cloud backups - Consider regularly exporting your calendar and or contacts and backing them up on a separate storage drive or uploading them to cloud storage (ideally after encrypting them).
+
+
+ DecSync - DecSync can be used to synchronize RSS, contacts, and calendars without a server by using file synchronization software such as Syncthing.
+
From 40335b9e3d7257bb33886e67b17d069f8c6bb036 Mon Sep 17 00:00:00 2001
From: Jonah Aragon
Date: Sat, 30 Nov 2019 13:06:56 -0600
Subject: [PATCH 02/10] Add security warning to email lists (#1543)
---
pages/providers/email.html | 9 +++++++++
pages/software/email.html | 9 +++++++++
2 files changed, 18 insertions(+)
diff --git a/pages/providers/email.html b/pages/providers/email.html
index 5c8d1577..ff4aac33 100644
--- a/pages/providers/email.html
+++ b/pages/providers/email.html
@@ -5,4 +5,13 @@ title: "Best Secure Email Providers for Privacy"
description: "Find a secure email provider that will keep your privacy in mind. Don't settle for ad-supported platforms. Never trust any company with your privacy, always encrypt."
---
+
+
Warning
+
+
Even when using end-to-end encryption technology like GPG, email is inherently insecure and should not be trusted for sensitive communications. Metadata is always communicated in plaintext, and even when encryption is used correctly it is very easy for either party to acidentally respond to or forward a previously encrypted message in plaintext in many clients. GPG also does not easily support modern crypto functionality such as key rotation and forward secrecy.
+
We recommend the following email providers for routine notifications and messages from other services that require an email address. For communications that need to be safe and secure, you should use a dedicated instant messaging tool, such as Signal.
+
{% include sections/email-providers.html %}
diff --git a/pages/software/email.html b/pages/software/email.html
index 1c9d9921..147ad114 100644
--- a/pages/software/email.html
+++ b/pages/software/email.html
@@ -5,6 +5,15 @@ title: "Email Clients"
description: "Discover free, open-source, and secure email clients, along with some email alternatives you may not have considered."
---
+
+
Warning
+
+
Even when using end-to-end encryption technology like GPG, email is inherently insecure and should not be trusted for sensitive communications. Metadata is always communicated in plaintext, and even when encryption is used correctly it is very easy for either party to acidentally respond to or forward a previously encrypted message in plaintext in many clients. GPG also does not easily support modern crypto functionality such as key rotation and forward secrecy.
+
We recommend the following email providers for routine notifications and messages from other services that require an email address. For communications that need to be safe and secure, you should use a dedicated instant messaging tool, such as Signal.
+
{% include sections/email-clients.html %}
{% include sections/email-alternatives.html %}
From 26b33824610b0f81e7e598e2ddc2449975848b6d Mon Sep 17 00:00:00 2001
From: Daniel Nathan Gray
Date: Sat, 30 Nov 2019 19:08:24 +0000
Subject: [PATCH 03/10] Update IVPN with current audit information (#1547)
---
_includes/sections/vpn.html | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/_includes/sections/vpn.html b/_includes/sections/vpn.html
index 94860ea9..54a43e3b 100644
--- a/_includes/sections/vpn.html
+++ b/_includes/sections/vpn.html
@@ -56,7 +56,7 @@
We are currently undergoing a complete security audit of our VPN applications by a reputable Swiss security company. The results of the audit will be summarized in a public report for cases like this.
-
We will reevaluate this listing at the end of 2019 or when the aforementioned report has been published, whichever is sooner.
+
We will reevaluate this listing at the end of Q1 2020 or when the aforementioned report has been published, whichever is sooner.
526+ Servers
ProtonVPN has 526 servers in 42 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.
Accepts Bitcoin
@@ -76,8 +76,7 @@
IVPN USD $100/Year
IVPN is another strong premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar and offers a 3 day free trial. Unfortunately, due to its lack of an independent security audit, it does not meet the complete criteria for recommendation, see our notes below.
No Security Audit
-
IVPN has undergone a no-logging audit from Cure53 which concluded in agreement with IVPN's no-logging claim. However, IVPN has not undergone a more comprehensive security audit by an independent third party, and therefore cannot be strongly recommended at this time. We have still chosen to list it on this page with the assumption that an audit will be published soon: The IVPN team reportedly plans to begin the process in September.
