product from
-a modified version of its Corresponding Source. The information must
-suffice to ensure that the continued functioning of the modified object
-code is in no case prevented or interfered with solely because
-modification has been made.
-
- If you convey an object code work under this section in, or with, or
-specifically for use in, a User Product, and the conveying occurs as
-part of a transaction in which the right of possession and use of the
-User Product is transferred to the recipient in perpetuity or for a
-fixed term (regardless of how the transaction is characterized), the
-Corresponding Source conveyed under this section must be accompanied
-by the Installation Information. But this requirement does not apply
-if neither you nor any third party retains the ability to install
-modified object code on the User Product (for example, the work has
-been installed in ROM).
-
- The requirement to provide Installation Information does not include a
-requirement to continue to provide support service, warranty, or updates
-for a work that has been modified or installed by the recipient, or for
-the User Product in which it has been modified or installed. Access to a
-network may be denied when the modification itself materially and
-adversely affects the operation of the network or violates the rules and
-protocols for communication across the network.
-
- Corresponding Source conveyed, and Installation Information provided,
-in accord with this section must be in a format that is publicly
-documented (and with an implementation available to the public in
-source code form), and must require no special password or key for
-unpacking, reading or copying.
-
- 7. Additional Terms.
-
- "Additional permissions" are terms that supplement the terms of this
-License by making exceptions from one or more of its conditions.
-Additional permissions that are applicable to the entire Program shall
-be treated as though they were included in this License, to the extent
-that they are valid under applicable law. If additional permissions
-apply only to part of the Program, that part may be used separately
-under those permissions, but the entire Program remains governed by
-this License without regard to the additional permissions.
-
- When you convey a copy of a covered work, you may at your option
-remove any additional permissions from that copy, or from any part of
-it. (Additional permissions may be written to require their own
-removal in certain cases when you modify the work.) You may place
-additional permissions on material, added by you to a covered work,
-for which you have or can give appropriate copyright permission.
-
- Notwithstanding any other provision of this License, for material you
-add to a covered work, you may (if authorized by the copyright holders of
-that material) supplement the terms of this License with terms:
-
- a) Disclaiming warranty or limiting liability differently from the
- terms of sections 15 and 16 of this License; or
-
- b) Requiring preservation of specified reasonable legal notices or
- author attributions in that material or in the Appropriate Legal
- Notices displayed by works containing it; or
-
- c) Prohibiting misrepresentation of the origin of that material, or
- requiring that modified versions of such material be marked in
- reasonable ways as different from the original version; or
-
- d) Limiting the use for publicity purposes of names of licensors or
- authors of the material; or
-
- e) Declining to grant rights under trademark law for use of some
- trade names, trademarks, or service marks; or
-
- f) Requiring indemnification of licensors and authors of that
- material by anyone who conveys the material (or modified versions of
- it) with contractual assumptions of liability to the recipient, for
- any liability that these contractual assumptions directly impose on
- those licensors and authors.
-
- All other non-permissive additional terms are considered "further
-restrictions" within the meaning of section 10. If the Program as you
-received it, or any part of it, contains a notice stating that it is
-governed by this License along with a term that is a further
-restriction, you may remove that term. If a license document contains
-a further restriction but permits relicensing or conveying under this
-License, you may add to a covered work material governed by the terms
-of that license document, provided that the further restriction does
-not survive such relicensing or conveying.
-
- If you add terms to a covered work in accord with this section, you
-must place, in the relevant source files, a statement of the
-additional terms that apply to those files, or a notice indicating
-where to find the applicable terms.
-
- Additional terms, permissive or non-permissive, may be stated in the
-form of a separately written license, or stated as exceptions;
-the above requirements apply either way.
-
- 8. Termination.
-
- You may not propagate or modify a covered work except as expressly
-provided under this License. Any attempt otherwise to propagate or
-modify it is void, and will automatically terminate your rights under
-this License (including any patent licenses granted under the third
-paragraph of section 11).
-
- However, if you cease all violation of this License, then your
-license from a particular copyright holder is reinstated (a)
-provisionally, unless and until the copyright holder explicitly and
-finally terminates your license, and (b) permanently, if the copyright
-holder fails to notify you of the violation by some reasonable means
-prior to 60 days after the cessation.
-
- Moreover, your license from a particular copyright holder is
-reinstated permanently if the copyright holder notifies you of the
-violation by some reasonable means, this is the first time you have
-received notice of violation of this License (for any work) from that
-copyright holder, and you cure the violation prior to 30 days after
-your receipt of the notice.
-
- Termination of your rights under this section does not terminate the
-licenses of parties who have received copies or rights from you under
-this License. If your rights have been terminated and not permanently
-reinstated, you do not qualify to receive new licenses for the same
-material under section 10.
-
- 9. Acceptance Not Required for Having Copies.
-
- You are not required to accept this License in order to receive or
-run a copy of the Program. Ancillary propagation of a covered work
-occurring solely as a consequence of using peer-to-peer transmission
-to receive a copy likewise does not require acceptance. However,
-nothing other than this License grants you permission to propagate or
-modify any covered work. These actions infringe copyright if you do
-not accept this License. Therefore, by modifying or propagating a
-covered work, you indicate your acceptance of this License to do so.
-
- 10. Automatic Licensing of Downstream Recipients.
-
- Each time you convey a covered work, the recipient automatically
-receives a license from the original licensors, to run, modify and
-propagate that work, subject to this License. You are not responsible
-for enforcing compliance by third parties with this License.
-
- An "entity transaction" is a transaction transferring control of an
-organization, or substantially all assets of one, or subdividing an
-organization, or merging organizations. If propagation of a covered
-work results from an entity transaction, each party to that
-transaction who receives a copy of the work also receives whatever
-licenses to the work the party's predecessor in interest had or could
-give under the previous paragraph, plus a right to possession of the
-Corresponding Source of the work from the predecessor in interest, if
-the predecessor has it or can get it with reasonable efforts.
-
- You may not impose any further restrictions on the exercise of the
-rights granted or affirmed under this License. For example, you may
-not impose a license fee, royalty, or other charge for exercise of
-rights granted under this License, and you may not initiate litigation
-(including a cross-claim or counterclaim in a lawsuit) alleging that
-any patent claim is infringed by making, using, selling, offering for
-sale, or importing the Program or any portion of it.
-
- 11. Patents.
-
- A "contributor" is a copyright holder who authorizes use under this
-License of the Program or a work on which the Program is based. The
-work thus licensed is called the contributor's "contributor version".
-
- A contributor's "essential patent claims" are all patent claims
-owned or controlled by the contributor, whether already acquired or
-hereafter acquired, that would be infringed by some manner, permitted
-by this License, of making, using, or selling its contributor version,
-but do not include claims that would be infringed only as a
-consequence of further modification of the contributor version. For
-purposes of this definition, "control" includes the right to grant
-patent sublicenses in a manner consistent with the requirements of
-this License.
-
- Each contributor grants you a non-exclusive, worldwide, royalty-free
-patent license under the contributor's essential patent claims, to
-make, use, sell, offer for sale, import and otherwise run, modify and
-propagate the contents of its contributor version.
-
- In the following three paragraphs, a "patent license" is any express
-agreement or commitment, however denominated, not to enforce a patent
-(such as an express permission to practice a patent or covenant not to
-sue for patent infringement). To "grant" such a patent license to a
-party means to make such an agreement or commitment not to enforce a
-patent against the party.
-
- If you convey a covered work, knowingly relying on a patent license,
-and the Corresponding Source of the work is not available for anyone
-to copy, free of charge and under the terms of this License, through a
-publicly available network server or other readily accessible means,
-then you must either (1) cause the Corresponding Source to be so
-available, or (2) arrange to deprive yourself of the benefit of the
-patent license for this particular work, or (3) arrange, in a manner
-consistent with the requirements of this License, to extend the patent
-license to downstream recipients. "Knowingly relying" means you have
-actual knowledge that, but for the patent license, your conveying the
-covered work in a country, or your recipient's use of the covered work
-in a country, would infringe one or more identifiable patents in that
-country that you have reason to believe are valid.
-
- If, pursuant to or in connection with a single transaction or
-arrangement, you convey, or propagate by procuring conveyance of, a
-covered work, and grant a patent license to some of the parties
-receiving the covered work authorizing them to use, propagate, modify
-or convey a specific copy of the covered work, then the patent license
-you grant is automatically extended to all recipients of the covered
-work and works based on it.
-
- A patent license is "discriminatory" if it does not include within
-the scope of its coverage, prohibits the exercise of, or is
-conditioned on the non-exercise of one or more of the rights that are
-specifically granted under this License. You may not convey a covered
-work if you are a party to an arrangement with a third party that is
-in the business of distributing software, under which you make payment
-to the third party based on the extent of your activity of conveying
-the work, and under which the third party grants, to any of the
-parties who would receive the covered work from you, a discriminatory
-patent license (a) in connection with copies of the covered work
-conveyed by you (or copies made from those copies), or (b) primarily
-for and in connection with specific products or compilations that
-contain the covered work, unless you entered into that arrangement,
-or that patent license was granted, prior to 28 March 2007.
-
- Nothing in this License shall be construed as excluding or limiting
-any implied license or other defenses to infringement that may
-otherwise be available to you under applicable patent law.
-
- 12. No Surrender of Others' Freedom.
-
- If conditions are imposed on you (whether by court order, agreement or
-otherwise) that contradict the conditions of this License, they do not
-excuse you from the conditions of this License. If you cannot convey a
-covered work so as to satisfy simultaneously your obligations under this
-License and any other pertinent obligations, then as a consequence you may
-not convey it at all. For example, if you agree to terms that obligate you
-to collect a royalty for further conveying from those to whom you convey
-the Program, the only way you could satisfy both those terms and this
-License would be to refrain entirely from conveying the Program.
-
- 13. Use with the GNU Affero General Public License.
-
- Notwithstanding any other provision of this License, you have
-permission to link or combine any covered work with a work licensed
-under version 3 of the GNU Affero General Public License into a single
-combined work, and to convey the resulting work. The terms of this
-License will continue to apply to the part which is the covered work,
-but the special requirements of the GNU Affero General Public License,
-section 13, concerning interaction through a network will apply to the
-combination as such.