-
We will reevaluate this listing at the end of 2019 or when the aforementioned report has been published, whichever is sooner.
+
IVPN has undergone a no-logging audit from Cure53 which concluded in agreement with IVPN's no-logging claim. However, IVPN has not undergone a more comprehensive security audit by an independent third party, and therefore cannot be strongly recommended at this time.
We have still chosen to list it on this page with the assumption that an audit will be published soon. IVPN has hired Cure53 to undertake a comprehensive audit covering the IVPN website, public and internal server infrastucture. They expect the audit to begin in November 2019 and be completed by the 6 auditors in January 2020.
77+ Servers
IVPN has 77 servers in 31 countries at the time of writing this page. Typically the more servers a provider offers, the better. IVPN has a decent (but not exceptional) server count that will most likely provide adequate coverage to most users.
Accepts Bitcoin
From d8275b4ce1872303d469b9beb8cd12a00ee71410 Mon Sep 17 00:00:00 2001
From: djoate <56777051+djoate@users.noreply.github.com>
Date: Sun, 1 Dec 2019 04:30:52 +0000
Subject: [PATCH 04/10] Fix typos in email.html (#1550)
---
pages/providers/email.html | 2 +-
pages/software/email.html | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/pages/providers/email.html b/pages/providers/email.html
index ff4aac33..83a821a0 100644
--- a/pages/providers/email.html
+++ b/pages/providers/email.html
@@ -8,7 +8,7 @@ description: "Find a secure email provider that will keep your privacy in mind.
Warning
-
Even when using end-to-end encryption technology like GPG, email is inherently insecure and should not be trusted for sensitive communications. Metadata is always communicated in plaintext, and even when encryption is used correctly it is very easy for either party to acidentally respond to or forward a previously encrypted message in plaintext in many clients. GPG also does not easily support modern crypto functionality such as key rotation and forward secrecy.
+
Even when using end-to-end encryption technology like GPG, email is inherently insecure and should not be trusted for sensitive communications. Metadata is always communicated in plaintext, and even when encryption is used correctly it is very easy for either party to accidentally respond to or forward a previously encrypted message in plaintext in many clients. GPG also does not easily support modern crypto functionality such as key rotation and forward secrecy.
We recommend the following email providers for routine notifications and messages from other services that require an email address. For communications that need to be safe and secure, you should use a dedicated instant messaging tool, such as Signal.
diff --git a/pages/software/email.html b/pages/software/email.html
index 147ad114..b973e515 100644
--- a/pages/software/email.html
+++ b/pages/software/email.html
@@ -8,7 +8,7 @@ description: "Discover free, open-source, and secure email clients, along with s
Warning
-
Even when using end-to-end encryption technology like GPG, email is inherently insecure and should not be trusted for sensitive communications. Metadata is always communicated in plaintext, and even when encryption is used correctly it is very easy for either party to acidentally respond to or forward a previously encrypted message in plaintext in many clients. GPG also does not easily support modern crypto functionality such as key rotation and forward secrecy.
+
Even when using end-to-end encryption technology like GPG, email is inherently insecure and should not be trusted for sensitive communications. Metadata is always communicated in plaintext, and even when encryption is used correctly it is very easy for either party to accidentally respond to or forward a previously encrypted message in plaintext in many clients. GPG also does not easily support modern crypto functionality such as key rotation and forward secrecy.
We recommend the following email providers for routine notifications and messages from other services that require an email address. For communications that need to be safe and secure, you should use a dedicated instant messaging tool, such as Signal.
NetGuard provides simple and advanced ways to block certain apps' access to the internet without the help of root privileges. Applications and addresses can individually be allowed or denied access to your Wi-Fi and/or mobile connection, allowing you to control which apps are able to call home or not.
+
NetGuard provides simple and advanced methods to block certain apps from accessing the internet, without requiring root privileges. Applications and addresses can be individually allowed or denied access to your Wi-Fi and/or mobile connections, allowing you to control exactly which apps are able to phone home or not.
Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Root Mode: Orbot can be configured to transparently proxy all of your Internet traffic through Tor. You can also choose which specific apps you want to use through Tor.
+
Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Root Mode: Orbot can be configured to transparently proxy all of your Internet traffic through Tor. You can also choose which specific apps you wish to use through Tor.
{% include cardv2.html
title="uBlock Origin: Block Ads and Trackers"
image="/assets/img/addons/ublock-origin.png"
-description="uBlock Origin is an efficient wide-spectrum blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source."
+description="uBlock Origin is an efficient wide-spectrum blocker that is easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source."
website="https://addons.mozilla.org/firefox/addon/ublock-origin/"
forum="https://forum.privacytools.io/t/discussion-ublock-origin/266"
github="https://github.com/gorhill/uBlock/"
@@ -17,21 +17,10 @@ opera="https://addons.opera.com/en/extensions/details/ublock/"
edge="https://www.microsoft.com/en-us/p/ublock-origin/9nblggh444l4"
%}
-{% include cardv2.html
-title="Cookie AutoDelete: Automatically Delete Cookies"
-image="/assets/img/addons/cookie-autodelete.png"
-description="Cookie AutoDelete automatically removes cookies when they are no longer used by open browser tabs. With the cookies, lingering sessions, as well as information used to spy on you, will be expunged."
-website="https://addons.mozilla.org/firefox/addon/cookie-autodelete/"
-forum="https://forum.privacytools.io/t/discussion-cookie-autodelete/267"
-github="https://github.com/Cookie-AutoDelete/Cookie-AutoDelete"
-firefox="https://addons.mozilla.org/en-US/firefox/addon/cookie-autodelete"
-chrome="https://chrome.google.com/webstore/detail/cookie-autodelete/fhcgjolkccmbidfldomjliifgaodjagh"
-%}
-
{% include cardv2.html
title="HTTPS Everywhere: Secure Connections"
image="/assets/img/addons/https-everywhere.png"
-description="HTTPS Everywhere encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation."
+description="HTTPS Everywhere enables encryption of your connections to many major websites, making your browsing more secure. It is a collaboration between The Tor Project and the Electronic Frontier Foundation."
website="https://www.eff.org/https-everywhere"
forum="https://forum.privacytools.io/t/discussion-https-everywhere/268"
github="https://github.com/EFForg/https-everywhere"
@@ -43,7 +32,7 @@ opera="https://addons.opera.com/en/extensions/details/https-everywhere"
{% include cardv2.html
title="Decentraleyes: Block Content Delivery Networks"
image="/assets/img/addons/decentraleyes.png"
-description="Decentraleyes emulates Content Delivery Networks locally by intercepting requests, finding the required resource, and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required."
+description="Decentraleyes emulates Content Delivery Networks locally by intercepting requests, finding the required resource locally, and injecting it into the environment. This all happens instantaneously and automatically, with no configuration required."
website="https://decentraleyes.org/"
forum="https://forum.privacytools.io/t/discussion-decentraleyes/269"
gitlab="https://git.synz.io/Synzvato/decentraleyes"
@@ -52,10 +41,21 @@ chrome="https://chrome.google.com/webstore/detail/decentraleyes/ldpochfccmkkmhdb
opera="https://addons.opera.com/en/extensions/details/decentraleyes"
%}
+{% include cardv2.html
+title="Cookie AutoDelete: Automatically Delete Cookies"
+image="/assets/img/addons/cookie-autodelete.png"
+description="Cookie AutoDelete automatically removes cookies, lingering sessions, and other information that can be used to spy on you when they are no longer used by open browser tabs."
+website="https://addons.mozilla.org/firefox/addon/cookie-autodelete/"
+forum="https://forum.privacytools.io/t/discussion-cookie-autodelete/267"
+github="https://github.com/Cookie-AutoDelete/Cookie-AutoDelete"
+firefox="https://addons.mozilla.org/en-US/firefox/addon/cookie-autodelete"
+chrome="https://chrome.google.com/webstore/detail/cookie-autodelete/fhcgjolkccmbidfldomjliifgaodjagh"
+%}
+
{% include cardv2.html
title="Terms of Service; Didn’t Read: Be Informed"
image="/assets/img/addons/tosdr.png"
-description="Terms of Service; Didn’t Read is an addon that aims to fix how “I have read and agree to the Terms” is the biggest lie on the web by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are done transparently by a community of reviewers."