-
- 14. Revised Versions of this License.
-
- The Free Software Foundation may publish revised and/or new versions of
-the GNU General Public License from time to time. Such new versions will
-be similar in spirit to the present version, but may differ in detail to
-address new problems or concerns.
-
- Each version is given a distinguishing version number. If the
-Program specifies that a certain numbered version of the GNU General
-Public License "or any later version" applies to it, you have the
-option of following the terms and conditions either of that numbered
-version or of any later version published by the Free Software
-Foundation. If the Program does not specify a version number of the
-GNU General Public License, you may choose any version ever published
-by the Free Software Foundation.
-
- If the Program specifies that a proxy can decide which future
-versions of the GNU General Public License can be used, that proxy's
-public statement of acceptance of a version permanently authorizes you
-to choose that version for the Program.
-
- Later license versions may give you additional or different
-permissions. However, no additional obligations are imposed on any
-author or copyright holder as a result of your choosing to follow a
-later version.
-
- 15. Disclaimer of Warranty.
-
- THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
-APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
-HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
-OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
-THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
-PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
-IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
-ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-
- 16. Limitation of Liability.
-
- IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
-WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
-THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
-GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
-USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
-DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
-PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
-EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
-SUCH DAMAGES.
-
- 17. Interpretation of Sections 15 and 16.
-
- If the disclaimer of warranty and limitation of liability provided
-above cannot be given local legal effect according to their terms,
-reviewing courts shall apply local law that most closely approximates
-an absolute waiver of all civil liability in connection with the
-Program, unless a warranty or assumption of liability accompanies a
-copy of the Program in return for a fee.
-
- END OF TERMS AND CONDITIONS
-
- How to Apply These Terms to Your New Programs
-
- If you develop a new program, and you want it to be of the greatest
-possible use to the public, the best way to achieve this is to make it
-free software which everyone can redistribute and change under these terms.
-
- To do so, attach the following notices to the program. It is safest
-to attach them to the start of each source file to most effectively
-state the exclusion of warranty; and each file should have at least
-the "copyright" line and a pointer to where the full notice is found.
-
- {one line to give the program's name and a brief idea of what it does.}
- Copyright (C) {year} {name of author}
-
- This program is free software: you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation, either version 3 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program. If not, see .
-
-Also add information on how to contact you by electronic and paper mail.
-
- If the program does terminal interaction, make it output a short
-notice like this when it starts in an interactive mode:
-
- {project} Copyright (C) {year} {fullname}
- This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
- This is free software, and you are welcome to redistribute it
- under certain conditions; type `show c' for details.
-
-The hypothetical commands `show w' and `show c' should show the appropriate
-parts of the General Public License. Of course, your program's commands
-might be different; for a GUI interface, you would use an "about box".
-
- You should also get your employer (if you work as a programmer) or school,
-if any, to sign a "copyright disclaimer" for the program, if necessary.
-For more information on this, and how to apply and follow the GNU GPL, see
-.
-
- The GNU General Public License does not permit incorporating your program
-into proprietary programs. If your program is a subroutine library, you
-may consider it more useful to permit linking proprietary applications with
-the library. If this is what you want to do, use the GNU Lesser General
-Public License instead of this License. But first, please read
-.
\ No newline at end of file
+ 0. You just DO WHAT THE FUCK YOU WANT TO.
diff --git a/README.md b/README.md
index ecc86510..e3f2af9a 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,4 @@
-[](https://www.privacytools.io/)
+[](https://www.privacytools.io/)
_Encryption Against Global Mass Surveillance._
@@ -8,47 +8,28 @@ It's important for a website like privacytools.io to be up-to-date. Keep an eye
**Talk to us please.** Join our [subreddit](https://www.reddit.com/r/privacytoolsIO/) and start a discussion. This is a community project and we're aiming to deliver the best information available for a better privacy. We are also using [/r/privacy](https://www.reddit.com/r/privacy). Thank you for participating.
-You can submit your suggestions here on GitHub [(Issues)](https://github.com/privacytoolsIO/privacytools.io/issues) and also in our [subreddit](https://www.reddit.com/r/privacytoolsIO/). Thank you.
+You can submit your suggestions here on GitHub [(Issues)](https://github.com/privacytoolsIO/privacytools.io/issues) and also in our [subreddit](https://www.reddit.com/r/privacytoolsIO/). Please refer to the [Contributing Guidelines](.github/CONTRIBUTING.md) before submitting. Thank you.
+## Building
-# Contributing Guidelines
-Please read this before contributing.
-
-## Rules
-
-- Be nice and respectful.
-- English only.
-- Be constructive.
-
-## Quality over Quantity
-
-We're trying to keep it simple and promote the best tools, not all of them. Maximum are three software choices, but it's possible to add more under "Worth Mentioning" headlines. ([example](https://www.privacytools.io/#im))
-
-## Software Criteria
-
-- Open Source
-- Cross-platform
-- Easy to use
-- Privacy respecting
-
-There can be exeptions if no software is available that meet the criteria.
-
-## Images
-
-- Provider logos should be exactly 200 x 70 ([example](https://www.privacytools.io/img/provider/AirVPN.gif))
-- Tool logos should be exactly 120 x 120 ([example](https://www.privacytools.io/img/tools/ChatSecure.png))
+1. Install [Ruby](https://www.ruby-lang.org/en/documentation/installation/)
+1. Install [bundler](https://bundler.io/) by running `gem install bundler`.
+1. Run `bundle install` to install the required dependencies.
+1. Use `bundle exec jekyll build` to build the website. The output can be found in the `_site` directory. Live preview is also possible by running `bundle exec jekyll serve`
# Support privacytools.io
-- [Donate.](https://www.privacytools.io/donate.html)
-- [Spread the word.](https://www.privacytools.io/#participate)
+- [Donate.](https://privacytoolsio.github.io/privacytools.io/donate.html)
+- [Spread the word.](https://privacytoolsio.github.io/privacytools.io/#participate)
- [Make suggestions on reddit.](https://www.reddit.com/r/privacytoolsIO/)
- View and edit our website source code here on GitHub.
# Community Translations
-- [็นไฝไธญๆ / Chinese](https://github.com/twngo/privacytools-zh) - [GitHub](https://github.com/twngo/privacytools-zh)
+- [็นไฝไธญๆ / Chinese](https://privacytools.twngo.xyz/) - [GitHub](https://github.com/twngo/privacytools-zh)
- [Espaรฑol / Spanish](https://victorhck.gitlab.io/privacytools-es/) - [GitLab](https://gitlab.com/victorhck/privacytools-es)
- [Deutsch / German](https://privacytools.it-sec.rocks/) - [GitHub](https://github.com/Anon215/privacytools.it-sec.rocks)
+- [Italiano / Italian](https://privacytools-it.github.io/) - [GitHub](https://github.com/privacytools-it/privacytools-it.github.io)
+- [ะ ัััะบะธะน / Russian](https://privacytools.ru) - [GitHub](https://github.com/c0rdis/privacytools.ru)
# License
-[GNU General Public License v3.0](https://github.com/privacytoolsIO/privacytools.io/blob/master/LICENSE.txt)
+[Do What The Fuck You Want To Public License](https://github.com/privacytoolsIO/privacytools.io/blob/master/LICENSE.txt)
diff --git a/_config.yml b/_config.yml
new file mode 100644
index 00000000..ce7b8c2c
--- /dev/null
+++ b/_config.yml
@@ -0,0 +1,9 @@
+title: Privacy Tools - Encryption Against Global Mass Surveillance
+description: You are being watched! Knowledge, encryption and privacy tools to protect you against global mass surveillance.
+url: "https://privacytools.io"
+sass:
+ style: compressed
+plugins:
+ - jekyll-sitemap
+sitemap:
+file: "/sitemap.xml"
diff --git a/_includes/card.html b/_includes/card.html
new file mode 100644
index 00000000..11847f44
--- /dev/null
+++ b/_includes/card.html
@@ -0,0 +1,53 @@
+
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.
-
- Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a
- pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I
- want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes,
- focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each otherโs citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third party countries can and do
- spy on each other.
-
-
-
-
-
-
-
-
-
Five Eyes
-
-
- 1. Australia
- 2. Canada
- 3. New Zealand
- 4. United Kingdom
- 5. United States of America
-
-
-
-
-
-
-
Nine Eyes
-
-
- 6. Denmark
- 7. France
- 8. Netherlands
- 9. Norway
-
-
-
-
-
-
-
-
Fourteen Eyes
-
-
- 10. Belgium
- 11. Germany
- 12. Italy
- 13. Spain
- 14. Sweden
-
-
-
-
-
-
-
-
Why is it not recommended to choose a US based service?
-
-
-
-
Services based in the United States are not recommended because of the countryโs surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which
- forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and
- transform the service into a tool of mass surveillance.
-
-
An example of this is Lavabit โ a discontinued secure email service created by Ladar Levison. The FBI requested Snowdenโs records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the serviceโs SSL keys. Having the SSL keys would allow them to access
- communications (both metadata and unencrypted content) in real time for all of Lavabitโs customers, not just Snowden's.
-
-
Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest,
- saying that shutting down the service was a violation of the court order.
- Note: Using a VPN provider will not make you anonymous. But it will give you a better privacy. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.
-
A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has
- received such a subpoena and should stop using the service.
Firefox is fast, reliable, open source and respects your privacy. Don't forget to adjust the settings according to our
- recommendations: WebRTC and about:config and get the privacy add-ons.
The new open source browser "Brave" automatically blocks ads and trackers, making it faster and safer than your current browser. Brave is based on Chromium.
Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, it comes with pre-installed privacy add-ons, encryption and an advanced
- proxy.
-
Browser Fingerprint - Is your browser configuration unique?
-
-
-
-
- Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.
-
-
-
-
-
-
-
When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using
- cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.
You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should
- have a spoofed user agent string to match what the large userbase has. You need have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to
- look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.