+description="Terms of Service; Didn’t Read is an addon that believes “I have read and agree to the Terms of Service” is the biggest lie on the web, and wants to fix it by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are published transparently by a community of reviewers."
website="https://tosdr.org/"
forum="https://forum.privacytools.io/t/discussion-terms-of-service-didn-t-read/270"
github="https://github.com/tosdr/"
@@ -90,7 +90,7 @@ opera="https://addons.opera.com/en/extensions/details/privacy-badger/"
For Power Users Only
- These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons.
+ These addons require quite a lot of interaction from the user. Some sites may not work properly without careful configuration.
{% include cardv2.html
diff --git a/_includes/sections/browser-recommendation.html b/_includes/sections/browser-recommendation.html
index 8c5d896f..9a025912 100644
--- a/_includes/sections/browser-recommendation.html
+++ b/_includes/sections/browser-recommendation.html
@@ -7,7 +7,7 @@
title="Firefox"
image="/assets/img/tools/Firefox.png"
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our
-recommendations: WebRTC and about:config and get the privacy add-ons.'
+recommendations: Privacy Add-ons WebRTC about:config tweaks.'
website="https://firefox.com"
forum="https://forum.privacytools.io/t/discussion-firefox/279"
source="https://hg.mozilla.org/mozilla-central/"
@@ -41,7 +41,7 @@ linux="https://www.torproject.org/download/"
title="Firefox"
image="/assets/img/tools/Firefox.png"
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our
-recommendations: WebRTC and about:config and get the privacy add-ons.'
+recommendations: Privacy Add-ons WebRTC about:config tweaks.'
website="https://www.mozilla.org/en-US/firefox/mobile/"
forum="https://forum.privacytools.io/t/discussion-firefox/279"
source="https://github.com/mozilla-mobile"
@@ -66,7 +66,7 @@ googleplay="https://play.google.com/store/apps/details?id=org.torproject.torbrow
{% include cardv2.html
title="Bromite"
image="/assets/img/tools/bromite.png"
-description='Bromite is a Chromium-based browser with security enhancement patches from GrapheneOS and built-in adblocking and DNS over HTTPS support. More info can be found here.'
+description='Bromite is a Chromium-based browser with security enhancement patches from GrapheneOS and other security-focused projects, built-in adblocking, and DNS over HTTPS support. More info can be found on their website.'
website="https://www.bromite.org/"
forum="https://forum.privacytools.io/t/discussion-bromite-browsers/1521"
github="https://github.com/bromite/bromite"
diff --git a/_includes/sections/calendar-contacts-sync.html b/_includes/sections/calendar-contacts-sync.html
index 37b49891..abeef4a0 100644
--- a/_includes/sections/calendar-contacts-sync.html
+++ b/_includes/sections/calendar-contacts-sync.html
@@ -22,14 +22,6 @@
ios="https://nextcloud.com/install/"
%}
-{%
- include cardv2.html
- title="Email Providers"
- image="/assets/img/misc/email.png"
- description='Many email providers also offer calendar and or contacts sync services. Refer to the Email Providers section to choose an email provider and check if they also offer calendar and/or contacts sync.'
- website="/providers/email"
-%}
-
{%
include cardv2.html
title="EteSync"
@@ -50,6 +42,14 @@
ios="https://www.etesync.com/install/ios/"
%}
+{%
+ include cardv2.html
+ title="Email Providers"
+ image="/assets/img/misc/email.png"
+ description='Many email providers also offer calendar and or contacts sync services. Refer to our Email Provider recommendations to choose an email provider and see if they also offer calendar and/or contacts sync.'
+ website="/providers/email"
+%}
+
Worth Mentioning
@@ -58,9 +58,9 @@
- cloud backups - Consider regularly exporting your calendar and or contacts and backing them up on a separate storage drive or uploading them to cloud storage (ideally after encrypting them).