-
-
-
Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger, uBlock Origin and Disconnect.
- They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
BrowserLeaks.com - Web browser security testing tools, that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.
-
-
-
-
-
-
WebRTC IP Leak Test - Is your IP address leaking?
-
-
-
-
- WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.
-
-
-
-
While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.
- Improve your privacy with these excellent Firefox add-ons.
-
-
-
-
-
Stop Tracking with "Privacy Badger"
-
-
Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. Privacy Badger learns about trackers as you browse by inspecting external resources websites request.
-
- https://www.eff.org/privacybadger/
-
-
Block Ads and Trackers with "uBlock Origin"
-
-
An efficient wide-spectrum-blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and
- is completely open source. We recommend Firefox but uBlock Origin also works in other browsers such as Safari, Opera, and Chromium. Unlike AdBlock Plus, uBlock does not allow so-called "acceptable ads".
-
- https://addons.mozilla.org/firefox/addon/ublock-origin/
-
-
-
-
-
Automatically Delete Cookies with "Self-Destructing Cookies"
A Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation.
-
- https://www.eff.org/https-everywhere
-
-
Block Content Delivery Networks with "Decentraleyes"
-
-
Emulates Content Delivery Networks locally by intercepting requests, finding the required resource and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required. Source code: GitHub.
-
- https://addons.mozilla.org/firefox/addon/decentraleyes/
-
-
-
-
- The following add-ons require quite a lot of interaction from user to get things working. Some sites will not work properly until you have configured the add-ons.
-
-
-
Stop cross-site requests with "uMatrix"
-
-
Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix gives you control over the requests that websites make to other websites. This gives you greater and more fine grained control
- over the information that you leak online.
-
- https://addons.mozilla.org/firefox/addon/umatrix/
-
-
-
Be in total control with "NoScript Security Suite"
-
-
- Highly customizable plugin to selectively allow Javascript, Java, and Flash to run only on websites you trust. Not for casual users, it requires technical knowledge to configure.
-
- https://addons.mozilla.org/firefox/addon/noscript/
-
-
-
-
-
-
-
-
Firefox: Privacy Related "about:config" Tweaks
-
-
-
This is a collection of privacy related about:config tweaks. We'll show you how to enhance the privacy of your Firefox browser.
-
-
-
Preparation:
-
-
Enter "about:config" in the firefox address bar and press enter.
-
Press the button "I'll be careful, I promise!"
-
Follow the instructions below...
-
-
-
-
Getting started:
-
-
-
privacy.trackingprotection.enabled = true
-
-
This is Mozillaโs new built in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.
-
-
-
geo.enabled = false
-
-
Disables geolocation.
-
-
-
browser.safebrowsing.phishing.enabled = false
-
-
Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.
-
-
-
browser.safebrowsing.malware.enabled = false
-
-
Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.
-
-
-
dom.event.clipboardevents.enabled = false
-
-
Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
-
-
-
network.cookie.cookieBehavior = 1
-
-
Disable cookies
-
0 = Accept all cookies by default
-
1 = Only accept from the originating site (block third party cookies)
-
2 = Block all cookies by default
-
-
-
network.cookie.lifetimePolicy = 2
-
-
cookies are deleted at the end of the session
-
0 = Accept cookies normally
-
1 = Prompt for each cookie
-
2 = Accept for current session only
-
3 = Accept for N days
-
-
-
browser.cache.offline.enable = false
-
-
Disables offline cache.
-
-
-
browser.send_pings = false
-
-
The attribute would be useful for letting websites track visitorsโ clicks.
user.js Firefox hardening stuff - This is a user.js configuration file for Mozilla Firefox that's supposed to harden Firefox's settings and make it more secure.
-
Privacy Settings - A Firefox addon to alter built-in privacy settings easily with a toolbar panel.
-
-
-
-
-
Privacy-Conscious Email Providers - No Affiliates
-
-
-
- All providers listed here are operating outside the US and support SMTP TLS. The table is sortable. Never trust any company with your privacy, always encrypt.
-
-
-
-
-
-
-
-
Email Service
-
URL
-
Since
-
Server
-
Storage
-
Price / Year
-
Bitcoin
-
Encryption
-
Own Domain
-
-
-
-
-
-
-
-
-
-
-
-
-
-
2013
-
Switzerland
-
500 MB
-
Free
-
Accepted
-
Built-in
-
Yes
-
-
-
-
-
-
-
-
-
-
-
-
2011
-
Germany
-
1 GB
-
Free
-
No
-
Built-in
-
Yes
-
-
-
-
-
-
-
-
-
-
2013
-
Belgium
-
200 MB
-
Free
-
Accepted
-
Built-in
-
Yes
-
-
-
-
-
-
-
-
-
-
-
-
2014
-
Germany
-
2 GB
-
12 โฌ
-
Accepted
-
Built-in
-
Yes
-
-
-
-
-
-
-
-
-
-
-
2009
-
Germany
-
2 GB
-
12 โฌ
-
No
-
Built-in
-
No
-
-
-
-
-
-
-
-
-
-
-
1999
-
Norway
-
1 GB
-
$ 19.95
-
No
-
No
-
Yes
-
-
-
-
-
-
-
-
-
-
2003
-
Switzerland
-
1 GB
-
$ 49.95
-
Accepted
-
Built-in
-
Yes
-
-
-
-
-
-
-
-
-
-
2010
-
Sweden
-
500 MB
-
$ 59
-
Accepted
-
Built-in
-
Yes
-
-
-
-
-
-
-
-
-
-
2014
-
Netherlands
-
10 GB
-
$ 59.95
-
Accepted
-
Built-in
-
Yes
-
-
-
-
-
-
-
-
-
-
2010
-
Switzerland
-
2 GB
-
$ 60
-
Accepted
-
No
-
Yes
-
-
-
-
-
-
-
-
-
-
2001
-
Canada
-
200 MB
-
$ 66
-
No
-
Built-in
-
Yes
-
-
-
-
-
-
-
-
-
-
Interesting Email Providers Under Development
-
-
Confidant Mail - An open-source non-SMTP cryptographic email system optimized for large file attachments. It is a secure and spam-resistant alternative to regular email and online file drop services. It
- uses GNU Privacy Guard (GPG) for content encryption and authentication, and TLS 1.2 with ephemeral keys for transport encryption.
-
-
-
-
Become Your Own Email Provider with Mail-in-a-Box
-
-
Take it a step further and get control of your email with this easy-to-deploy mail server in a box. Mail-in-a-Box lets you become your own mail service provider in a few easy steps. Itโs sort of like making your own gmail, but one you control from top
- to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a working mail server. But you donโt need to be a technology expert to set it up. More: https://mailinabox.email/
-
-
Privacy Email Tools
-
-
gpg4usb - A very easy to use and small portable editor to encrypt and decrypt any text-message or -file. For Windows and Linux.
-
Mailvelope - A browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard.
-
Enigmail - A security extension to Thunderbird and Seamonkey. It enables you to write and receive email messages signed and/or encrypted with the OpenPGP standard.
-
TorBirdy - This extension configures Thunderbird to make connections over the Tor anonymity network.
-
Email Privacy Tester - This tool will send an Email to your address and perform privacy related tests.
-
-
-
Related Information
-
-
Aging โPrivacyโ Law Leaves Cloud E-Mail Open to Cops - Data stored in the cloud for longer than 6 months is considered abandoned and may be accessed by intelligence agencies without
- a warrant. Learning: Use an external email client like Thunderbird or Enigmail, download your emails and store them locally. Never leave them on the server.
Autistici/Inventati server compromised - The cryptographic services offered by the Autistici/Inventati server have been compromised on 15th June 2004. It was discovered on 21st June 2005. One year
- later. During an enquiry on a single mailbox, the Postal Police may have tapped for a whole year every user's private communication going through the server autistici.org/inventati.org.
-
-
-
-
-
Email Clients
-
-
-
-
-
-
-
Thunderbird
-
-
-
Mozilla Thunderbird is a free, open source, cross-platform email, news, and chat client developed by the Mozilla Foundation. Thunderbird is an email, newsgroup,
- news feed, and chat (XMPP, IRC, Twitter) client.
Claws Mail is a free and open source, GTK+-based email and news client. It offers easy configuration and an abundance of features. It is included with Gpg4win,
- an encryption suite for Windows.
Mailpile (Beta) - A modern, fast web-mail client with user-friendly encryption and privacy features.
-
-
-
-
-
Email Alternatives
-
-
-
-
-
-
-
I2P-Bote
-
-
-
I2P-Bote is a fully decentralized and distributed email system. It supports different identities and does not expose email headers. Currently (2015), it is still
- in beta version and can be accessed via its web application interface or IMAP and SMTP. All bote-mails are transparently end-to-end encrypted and, optionally, signed by the sender's private key.
Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless,
- meaning that you need-not inherently trust any entities like root certificate authorities. It uses strong authentication which means that the sender of a message cannot be spoofed, and it aims to hide "non-content" data.
Retroshare creates encrypted connections to your friends. Nobody can spy on you. Retroshare is completely decentralized. This means there are no central servers. It is entirely Open-Source and free. There are no costs, no ads and no Terms of Service.
- If you are currently using a search engines like Google, Bing or Yahoo you should pick an alternative here.
-
-
-
-
-
-
-
-
-
searx
-
-
-
An open source metasearch engine, aggregating the results of other search engines while not storing information about its users. No logs, no ads and no tracking.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Qwant
-
-
-
Qwant's philosophy is based on two principles: no user tracking and no filter bubble. Qwant was launched in France in February 2013. Privacy Policy.
- Google search link fix - Firefox extension that prevents Google and Yandex search pages from modifying search result links when you click them. This is useful when
- copying links but it also helps privacy by preventing the search engines from recording your clicks. (Open Source)
-
-
-
-
Worth Mentioning
-
-
- MetaGer - An open source metasearch engine, which is based in Germany. It focuses on protecting the user's privacy.
-
-
-
- ixquick.eu - Returns the top results from multiple search engines. Based in the Netherlands.