+ Cloud backups - Consider regularly exporting your calendar and or contacts and backing them up on a separate storage drive or uploading them to cloud storage (ideally after encrypting them).
-
+
DecSync - DecSync can be used to synchronize RSS, contacts, and calendars without a server by using file synchronization software such as Syncthing.
diff --git a/_includes/sections/cloud-storage.html b/_includes/sections/cloud-storage.html
index f88e56d0..d092eb6d 100644
--- a/_includes/sections/cloud-storage.html
+++ b/_includes/sections/cloud-storage.html
@@ -7,7 +7,7 @@
{% include cardv2.html
title="Nextcloud - Choose your hoster"
image="/assets/img/provider/Nextcloud.png"
-description="Nextcloud is similar in functionality to the widely-used Dropbox, with the difference being that Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server, with no limits on storage space or the number of connected clients."
+description="Nextcloud is a suite of client-server software for creating your own file hosting services on a private server you control. Nextcloud is free and open-source, and supports end-to-end encryption with many of its clients. The only limits on storage and bandwidth are the limits on the server provider you choose."
website="https://nextcloud.com/"
forum="https://forum.privacytools.io/t/discussion-nextcloud/287"
github="https://github.com/nextcloud"
diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html
index 9718d5d4..9cf65e76 100644
--- a/_includes/sections/dns.html
+++ b/_includes/sections/dns.html
@@ -1,7 +1,7 @@
Encrypted Domain Name System (DNS) Resolvers
- Note: Using an encrypted DNS resolver will not make you anonymous, nor hide your internet traffic from your Internet Service Provider. But it will prevent DNS hijacking, and make your DNS requests harder for third parties to eavesdrop on and tamper with. If you are currently using Google's DNS resolver, you should pick an alternative here.
+ Note: Using an encrypted DNS resolver will not make you anonymous, nor hide your internet traffic from your Internet Service Provider. But, it will prevent DNS hijacking, and make your DNS requests harder for third parties to eavesdrop on and tamper with. If you are currently using Google's DNS resolver, you should pick an alternative here.
@@ -552,82 +552,3 @@
-
-
Terms
-
-
-
DNS-over-TLS (DoT) - A security protocol for encrypted DNS on a dedicated port 853. Some providers support port 443 which generally works everywhere while port 853 is often blocked by restrictive firewalls. DoT has two modes:
-
-
Oppurtunistic mode: the client attempts to form a DNS-over-TLS connection to the server on port 853 without performing certificate validation. If it fails, it will use unencrypted DNS.
-
Strict mode: the client connects to a specific hostname and performs certificate validation for it. If it fails, no DNS queries are made until it succeeds.
-
-
DNS-over-HTTPS (DoH) - Similar to DoT, but uses HTTPS instead, being indistinguishable from "normal" HTTPS traffic on port 443.
-
DNSCrypt - An older yet robust method of encrypting DNS.
Check the website of your DNS provider. They may have a page for telling "you are using our DNS." Examples include AdGuard and Cloudflare.
-
If using Firefox's trusted recursive resolver (TRR), navigate to about:networking#dns. If the TRR column says "true" for some fields, you are using DoH.
QNAME Minimization - Run dig +short txt qnamemintest.internet.nl from the command-line (taken from this NLnet Labs presentation). If you are on Windows 10, run Resolve-DnsName -Type TXT -Name qnamemintest.internet.nl from the PowerShell. You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
-
-
-
Software suggestions and Additional Information
-
-
-
Encrypted DNS clients for desktop:
-
-
Firefox comes with built-in DoH support with Cloudflare set as the default resolver, but can be configured to use any DoH resolver. Currently Mozilla is conducting studies before enabling DoH by default for all US-based Firefox users.
-
-
DNS over HTTPS can be enabled in Menu -> Preferences (about:preferences) -> Network Settings -> Enable DNS over HTTPS. Set "Use Provider" to "Custom", and enter your DoH provider's address.
-
Advanced users may enable it in about:config by setting network.trr.custom_uri and network.trr.uri as the address you find from the documentation of your DoH provider and network.trr.mode as 2. It may also be desirable to set network.security.esni.enabled to True in order to enable encrypted SNI and make sites supporting ESNI a bit more difficult to track.
We recommend selecting Private DNS provider hostname and entering the DoT address from documentation of your DoT provider to enable strict mode (see Terms above).
-
diff --git a/_includes/sections/email-clients.html b/_includes/sections/email-clients.html
index f1f8f814..339b45be 100644
--- a/_includes/sections/email-clients.html
+++ b/_includes/sections/email-clients.html
@@ -3,7 +3,7 @@
{% include cardv2.html
title="Thunderbird"
image="/assets/img/tools/Thunderbird.png"
-description="Thunderbird is a free, open source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Twitter) client developed by community, previously by the Mozilla Foundation."
+description="Thunderbird is a free, open source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Twitter) client developed by the Thunderbird community, and previously by the Mozilla Foundation."
website="https://www.thunderbird.net/"
forum="https://forum.privacytools.io/t/discussion-thunderbird/659"
source="https://hg.mozilla.org/comm-central/"
diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html
index 94ad17e6..a972a14d 100644
--- a/_includes/sections/email-providers.html
+++ b/_includes/sections/email-providers.html
@@ -285,13 +285,3 @@
Take it a step further and get control of your email with this easy-to-deploy mail server in a box. Mail-in-a-Box lets you become your own mail service provider in a few easy steps. It's sort of like making your own Gmail, but one you control from top
to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a working mail server. But you don't need to be a technology expert to set it up. More: https://mailinabox.email/
-
-
Related Information
-
-
-
Aging 'Privacy' Law Leaves Cloud E-Mail Open to Cops - Data stored in the cloud for longer than 6 months is considered abandoned and may be accessed by intelligence agencies without
- a warrant. Learning: Use an external email client like Thunderbird or Enigmail, download your emails and store them locally. Never leave them on the server.
Autistici/Inventati server compromised - The cryptographic services offered by the Autistici/Inventati server have been compromised on 15th June 2004. It was discovered on 21st June 2005. One year
- later. During an enquiry on a single mailbox, the Postal Police may have tapped for a whole year every user's private communication going through the server autistici.org/inventati.org.
Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
+
Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
Linux Unified Key Setup (LUKS) - A full disk encryption system for Linux using dm-crypt as the disk encryption backend. Included by default in Ubuntu. Available for Windows and Linux.
-
Hat.sh - A cross-platform, serverless JavaScript web application that provides secure file encryption using the AES-256-GCM algorithm in your browser. It can also be downloaded and run offline.
+
Hat.sh - A cross-platform, serverless JavaScript web application that provides secure file encryption using the AES-256-GCM algorithm in your browser. It can also be downloaded and run offline.
Keka - A macOS-only, open-source file archiver with the ability to encrypt files.
diff --git a/_includes/sections/file-sharing.html b/_includes/sections/file-sharing.html
index 35660d75..f2a9df75 100644
--- a/_includes/sections/file-sharing.html
+++ b/_includes/sections/file-sharing.html
@@ -4,7 +4,7 @@
title="Firefox Send"
image="/assets/img/tools/Firefox-Send.png"
website="https://send.firefox.com/"
-description="Firefox Send uses end-to-end encryption to keep your data secure from the moment you share to the moment your file is opened. It also offers security controls that you can set. You can choose when your file link expires, the number of downloads, and whether to add an optional password for an extra layer of security."
+description="Firefox Send uses end-to-end encryption to keep your data secure from the moment you share to the moment your file is opened. It also offers security controls that you can set. You can choose when your file link expires, the number of downloads, and whether you would like to add a password for an extra layer of security."
forum="https://forum.privacytools.io/t/discussion-firefox-send/755"
github="https://github.com/mozilla/send"
web="https://send.firefox.com/"
diff --git a/_includes/sections/file-sync.html b/_includes/sections/file-sync.html
index 6dea5561..4ed98463 100644
--- a/_includes/sections/file-sync.html
+++ b/_includes/sections/file-sync.html
@@ -9,7 +9,7 @@
include cardv2.html
title="Syncthing"
image="/assets/img/tools/Syncthing.png"
- description="Syncthing replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to choose where it is stored, if it is shared with some third-party and how it's transmitted over the Internet."