-
-
-
-
-
-
-
Encrypted Instant Messenger
-
-
-
- If you are currently using an Instant Messenger like WhatsApp, Viber, LINE, Telegram or Threema you should pick an alternative here.
-
-
-
-
-
-
-
Mobile: Signal
-
-
-
Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling.
- All communications are end-to-end encrypted. Signal is free and open source, enabling anyone to verify its security by auditing the code. The development team is supported by community donations and grants. There are no advertisements,
- and it doesn't cost anything to use.
Wire is an app developed by Wire Swiss GmbH.
- The Wire app allows users to exchange end-to-end encrypted instant messages, as well as make voice and video calls. Wire is free and open source, enabling anyone to verify its security by auditing the code.
- The development team is backed by Iconical and they will monetize in the future with premium features/services.
- Caution: The company keeps a list of all the users you contact until you delete your account.
Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with
- your contacts without revealing your location or IP address. Instead of a username, you get a unique address that looks like ricochet:rs7ce36jsj24ogfw. Other Ricochet users can use this address to send a contact request - asking to be
- added to your contacts list.
ChatSecure - ChatSecure is a free and open source messaging app that features OTR encryption over XMPP.
-
Cryptocat - Encrypted open source messenger. Supports file sharing and multiple devices. Available for Windows, Linux and Mac.
-
Kontalk - A community-driven instant messaging network. Supports end-to-end encryption. Both client-to-server and server-to-server channels are fully encrypted.
-
Conversations - An open source Jabber/XMPP client for Android 4.0+ smart phones. Supports end-to-end encryption with either OMEMO, OTR or openPGP.
- If you are currently using an Video & Voice Messenger like Skype, Viber or Google Hangouts you should pick an alternative here.
-
-
-
-
-
-
Mobile: Signal
-
-
-
-
Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling.
- All communications are end-to-end encrypted. Signal is free and open source, enabling anyone to verify its security by auditing the code. The development team is supported by community donations and grants. There are no advertisements,
- and it doesn't cost anything to use.
Wire is an app developed by Wire Swiss GmbH.
- The Wire app allows users to exchange end-to-end encrypted instant messages, as well as make voice and video calls. Wire is free and open source, enabling anyone to verify its security by auditing the code.
- The development team is backed by Iconical and they will monetize in the future with premium features/services.
- Caution: The company keeps a list of all the users you contact until you delete your account.
Linphone is an open source SIP Phone and a free voice over IP service, available on mobile and desktop environments and on web browsers. It supports ZRTP for
- end-to-end encrypted voice and video communication.
- If you are currently using a Cloud Storage Services like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud you should pick an alternative here.
-
-
-
-
-
-
-
Seafile - 100 GB Storage for $10/month
-
-
-
Seafile offers 100 GB Storage for $10/month but also gives you the opportunity to host on your own server. Your data is stored in Germany or with Amazon Web Service
- in the US for the cloud version. Encrypt files with your own password.
Similar functionally to the widely used Dropbox, with the difference being that Nextcloud is free and open-source, and thereby allowing anyone to install and operate it without charge on a private server, with no limits on storage space or the number of connected clients.
S4 (Simple Secure Storage Service) is Least Authority's verifiably secure off-site backup system for individuals and businesses. 100% client-side encryption and open
- source transparency. $25/month for unlimited storage. Servers are hosted with Amazon S3 in the US.
Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
-
-
-
-
-
Self-Hosted Cloud Server Software
-
-
- If you are currently using a Cloud Storage Services like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud you should think about hosting it on your own.
-
-
-
-
-
-
Seafile
-
-
-
Seafile is a file hosting software system. Files are stored on a central server and can by synchronized with personal computers and mobile devices via the Seafile
- client. Files can also be accessed via the server's web interface.
Pydio is open source software that turns instantly any server (on premise, NAS, cloud IaaS or PaaS) into a file sharing platform for your company. It is an alternative
- to SaaS Boxes and Drives, with more control, safety and privacy, and favorable TCOs.
Tahoe-LAFS is a Free and Open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are
- taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security.
- Nextcloud - Free and open-source, allows anyone to install and operate it for free on a private server, with no limits on storage space or the number of connected clients.
-
-
-
-
-
Secure File Sync Software
-
-
-
-
-
-
SparkleShare
-
-
-
SparkleShare creates a special folder on your computer. You can add remotely hosted folders (or "projects") to this folder. These projects will be automatically
- kept in sync with both the host and all of your peers when someone adds, removes or edits a file.
Syncany allows users to backup and share certain folders of their workstations using any kind of storage. Syncany is open-source and provides data encryption and
- incredible flexibility in terms of storage type and provider. Files are encrypted before uploading.
Syncthing replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to
- choose where it is stored, if it is shared with some third party and how it's transmitted over the Internet.
- git-annex - Allows managing files with git, without checking the file contents into git. While that may seem paradoxical, it is useful when dealing with files larger than git can currently easily handle,
- whether due to limitations in memory, time, or disk space.
-
-
-
-
-
Password Manager Software
-
-
- If you are currently using a password manager software like 1Password, LastPass, Roboform or iCloud Keychain you should pick an alternative here.
-
-
-
-
-
-
-
-
Master Password - Cross-platform
-
-
-
Master Password is based on an ingenious password generation algorithm that guarantees your passwords can never be lost. Its passwords aren't stored:
- they are generated on-demand from your name, the site and your master password. No syncing, backups or internet access needed.
-
KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. All passwords in one database, which is locked with one
- master key or a key file. The databases are encrypted using the best and most secure encryption algorithms currently known: AES and Twofish. See also: KeePassX.
- Secure Password Generator - generates a unique set of custom, high quality, cryptographic-strength password strings which are safe for you to use.
-
-
-
- SuperGenPass - A master password and the domain name of the Web site you are visiting is used as the โseedโ for a one-way hash algorithm (base-64 MD5). The output of this algorithm is your generated password.
- You remember one password (your โmaster passwordโ), and SGP uses it to generate unique, complex passwords for the Web sites you visit. Your generated passwords are never stored or transmitted, so you can use SGP on as many computers as you like without
- having to โsyncโ anything.
-
-
-
- Password Safe - Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember
- a single "Master Password" of your choice in order to unlock and access your entire user name/password list.
-
Key disclosure law - Who is required to hand over the encryption keys to authorities?
-
Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant
- is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
-
-
-
Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an
- adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)
- If you are currently not using encryption software for your hard disk, emails or file archives you should pick an encryption software here.
-
-
-
-
-
-
VeraCrypt - Disk Encryption
-
-
-
VeraCrypt is a source-available freeware utility used for on-the-fly encryption. It can create a virtual encrypted disk within a file or encrypt a partition
- or the entire storage device with pre-boot authentication. VeraCrypt is a fork of the discontinued TrueCrypt project. It was initially released on June 22, 2013. According to its developers, security improvements have been implemented and issues
- raised by the initial TrueCrypt code audit have been addressed.
GnuPG is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification
- of OpenPGP. Current versions of PGP (and Veridis' Filecrypt) are interoperable with GnuPG and other OpenPGP-compliant systems. GnuPG is a part of the Free Software Foundation's GNU software project, and has received major funding from the German
- government. GPGTools for Mac OS X.
PeaZip is a free and open-source file manager and file archiver made by Giorgio Tani. It supports its native PEA archive format (featuring compression, multi volume
- split and flexible authenticated encryption and integrity check schemes) and other mainstream formats, with special focus on handling open formats. It supports 181 file extensions (as of version 5.5.1).
Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
-
miniLock - Browser plugin for Google Chrome / Chromium to encrypt files using a secret passphrase. Easy to use. From the developer of Cryptocat.
-
AES Crypt - Using a powerful 256-bit encryption algorithm, AES Crypt can safely secure your most sensitive files. For Windows, Mac, Linux and Android.
-
DiskCryptor - A full disk and partition encryption system for Windows including the ability to encrypt the partition and disk on which the OS is installed.
-
-
-
-
-
Self-contained Networks
-
-
- If you are currently browsing the Clearnet and you want to access the Dark web this section is for you.
-
-
-
-
-
-
-
Tor Project
-
-
-
The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Tor is an effective censorship circumvention tool.
The Invisible Internet Project (I2P) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous
- Web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. The software is free and open source and is published under multiple licenses.
Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and
- has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools were originally designed by Ian Clarke, who defined Freenet's goal as providing freedom of speech
- on the Internet with strong anonymity protection.
RetroShare - Open Source cross-platform, Friend-2-Friend and secure decentralised communication platform.
-
GNUnet - GNUnet provides a strong foundation of free software for a global, distributed network that provides security and privacy.
-
-
-
-
-
Cryptocurrencies
-
-
-
-
-
-
-
-
Bitcoin
-
-
-
Bitcoin is a pseudonymous cryptocurrency that allows anyone to transact online without registering or giving away any personal information. Caution: Bitcoin does not provide payment anonymity: the usage of third party mixing services is required to obfuscate the transaction history.
Zcash offers total payment confidentiality, while still maintaining a decentralized network using a public blockchain. Unlike Bitcoin, Zcash supports fully shielded transactions, which hide the sender, recipient, and value.
Monero focuses strictly on protecting user's privacy and mandates all transactions are private by default. Monero is open-source, completely decentralized and provides privacy through Ring Confidential Transactions and Stealth Addresses.
- If you are currently using Social Networks like Facebook, Twitter or Google+ you should pick an alternative here.
-
-
-
-
-
-
diaspora*
-
-
-
diaspora* is based on three key philosophies: Decentralization, freedom and privacy. It is intended to address privacy concerns related to centralized social
- networks by allowing users set up their own server (or "pod") to host content; pods can then interact to share status updates, photographs, and other social data.
-
Friendica has an emphasis on extensive privacy settings and easy server installation. It aims to federate with as many other social networks as possible. Currently,
- Friendica users can integrate contacts from Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io and other services in their social streams.
While offering functionality similar to Twitter, GNU social seeks to provide the potential for open, inter-service and distributed communications between
- microblogging communities. Enterprises and individuals can install and control their own services and data. Notable public deployments are quitter.se and gnusocial.no.