+ description="Syncthing replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to choose where it is stored, if it is shared with some third-party, and how it is transmitted over the Internet."
website="https://syncthing.net/"
forum="https://forum.privacytools.io/t/discussion-syncthing/1627/2"
github="https://github.com/syncthing?type=source"
@@ -24,7 +24,7 @@
include cardv2.html
title="SparkleShare"
image="/assets/img/tools/SparkleShare.png"
- description="SparkleShare creates a special folder on your computer. You can add remotely hosted folders (or \"projects\") to this folder. These projects will be automatically kept in sync with both the host and all of your peers when someone adds, removes or edits a file."
+ description="SparkleShare creates a special folder on your computer. You can add remotely hosted folders (or \"projects\") to this folder. These projects will be automatically kept in sync with both the host and all of your peers when someone adds, removes, or edits a file."
website="https://sparkleshare.org/"
forum="https://forum.privacytools.io/t/discussion-sparkleshare/1626"
github="https://github.com/hbons/SparkleShare"
@@ -36,7 +36,6 @@
- git-annex - Allows managing files with git, without checking the file contents into git. While that may seem paradoxical, it is useful when dealing with files larger than git can currently easily handle,
- whether due to limitations in memory, time, or disk space.
+ git-annex - Allows managing files with git, without checking the file contents into git. While that may seem paradoxical, it is useful when dealing with files larger than git can currently easily handle, whether due to limitations in memory, time, or disk space.
We only recommend instant messenger programs or apps that support end-to-end encryption (E2EE). When E2EE is used, all transmissions (messages, voice, video, etc.) are encrypted before they are sent from your device. E2EE protects both the authenticity and confidentiality of the transmission as they pass through any part of the network (servers, etc.).
+
We only recommend instant messenger programs or apps that support end-to-end encryption (E2EE). When E2EE is used, all transmissions (messages, voice, video, etc.) are encrypted before they are sent from your device. E2EE protects both the authenticity and confidentiality of the transmission as they pass through any part of the network (servers, etc.).
-
All the client programs/apps we chose are free and open-source software unless otherwise mentioned. This to ensure that the code can be independently verified by experts now and in the future.
+
All the client programs/apps we chose are free and open-source software unless otherwise mentioned. This to ensure that the code can be independently verified by experts now and in the future.
-
We have described the three main types of messaging programs that exist: Centralized, Federated and Peer-to-Peer (P2P), with the advantages and disadvantages of each.
+
We have described the three main types of messaging programs that exist: Centralized, Federated and Peer-to-Peer (P2P), with the advantages and disadvantages of each.
-
Centralized
+
Centralized
-
Centralized messengers are those where every participant is on the same server or network of servers controlled by the same organization.
+
Centralized messengers are those where every participant is on the same server or network of servers controlled by the same organization.
-
Advantages
+
Advantages
+
+
New features and changes can be implemented more quickly.
New features and changes can be implemented more quickly.
-
Easier to get started with and to find contacts.
+
Being forbidden from connecting third-party clients to the centralized network that might provide for greater customization or better user experience. Often defined in Terms and Conditions of usage.
+
Poor or no documentation for third-party developers.
Being forbidden from connecting third-party clients to the centralized network that might provide for greater customization or better user experience. Often defined in Terms and Conditions of usage.
-
Poor or no documentation for third-party developers.
-
-
The ownership, privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on.
-
-
+
The ownership, privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on.
+
If you are currently using an Instant Messenger like Telegram, LINE, Viber, WhatsApp, or plain SMS, you should pick an alternative here.
Status.im - Encrypted instant messenger with an integrated Ethereum wallet (cryptocurrency) that also includes support for DApps (decentralized apps) (web apps in a curated store). Uses the Whisper protocol for P2P communication. Experimental
-
Retroshare - Encrypted instant messaging and voice/video call client. RetroShare supports both Tor and I2P.
-
-
-
-
-
-
- Recent news about breaking E2EE on centralized instant messengers
-
Status.im - Encrypted instant messenger with an integrated Ethereum wallet (cryptocurrency) that also includes support for DApps (decentralized apps) (web apps in a curated store). Uses the Whisper protocol for P2P communication. Experimental
+
Retroshare - Encrypted instant messaging and voice/video call client. RetroShare supports both Tor and I2P.