A protocol for securing communications between a client and a DNS resolver. The DNSCrypt protocol uses high-speed high-security elliptic-curve cryptography and
- is very similar to DNSCurve, but focuses on securing communications between a client and its first-level resolver.
OpenNIC is an alternate network information center/alternative DNS root which lists itself as an alternative to ICANN and its registries. Like all alternative
- root DNS systems, OpenNIC-hosted domains are unreachable to the vast majority of the Internet. Only specific configuration in one's DNS resolver makes these reachable, and very few Internet service providers have this configuration.
NoTrack - A network-wide DNS server which blocks Tracking sites. Currently works in Debian and Ubuntu.
-
Namecoin - A decentralized DNS open source information registration and transfer system based on the Bitcoin cryptocurrency.
-
-
-
-
-
Digital Notebook
-
-
-
- If you are currently using an application like Evernote, Google Keep or Microsoft OneNote you should pick an alternative here.
-
-
-
-
-
-
-
-
Laverna
-
-
-
Laverna is a JavaScript note-taking web application with a Markdown editor and encryption support. The application stores all your notes in your browser databases, which is good for security and privacy reasons, because only you have access.
Turtl lets you take notes, bookmark websites, and store documents for sensitive projects. From sharing passwords with your coworkers to tracking research on an article you're writing, Turtl keeps it all safe from everyone but you and those you share with.
Standard Notes is a simple and private notes app that makes your notes easy and available everywhere you are. Features end-to-end encryption on every platform, and a powerful desktop experience with themes and custom editors.
Paperwork - Open source and self-hosted solution. For PHP / MySQL servers.
-
-
-
-
-
Paste Services
+---
+layout: default
+---
+
+
+
+
+
+
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.
+
+ Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a
+ pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I
+ want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes,
+ focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each otherโs citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do
+ spy on each other.
Who is required to hand over the encryption keys to authorities?
+
Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant
+ is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an
+ adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)
Why is it not recommended to choose a US-based service?
+
+
+
+
Services based in the United States are not recommended because of the countryโs surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which
+ forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and
+ transform the service into a tool of mass surveillance.
+
+
An example of this is Lavabit โ a discontinued secure email service created by Ladar Levison. The FBI requested Snowdenโs records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the serviceโs SSL keys. Having the SSL keys would allow them to access
+ communications (both metadata and unencrypted content) in real time for all of Lavabitโs customers, not just Snowden's.
+
+
Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest,
+ saying that shutting down the service was a violation of the court order.
+ Note: Using a VPN provider will not make you anonymous. But it will give you a better privacy. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.
+
+
+
+
+
Our VPN Provider Criteria
+
+
Operating outside the USA or other Five Eyes countries.
Ghostbin supports encryption, expiration, sessions, grant users to edit your notes and pastes up to one megabyte. You can also create your own account to keep track of your pastes.
-
-
-
-
-
-
-
-
-
PrivateBin
-
-
-
PrivateBin is a minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256bit AES.
-
-
-
-
-
-
-
-
-
0bin
-
-
-
0bin is a client side encrypted pastebin that can run without a database. 0bin allows anybody to host a pastebin while welcoming any type of content to be pasted in it.
A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has
+ received such a subpoena and should stop using the service.
+
+ {% include card.html color="success"
+ title="Tor Browser"
+ image="assets/img/tools/Tor-Project.png"
+ url="https://www.torproject.org/"
+ tor="http://expyuzz4wqqyqhjn.onion"
+ footer='OS: Windows, macOS, Linux, iOS, Android, OpenBSD.'
+ description="Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, it comes with pre-installed privacy add-ons, encryption and an advanced proxy."
+ %}
+
+ {% include card.html color="primary"
+ title="Mozilla Firefox"
+ image="assets/img/tools/Firefox.png"
+ url="https://www.firefox.com/"
+ footer="OS: Windows, macOS, Linux, Android, iOS, BSD."
+ description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our
+ recommendations: WebRTC and about:config and get the privacy add-ons.'
+ %}
+
+ {% include card.html color="warning"
+ title="Brave"
+ labels="warning:experimental:Brave is a good choice if you want to use a Chromium-based browser. But at this point in Brave's development, it's not as good as Firefox with privacy addons."
+ image="assets/img/tools/Brave.png"
+ url="https://www.brave.com/"
+ footer="OS: Windows, macOS, Linux, Android, iOS."
+ description="The new open source browser \"Brave\" automatically blocks ads and trackers, making it faster and safer than your current browser. Brave is based on Chromium."
+ %}
+
+
+
+
+
+
+
Browser Fingerprint - Is your browser configuration unique?
+
+
+
+ Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.
+
+
+
+
+
+
+
When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using
+ cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.
You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should
+ have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to
+ look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.
+
+
+
Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger, uBlock Origin and Disconnect.
+ They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
BrowserLeaks.com - Web browser security testing tools, that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.
+
+
+
+
WebRTC IP Leak Test - Is your IP address leaking?
+
+
+
+ WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.
+
+
+
+
While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.
WebRTC cannot be fully disabled in Chrome, however it is possible to change its routing settings (and prevent leaks) using an extension. Two open source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).
+ Improve your privacy with these excellent Firefox add-ons.
+
+
Stop Tracking with "Privacy Badger"
+
+
Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. Privacy Badger learns about trackers as you browse by inspecting external resources websites request. Please be aware that Google Analytics is considered first-party by Privacy Badger, which means that Google Analytics will not be blocked if you do not use another blocker, such as uBlock Origin.
+
+ https://www.eff.org/privacybadger/
+
+
Block Ads and Trackers with "uBlock Origin"
+
+
An efficient wide-spectrum-blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and
+ is completely open source. We recommend Firefox but uBlock Origin also works in other browsers such as Safari, Opera, and Chromium. Unlike AdBlock Plus, uBlock does not allow so-called "acceptable ads".
+
+ https://addons.mozilla.org/firefox/addon/ublock-origin/
+
+
+
+
+
Automatically Delete Cookies with "Cookie AutoDelete"
+
+
Automatically removes cookies when they are no longer used by open browser tabs. With the cookies, lingering sessions, as well as information used to spy on you, will be expunged.
+
+ https://addons.mozilla.org/firefox/addon/cookie-autodelete/
Encryption with "HTTPS Everywhere"
+
+
A Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation.
+
+ https://www.eff.org/https-everywhere
+
+
Block Content Delivery Networks with "Decentraleyes"
+
+
Emulates Content Delivery Networks locally by intercepting requests, finding the required resource and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required. Source code: GitLab (self-hosted).
+
+ https://addons.mozilla.org/firefox/addon/decentraleyes/
+
+
+ The following add-ons require quite a lot of interaction from the user to get things working. Some sites will not work properly until you have configured the add-ons.
+
+
+
Stop cross-site requests with "uMatrix"
+
+
Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix gives you control over the requests that websites make to other websites. This gives you greater and more fine-grained control
+ over the information that you leak online.
+
+ https://addons.mozilla.org/firefox/addon/umatrix/
+
+
+
Be in total control with "NoScript Security Suite"
+
+
+ Highly customizable plugin to selectively allow Javascript, Java, and Flash to run only on websites you trust. Not for casual users, it requires technical knowledge to configure.
+
+ https://addons.mozilla.org/firefox/addon/noscript/
+
+
Firefox: Privacy Related "about:config" Tweaks
+
+
This is a collection of privacy-related about:config tweaks. We'll show you how to enhance the privacy of your Firefox browser.
+
+
+
Preparation:
+
+
Enter "about:config" in the firefox address bar and press enter.
+
Press the button "I'll be careful, I promise!"
+
Follow the instructions below...
+
+
+
+
Getting started:
+
+
+
privacy.firstparty.isolate = true
+
+
A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
+
+
+
+
privacy.resistFingerprinting = true
+
+
A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.
+
+
+
+
privacy.trackingprotection.enabled = true
+
+
This is Mozillaโs new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.
+
+
+
+
browser.cache.offline.enable = false
+
+
Disables offline cache.
+
+
+
+
browser.safebrowsing.malware.enabled = false
+
+
Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.
+
+
+
+
browser.safebrowsing.phishing.enabled = false
+
+
Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.
+
+
+
+
browser.send_pings = false
+
+
The attribute would be useful for letting websites track visitorsโ clicks.
+
+
+
+
browser.sessionstore.max_tabs_undo = 0
+
+
Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.
Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. Source
+
+
+
+
dom.battery.enabled = false
+
+
Website owners can track the battery status of your device. Source
+
+
+
+
dom.event.clipboardevents.enabled = false
+
+
Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
+
+
+
+
geo.enabled = false
+
+
Disables geolocation.
+
+
+
+
media.eme.enabled = false
+
+
Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. Details
+
DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.
+
+
+
+
media.gmp-widevinecdm.enabled = false
+
+
Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. Details
+
+
+
+
media.navigator.enabled = false
+
+
Websites can track the microphone and camera status of your device.
+
+
+
+
network.cookie.cookieBehavior = 1
+
+
Disable cookies
+
0 = Accept all cookies by default
+
1 = Only accept from the originating site (block third-party cookies)
+
2 = Block all cookies by default
+
+
+
+
network.cookie.lifetimePolicy = 2
+
+
cookies are deleted at the end of the session
+
0 = Accept cookies normally
+
1 = Prompt for each cookie
+
2 = Accept for current session only
+
3 = Accept for N days
+
+
+
+
network.http.referer.trimmingPolicy = 2
+
+
Send only the scheme, host, and port in the Referer header
+
0 = Send the full URL in the Referer header
+
1 = Send the URL without its query string in the Referer header
+
2 = Send only the scheme, host, and port in the Referer header
+
+
+
+
network.http.referer.XOriginPolicy = 2
+
+
Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.) Source
+
0 = Send Referer in all cases
+
1 = Send Referer to same eTLD sites
+
2 = Send Referer only when the full hostnames match
+
+
+
+
network.http.referer.XOriginTrimmingPolicy = 2
+
+
When sending Referer across origins, only send scheme, host, and port in the Referer header of cross-origin requests. Source
Limit the amount of identifiable information sent when requesting the Mozilla harmful extension blocklist.
+
Optionally, the blocklist can be disabled entirely by setting extensions.blocklist.enabled to false for increased privacy, but decreased security. Source
+
+
+
+
+
+
Related Information
+
+
ffprofile.com - Helps you to create a Firefox profile with the defaults you like.
user.js Firefox hardening stuff - This is a user.js configuration file for Mozilla Firefox that's supposed to harden Firefox's settings and make it more secure.
+
Privacy Settings - A Firefox add-on to alter built-in privacy settings easily with a toolbar panel.
+
+
+
Privacy-Conscious Email Providers - No Affiliates
+
+
+ All providers listed here are operating outside the US and support SMTP TLS. The table is sortable. Never trust any company with your privacy, always encrypt.
+
+
+
+
+
+
+
Email Service
+
URL
+
Since
+
Server
+
Storage
+
Price / Year
+
Bitcoin
+
Encryption
+
Own Domain
+
+
+
+
+
+
+
+
+
+
+
+
+
+
2013
+
Switzerland
+
500 MB
+
Free
+
Accepted
+
Built-in
+
Yes
+
+
+
+
+
+
+
+
+
+
2015
+
Netherlands
+
2 GB
+
Free
+
Accepted
+
Built-in
+
Yes
+
+
+
+
+
+
+
+
+
+
2011
+
Germany
+
1 GB
+
Free
+
No
+
Built-in
+
Yes
+
+
+
+
+
+
+
+
+
+
2013
+
Belgium
+
500 MB
+
Free
+
Accepted
+
Built-in
+
Yes
+
+
+
+
+
+
+
+
+
+
+
2014
+
Germany
+
2 GB
+
12 โฌ
+
Accepted
+
Built-in
+
Yes
+
+
+
+
+
+
+
+
+
+
2009
+
Germany
+
2 GB
+
12 โฌ
+
No
+
Built-in
+
No
+
+
+
+
+
+
+
+
+
+
+
1999
+
Norway
+
1 GB
+
$ 19.95
+
Yes
+
No
+
Yes
+
+
+
+
+
+
+
+
+
+
2003
+
Switzerland
+
1 GB
+
$ 49.95
+
Accepted
+
Built-in
+
Yes
+
+
+
+
+
+
+
+
+
+
2014
+
Netherlands
+
10 GB
+
$ 59.95
+
Accepted
+
Built-in
+
Yes
+
+
+
+
+
+
+
+
+
+
2010
+
Switzerland
+
2 GB
+
$ 60
+
Accepted
+
No
+
Yes
+
+
+
+
+
+
+
Interesting Email Providers Under Development
+
+
Confidant Mail - An open-source non-SMTP cryptographic email system optimized for large file attachments. It is a secure and spam-resistant alternative to regular email and online file drop services. It
+ uses GNU Privacy Guard (GPG) for content encryption and authentication, and TLS 1.2 with ephemeral keys for transport encryption.
+
Become Your Own Email Provider with Mail-in-a-Box
+
+
Take it a step further and get control of your email with this easy-to-deploy mail server in a box. Mail-in-a-Box lets you become your own mail service provider in a few easy steps. Itโs sort of like making your own Gmail, but one you control from top
+ to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a working mail server. But you donโt need to be a technology expert to set it up. More: https://mailinabox.email/
+
+
Privacy Email Tools
+
+
gpg4usb - A very easy to use and small portable editor to encrypt and decrypt any text-message or -file. For Windows and Linux. GPG tutorial.
Enigmail - A security extension to Thunderbird and Seamonkey. It enables you to write and receive email messages signed and/or encrypted with the OpenPGP standard.
+
TorBirdy - This extension configures Thunderbird to make connections over the Tor anonymity network.
+
Email Privacy Tester - This tool will send an Email to your address and perform privacy-related tests.
+
+
+
Related Information
+
+
Aging โPrivacyโ Law Leaves Cloud E-Mail Open to Cops - Data stored in the cloud for longer than 6 months is considered abandoned and may be accessed by intelligence agencies without
+ a warrant. Learning: Use an external email client like Thunderbird or Enigmail, download your emails and store them locally. Never leave them on the server.
Autistici/Inventati server compromised - The cryptographic services offered by the Autistici/Inventati server have been compromised on 15th June 2004. It was discovered on 21st June 2005. One year
+ later. During an enquiry on a single mailbox, the Postal Police may have tapped for a whole year every user's private communication going through the server autistici.org/inventati.org.
+
+
+
Email Clients
+
+
+ {% include card.html color="success"
+ title="Thunderbird"
+ image="assets/img/tools/Thunderbird.png"
+ url="https://mozilla.org/thunderbird"
+ website="mozilla.org"
+ footer="OS: Windows, macOS, Linux, BSD."
+ description="Mozilla Thunderbird is a free, open source, cross-platform email, news, and chat client developed by the Mozilla Foundation. Thunderbird is an email, newsgroup, news feed, and chat (XMPP, IRC, Twitter) client."
+ %} {% include card.html color="primary"
+ title="Claws Mail"
+ image="assets/img/tools/Claws-Mail.png"
+ url="https://www.claws-mail.org/"
+ footer="OS: Windows, macOS, Linux, BSD, Solaris, Unix."
+ description="Claws Mail is a free and open source, GTK+-based email and news client. It offers easy configuration and an abundance of features. It is included with Gpg4win, an encryption suite for Windows."
+ %}
+
+
Worth Mentioning
-
hastebin.com - Haste is an open-source pastebin software written in node.js, which is easily installable in any network.
+
K-9 Mail - An independent mail application for Android. It supports both POP3 and IMAP mailboxes, but only supports push mail for IMAP.
Mailpile (Beta) - A modern, fast web-mail client with user-friendly encryption and privacy features.
+
Email Alternatives
+
-
-
-
Productivity Tools
-
-
-
-
-
-
Etherpad
-
-
-
Etherpad is a highly customizable Open Source online editor providing collaborative editing in really real-time. Etherpad allows you to edit documents collaboratively
- in real-time, much like a live multi-player editor that runs in your browser. Write articles, press releases, to-do lists, etc.
EtherCalc is a web spreadsheet. Data is saved on the web, and people can edit the same document at the same time. Changes are instantly reflected on all screens.
- Work together on inventories, survey forms, list management, brainstorming sessions..
ProtectedText is an open source web application. It encrypts and decrypts text in the browser, and password (or its hash) is never sent to the server
- - so that text can't be decrypted even if requested by authorities. No cookies, no sessions, no registration, no users tracking.
+ {% include card.html color="success"
+ title="I2P-Bote"
+ image="assets/img/tools/I2P.png"
+ url="https://i2pbote.xyz/"
+ footer="OS: Windows, macOS, Linux, Android, BSD / Solaris."
+ description="I2P-Bote is a fully decentralized and distributed email system. It supports different identities and does not expose email headers. Currently (2015), it is still
+ in beta version and can be accessed via its web application interface or IMAP and SMTP. All bote-mails are transparently end-to-end encrypted and, optionally, signed by the sender's private key."
+ %}
-
Worth Mentioning
-
-
dudle - An online scheduling application, which is free and OpenSource. Schedule meetings or make small online polls. No email collection or the need of registration.
-
+ {% include card.html color="primary"
+ title="Bitmessage"
+ image="assets/img/tools/Bitmessage.png"
+ url="https://bitmessage.org/"
+ footer="OS: Windows, macOS, Linux."
+ description="Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless,
+ meaning that you need-not inherently trust any entities like root certificate authorities. It uses strong authentication which means that the sender of a message cannot be spoofed, and it aims to hide \"non-content\" data."
+ %} {% include card.html color="warning"
+ title="RetroShare"
+ image="assets/img/tools/RetroShare.png"
+ url="http://retroshare.net"
+ footer="OS: Windows, macOS, Linux."
+ description="Retroshare creates encrypted connections to your friends. Nobody can spy on you. Retroshare is completely decentralized. This means there are no central servers. It is entirely Open-Source and free. There are no costs, no ads and no Terms of Service."
+ %}
+
+
+
Privacy Respecting Search Engines
+
+
+ If you are currently using search engines like Google, Bing or Yahoo, you should pick an alternative here.
+
+
+
+
+ {% include card.html color="success"
+ title="searx"
+ image="assets/img/provider/searx.jpg"
+ url="https://searx.me/"
+ tor="http://ulrn6sryqaifefld.onion"
+ extra_button='List of Instances'
+ description='An open source metasearch engine, aggregating the results of other search engines while not storing information about its users. No logs, no ads and no tracking.'
+ %}
+
+ {% include card.html color="primary"
+ title="StartPage"
+ image="assets/img/provider/StartPage.png"
+ url="https://www.startpage.com/"
+ description="Google search results, with complete privacy protection. Behind StartPage is a european company that has been obsessive about privacy since 2006."
+ %}
+
+ {% include card.html color="warning"
+ title="DuckDuckGo"
+ image="assets/img/provider/DuckDuckGo.jpg"
+ url="https://duckduckgo.com/"
+ tor="http://3g2upl4pq6kufc4m.onion"
+ description='The search engine that doesn\'t track you. Some of DuckDuckGo\'s code is free software hosted at GitHub, but the core is proprietary. The company is based in the USA.'
+ %}
+
+
+
Firefox Addon
+
+
+ Google search link fix - Firefox extension that prevents Google and Yandex search pages from modifying search result links when you click them. This is useful when
+ copying links but it also helps privacy by preventing the search engines from recording your clicks. (Open Source)
+
+
+
+
Worth Mentioning
+
+
+ Qwant - Qwant's philosophy is based on two principles: no user tracking and no filter bubble. Qwant was launched in France in February 2013. Privacy Policy.
+
+
+ MetaGer - An open source metasearch engine, which is based in Germany. It focuses on protecting the user's privacy.
+
+
Encrypted Instant Messenger
+
+
+ If you are currently using an Instant Messenger like WhatsApp, Viber, LINE, Telegram or Threema, you should pick an alternative here.
+
+
+
+ {% include card.html color="success"
+ title="Mobile: Signal"
+ image="assets/img/tools/Signal.png"
+ url="https://signal.org"
+ footer="OS: Android, iOS, macOS, Windows, Linux"
+ description="Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling.
+ All communications are end-to-end encrypted. Signal is free and open source, enabling anyone to verify its security by auditing the code. The development team is supported by community donations and grants. There are no advertisements,
+ and it doesn't cost anything to use."
+ %}
+ {% include card.html color="primary"
+ title="Riot.im"
+ image="assets/img/tools/riot.png"
+ url="https://riot.im/"
+ footer="OS: Android, iOS, macOS, Windows, Linux, Web"
+ labels="warning:beta:The software is currently in beta and the mobile client states 'End-to-end encryption is in beta and may not be reliable. You should not yet trust it to secure data.'"
+ description='Riot.im is a decentralized free-software chatting application based on the Matrix protocol, a recent open protocol for real-time communication offering E2E encryption. It can bridge other communications via others protocols such as IRC too.'
+ %}
-
-
-
PC Operating Systems
-
-
- If you are currently using a operating system like Microsoft Windows or Apple Mac OS X you should pick an alternative here.
-
-
-
-
-
-
Qubes OS
-
-
-
Qubes is an open-source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, the X Window System, and Linux, and
- can run most Linux applications and utilize most of the Linux drivers.
Debian is a Unix-like computer operating system and a Linux distribution that is composed entirely of free and open-source software, most of which is under the GNU
- General Public License, and packaged by a group of individuals known as the Debian project.
Trisquel is a Linux-based operating system derived from Ubuntu. The project aims for a fully free software system without proprietary software or firmware and
- uses Linux-libre, a version of the Linux kernel with the non-free code (binary blobs) removed.
OpenBSD - A project that produces a free, multi-platform 4.4BSD-based UNIX-like operating system. Emphasizes portability, standardization, correctness, proactive security and integrated cryptography.
-
Arch Linux - A simple, lightweight Linux distribution. It is composed predominantly of free and open-source software, and supports community involvement. Parabola is a
- completely open source version of Arch Linux.
-
Whonix - A Debian GNU/Linux based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation"
- and a Tor "Gateway". All communication are forced through the Tor network to accomplish this..
-
-
-
-
-
Live CD Operating Systems
-
-
-
-
-
-
Tails
-
-
-
Tails is a live operating system, that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and helps to:
- Use the Internet anonymously and circumvent censorship; Internet connections go through the Tor network; leave no trace on the computer; use state-of-the-art cryptographic tools to encrypt files, emails and instant messaging.
Knoppix is an operating system based on Debian designed to be run directly from a CD / DVD (Live CD) or a USB flash drive (Live USB), one of the first of its kind
- for any operating system. When starting a program, it is loaded from the removable medium and decompressed into a RAM drive. The decompression is transparent and on-the-fly.
Puppy Linux operating system is a lightweight Linux distribution that focuses on ease of use and minimal memory footprint. The entire system can be run
- from RAM with current versions generally taking up about 210 MB, allowing the boot medium to be removed after the operating system has started.
Tiny Core Linux - A minimal Linux operating system focusing on providing a base system using BusyBox and FLTK. The distribution is notable for its size (15 MB) and minimalism, with additional functionality
- provided by extensions.
-
-
-
-
Mobile Operating Systems
-
-
-
-
-
-
LineageOS
-
-
-
LineageOS is a free and open-source operating system for smartphones and tablets, based on
- the official releases of Android by Google. It is the continuation of the CyanogenMod project.
CopperheadOS is a hardened mobile open-source operating system by Copperhead Security and based on Android. It aims to provide stronger security and privacy. It also contains a hardened kernel and sandbox features for app isolation. Available for select Pixel and Nexus devices.
Sailfish OS is a mobile operating system combining the Linux kernel for a particular hardware platform use, the open-source Mer core middleware, a proprietary UI contributed by Jolla, and other third-party components.
Replicant - An open-source operating system based on Android, aiming to replace all proprietary components with free software.
-
OmniROM - A free software operating system for smartphones and tablet computers, based on the Android mobile platform.
-
-
-
-
-
Open Source Router Firmware
-
-
-
-
-
-
OpenWrt
-
-
-
OpenWrt is an operating system (in particular, an embedded operating system) based on the Linux kernel, primarily used on embedded devices to route network traffic.
- The main components are the Linux kernel, util-linux, uClibc and BusyBox. All components have been optimized for size, to be small enough for fitting into the limited storage and memory available in home routers.
pfSense is an open source firewall/router computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for
- a network and is noted for its reliability and offering features often only found in expensive commercial firewalls. pfSense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and as a VPN endpoint.
LibreWRT is a GNU/Linux-libre distribution for computers with minimal resources, such as the Ben Nanonote, ath9k based wifi routers, and other hardware that
- respects your freedom with emphasis on free software. It is used by the Free Software Foundation on their access point and router which provides network connectivity to portable computers in their office.
+ {% include card.html color="warning"
+ title="Desktop: Ricochet"
+ image="assets/img/tools/Ricochet.png"
+ url="https://ricochet.im/"
+ footer="OS: Windows, macOS, Linux."
+ description='Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with
+ your contacts without revealing your location or IP address. Instead of a username, you get a unique address that looks like ricochet:rs7ce36jsj24ogfw. Other Ricochet users can use this address to send a contact request - asking to be
+ added to your contacts list.'
+ %}
+
+
Worth Mentioning
+
+
ChatSecure - ChatSecure is a free and open source messaging app that features OTR encryption over XMPP.
+
Cryptocat - Encrypted open source messenger. Supports file sharing and multiple devices. Available for Windows, Linux and macOS.
+
Kontalk - A community-driven instant messaging network. Supports end-to-end encryption. Both client-to-server and server-to-server channels are fully encrypted.
+
Conversations - An open source Jabber/XMPP client for Android 4.4+ smartphones. Supports end-to-end encryption with either OMEMO or openPGP. There is also Conversations Legacy which still supports OTR.
+
Wireexperimental (more info) - A free software End-to-End Encrypted chating application that supports instant messaging, voice, and video calls.
+ If you are currently using a Video & Voice Messenger like Skype, Viber or Google Hangouts, you should pick an alternative here.
+
+
+ {% include card.html color="success"
+ title="Mobile: Signal"
+ image="assets/img/tools/Signal.png"
+ url="https://signal.org"
+ footer="OS: Android, iOS, macOS, Windows, Linux"
+ description="Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling.
+ All communications are end-to-end encrypted. Signal is free and open source, enabling anyone to verify its security by auditing the code. The development team is supported by community donations and grants. There are no advertisements,
+ and it doesn't cost anything to use."
+ %}
-
-
Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.
-
-
+ {% include card.html color="primary"
+ title="Wire"
+ image="assets/img/tools/wire.png"
+ url="https://get.wire.com"
+ footer="OS: Android, iOS, macOS, Windows, Linux, Web"
+ description="Wire is an app developed by Wire Swiss GmbH.
+ The Wire app allows users to exchange end-to-end encrypted instant messages, as well as make voice and video calls. Wire is free and open source, enabling anyone to verify its security by auditing the code.
+ The development team is backed by Iconical and they will monetize in the future with premium features/services.
+ Caution: The company keeps a list of all the users you contact until you delete your account."
+ %}
-
-
The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all
- I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. I don't want to live in a society that does these sort of things... I do not want to live in a world where everything I do and say is recorded. That is
- not something I am willing to support or live under.
-
-
+ {% include card.html color="warning"
+ title="Linphone"
+ image="assets/img/tools/Linphone.png"
+ url="https://www.linphone.org/"
+ footer="OS: iOS, Android, Windows Phone, Linux, Windows, macOS, Browser (Web)"
+ description="Linphone is an open source SIP Phone and a free voice over IP service, available on mobile and desktop environments and on web browsers. It supports ZRTP for end-to-end encrypted voice and video communication."
+ %}
-
-
We all need places where we can go to explore without the judgmental eyes of other people being cast upon us, only in a realm where weโre not being watched can we really test the limits of who we want to be. Itโs really in the private realm where
- dissent, creativity and personal exploration lie.
-
-
+
Worth Mentioning
+
+
Jitsi - Jitsi is a free and open source multiplatform voice (VoIP), videoconferencing and instant messaging application.
+
Tox - Experimental A free and open-source, peer-to-peer, encrypted instant messaging and video calling software.
+
Ring (formerly SFLphone) - Gives you a full control over your communications and an unmatched level of privacy.
+ {% include card.html color="success"
+ title="OnionShare"
+ image="assets/img/tools/OnionShare.png"
+ url="https://onionshare.org/"
+ tor="http://elx57ue5uyfplgva.onion/"
+ footer="OS: Windows, macOS, Linux."
+ description="OnionShare is an open source tool that lets you securely and anonymously share a file of any size. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable URL to access and download the files. It doesn't require setting up a server on the internet somewhere or using a third-party filesharing service. You host the file on your own computer and use a Tor onion service to make it temporarily accessible over the internet."
+ %}
+
+ {% include card.html color="primary"
+ title="Magic Wormhole"
+ image="assets/img/tools/Magic-Wormhole.png"
+ url="https://github.com/warner/magic-wormhole"
+ footer='OS: cross-platform (python)'
+ description='Get things from one computer to another, safely.This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical "wormhole codes": in general, the sending machine generates and displays the code, which must then be typed into the receiving machine. The codes are short and human-pronounceable, using a phonetically-distinct wordlist. The receiving side offers tab-completion on the codewords, so usually only a few characters must be typed. Wormhole codes are single-use and do not need to be memorized.'
+ %}
+
+
+
Encrypted Cloud Storage Services
+
+
+ If you are currently using Cloud Storage Services like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should pick an alternative here.
+
+
+
+
+ {% include card.html color="success"
+ title="Nextcloud - Choose your hoster"
+ image="assets/img/provider/Nextcloud.png"
+
+ description="Similar functionally to the widely used Dropbox, with the difference being that Nextcloud is free and open-source, and thereby allowing anyone to install and operate it without charge on a private server, with no limits on storage space or the number of connected clients."
+
+ url="https://nextcloud.com/"
+ footer="Client OS: Windows, macOS, Linux, BSD, Unix, iOS, Android, Fire OS. Server: Linux."
+ %}
+
+ {% include card.html color="primary"
+ title="Least Authority S4 - For Experts"
+ image="assets/img/provider/S4.jpg"
+
+ description="S4 (Simple Secure Storage Service) is Least Authority's verifiably secure off-site backup system for individuals and businesses. 100% client-side encryption and open source transparency. 250GB for $9.95/month or 5TB for $25.95/month. Servers are hosted with Amazon S3 in the US."
+
+ url="https://leastauthority.com/"
+ footer='OS: Linux, Windows, macOS, OpenSolaris, BSD. (Installation for advanced users)'
+ %}
+
+
+
+
Related Information
+
+
Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
+
+
+
Self-Hosted Cloud Server Software
+
+ If you are currently using a Cloud Storage Services like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should think about hosting it on your own.
+
+
+
+ {% include card.html color="success"
+ title="Pydio"
+ image="assets/img/tools/Pydio.png"
+ url="https://pydio.com/"
+ footer="OS: Windows, macOS, Linux, iOS, Android."
+ description="Pydio is open source software that turns instantly any server (on-premise, NAS, cloud IaaS or PaaS) into a file sharing platform for your company. It is an alternative
+ to SaaS Boxes and Drives, with more control, safety and privacy, and favorable TCOs."
+ %}
+
+ {% include card.html color="primary"
+ title="Tahoe-LAFS"
+ image="assets/img/tools/Tahoe-LAFS.png"
+ url="https://www.tahoe-lafs.org/"
+ footer="OS: Windows, macOS, Linux."
+ description="Tahoe-LAFS is a Free and Open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are
+ taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security."
+ %}
+
+ {% include card.html color="warning"
+ title="Nextcloud"
+ image="assets/img/provider/Nextcloud.png"
+ url="https://nextcloud.com/"
+ footer="Client OS: Windows, macOS, Linux, BSD, Unix, iOS, Android, Fire OS. Server: Linux."
+ description="Similar functionally to the widely used Dropbox, with the difference being that Nextcloud is free and open-source, and thereby allowing anyone to install and operate it without charge on a private server, with no limits on storage space or the number of connected clients."
+ %}
+
+
-
Guides
-
-
Surveillance Self-Defense by EFF - Guide to defending yourself from surveillance by using secure technology and developing careful practices.
-
The Crypto Paper - Privacy, Security and Anonymity for Every Internet User.
The Ultimate Privacy Guide - Excellent privacy guide written by the creators of the bestVPN.com website.
-
IVPN Privacy Guides - These privacy guides explain how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation.
+ {% include card.html color="success"
+ title="BAHNHOF"
+ image="assets/img/tools/bahnhof.png"
+ url="https://www.bahnhof.net/"
+ description="BAHNHOF is a widely known 'bullet-proof' hosting company utilized by Wikileaks."
+ %}
+ {% include card.html color="primary"
+ title="Colocation: DataCell"
+ image="assets/img/tools/datacell.png"
+ url="https://datacell.is/"
+ description="DataCell is a data center providing secure colocating in Switzerland and Iceland."
+ %}
-
PRISM Break - We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
-
Security in-a-Box - A guide to digital security for activists and human rights defenders throughout the world.
-
AlternativeTo.net - Great collection of open source online and self-hosted software sorted by likes.
-
SecureDrop - An open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. It was originally created
- by the late Aaron Swartz and is currently managed by Freedom of the Press Foundation.
-
Reset The Net - Privacy Pack - Help fight to end mass surveillance. Get these tools to protect yourself and your friends.
-
Security First - Umbrella is an Android app that provides all the advice needed to operate safely in a hostile environment.
-
- For easy copy and paste. Share this text snippet.
-
+ {% include card.html color="warning"
+ title="VPS/Web Hosting: Orange Website"
+ image="assets/img/tools/orange_hosting.png"
+ url="https://www.orangewebsite.com/"
+ description="Orange Website is an Icelandic web hosting provider that prides themselves in protecting online privacy and free speech."
+ %}
+
-
-
Participate with suggestions and constructive criticism
-
+
Secure File Sync Software
+
-
- It's important for a website like privacytools.io to be up-to-date. Keep an eye on software updates of the applications listed here. Follow recent news about providers that are recommended. We try our best to keep up but we're not perfect and the internet
- is changing fast. If you find an error, or you think a provider should not be listed here, or a qualified service provider is missing or a browser plugin is not the best choice anymore and anything else... Talk to us please.
-
-
-
-
-
-
-
-
Make suggestions on reddit
-
-
-
Our active community subreddit to stay up to date or to make suggestions. Join now! (Info)
This is a community project and we're aiming to deliver the best information available for a better privacy. Thank you for participating. This project needs you.
+ {% include card.html color="success"
+ title="SparkleShare"
+ image="assets/img/tools/SparkleShare.png"
+ url="http://sparkleshare.org/"
+ footer="OS: Windows, macOS, Linux."
+ description="SparkleShare creates a special folder on your computer. You can add remotely hosted folders (or \"projects\") to this folder. These projects will be automatically
+ kept in sync with both the host and all of your peers when someone adds, removes or edits a file."
+ %} {% include card.html color="primary"
+ title="Syncthing"
+ image="assets/img/tools/Syncthing.png"
+ url="https://syncthing.net/"
+ footer="OS: Windows, macOS, Linux, Android, BSD, Solaris."
+ description="Syncthing replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to
+ choose where it is stored, if it is shared with some third-party and how it's transmitted over the Internet."
+ %}
+
Worth Mentioning
+
+
+ git-annex - Allows managing files with git, without checking the file contents into git. While that may seem paradoxical, it is useful when dealing with files larger than git can currently easily handle,
+ whether due to limitations in memory, time, or disk space.
+
+
+
Password Manager Software
+
+ If you are currently using a password manager software like 1Password, LastPass, Roboform or iCloud Keychain, you should pick an alternative here.
+
+
+ {% include card.html color="success"
+ title="Bitwarden - Cloud/Self-host"
+ image="assets/img/tools/bitwarden.png"
+ url="https://bitwarden.com/"
+ footer="OS: Windows, macOS, Linux, iOS, Android, Web."
+ description="Bitwarden is a free and open source password manager. It aims to solve password management problems for individuals, teams, and business organizations. Bitwarden is among the easiest and safest solutions to store all of your logins and passwords while conveniently keeping them synced between all of your devices. If you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden server."
+ %} {% include card.html color="primary"
+ title="KeePass / KeePassXC - Local"
+ image="assets/img/tools/KeePass.png"
+ url="https://keepass.info/download.html"
+ website="keepass.info"
+ footer="OS: Windows, macOS, Linux, iOS, Android, BSD."
+ description='KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. All passwords in one database, which is locked with one
+ master key or a key file. The databases are encrypted using the best and most secure encryption algorithms currently known: AES and Twofish. See also: KeePassXC with official native cross-platform support for Windows/macOS/Linux.'
+ %}
-
+ {% include card.html color="warning"
+ title="LessPass - Browser"
+ image="assets/img/tools/LessPass.png"
+ url="https://lesspass.com/"
+ footer="OS: Windows, macOS, Linux, Android."
+ description="LessPass is a free and open source password manager that generates unique passwords for websites, email accounts, or anything else based on a master password and information you know. No sync needed. Uses PBKDF2 and SHA-256. It's advised to use the browser addons for more security."
+ %}
+
Worth Mentioning
+
+
+ Master Password - Master Password is based on an ingenious password generation algorithm that guarantees your passwords can never be lost. Its passwords aren't stored: they are generated on-demand from your name, the site and your master password. No syncing, backups or internet access needed.
+
-
-
No Ads, No Google Analytics, No Affiliates, No Cross-Site Requests
-
-
+
+ Password Safe - Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted username/password list. With Password Safe all you have to do is create and remember
+ a single "Master Password" of your choice in order to unlock and access your entire username/password list.
+
+ If you are currently using a calendar and or contacts synchronization service like Google Sync or iCloud, you should pick an alternative here.
+
+
- Donate:1N4bKCx3kpvUTBhsvbmthPDssN8ATPEhgt or use PayPal.
+ {% include card.html color="success"
+ title="Nextcloud"
+ image="assets/img/provider/Nextcloud.png"
+ url="https://nextcloud.com/"
+ footer="Client OS: Windows, macOS, Linux, BSD, Unix, iOS, Android, Fire OS. Server: Linux."
+ description="NextCloud is a suite of client-server software for creating and using file hosting services. This includes calendar sync via CalDAV and contacts sync via CardDAV. Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server."
+ %}
-
+ {% include card.html color="primary"
+ title="Email Providers"
+ image="assets/img/misc/email.png"
+ url="#email"
+ website="Email Providers section"
+ footer="OS: depends on email provider."
+ description="Many email providers also offer calendar and or contacts sync services. Refer to the Email Providers section to choose an email provider and check if they also offer calendar and or contacts sync."
+ %}
-
privacytools.io is a socially motivated website that provides information for protecting your data security and privacy. never trust any company with your privacy, always encrypt.
-
-
+ {% include card.html color="warning"
+ title="EteSync"
+ image="assets/img/provider/etesync.png"
+ url="https://www.etesync.com/"
+ footer="Client OS: Android, Web. Server OS: Linux."
+ description="EteSync is a secure, end-to-end encrypted and journaled personal information (e.g. contacts and calendar) cloud synchronization and backup for Android and any OS that supports CalDAV/CardDAV. It costs $14 per year to use, or you can host the server yourself for free."
+ %}
-
-
-
-
-
+
+
Worth Mentioning
+
+
+ fruux - a unified contacts/calendaring system that works across platforms and devices.
+
-
+
+ Flock - a discontinued calendar and contacts sync service by Open Whisper Systems. Despite being shut down the source code is still available on GitHub.
+