+
diff --git a/_includes/sections/live-operating-systems.html b/_includes/sections/live-operating-systems.html
index bf238f36..054fe914 100644
--- a/_includes/sections/live-operating-systems.html
+++ b/_includes/sections/live-operating-systems.html
@@ -3,7 +3,7 @@
{% include cardv2.html
title="Tails"
image="/assets/img/tools/Tails.png"
-description='Tails is a live operating system that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and circumventing censorship by forcing Internet connections through the Tor network; leaving no trace on the computer; and using state-of-the-art cryptographic tools to encrypt files, emails, and instant messages.'
+description='Tails is a live operating system that can boot on almost any computer from a DVD, USB stick, or SD card you control. It aims at preserving privacy and anonymity, and circumventing censorship by forcing Internet connections through the Tor network; leaving no trace on the computer; and using state-of-the-art cryptographic tools to encrypt files, emails, and instant messages.'
badges="info:GNU/Linux"
labels="warning:contrib:This software may depend on or recommend non-free software."
website="https://tails.boum.org/"
diff --git a/_includes/sections/mobile-operating-systems.html b/_includes/sections/mobile-operating-systems.html
index b48024e7..b55ed78d 100644
--- a/_includes/sections/mobile-operating-systems.html
+++ b/_includes/sections/mobile-operating-systems.html
@@ -1,7 +1,7 @@
Mobile Operating Systems
- Even though the source code of the following OS is provided, installing Google Apps may compromise your setup.
+ Even though the source code of the following operating systems is provided, installing Google Apps may compromise your setup.
{% include cardv2.html
diff --git a/_includes/sections/notebooks.html b/_includes/sections/notebooks.html
index 9ebd9de3..6b9daaa2 100644
--- a/_includes/sections/notebooks.html
+++ b/_includes/sections/notebooks.html
@@ -24,7 +24,7 @@ chrome="https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmk
{% include cardv2.html
title="Standard Notes"
image="/assets/img/tools/StandardNotes.png"
-description='Standard Notes is a simple and private notes app that makes your notes easy and available everywhere you are. Features end-to-end encryption on every platform, and a powerful desktop experience with themes and custom editors. It has also been independently audited (PDF).'
+description='Standard Notes is a simple and private notes app that makes your notes easy and available everywhere you are. It features end-to-end encryption on every platform, and a powerful desktop experience with themes and custom editors. It has also been independently audited (PDF).'
website="https://standardnotes.org/"
github="https://github.com/standardnotes"
windows="https://standardnotes.org/#get-started"
diff --git a/_includes/sections/operating-systems.html b/_includes/sections/operating-systems.html
index d2ebf4cf..6d51909a 100644
--- a/_includes/sections/operating-systems.html
+++ b/_includes/sections/operating-systems.html
@@ -45,38 +45,3 @@ gitlab="https://salsa.debian.org/qa/debsources"
WhonixGNU/Linux - A Debian-based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation"
and a Tor "Gateway". All communication are forced through the Tor network to accomplish this.
When running a recent enough Linux kernel, you can check the CPU vulnerabilities it detects by tail -n +1 /sys/devices/system/cpu/vulnerabilities/*. By using tail -n +1 instead of cat, the file names are also visible.
-
-
- In case you have an Intel CPU, you may notice "SMT vulnerable" display after running the tail command. To mitigate this, disable hyper-threading from the UEFI/BIOS. You can also take the following mitigation steps below if your system/distribution uses GRUB and supports /etc/default/grub.d/:
-
-
-
-
sudo mkdir /etc/default/grub.d/ to create a directory for additional grub configuration
-
echo GRUB_CMDLINE_LINUX_DEFAULT="$GRUB_CMDLINE_LINUX_DEFAULT l1tf=full,force mds=full,nosmt mitigations=auto,nosmt nosmt=force" | sudo tee /etc/default/grub.d/mitigations.cfg to create a new grub config file source with the echoed content
-
sudo grub-mkconfig -o /boot/grub/grub.cfg to generate a new grub config file including these new kernel boot flags
-
sudo reboot to reboot
-
after the reboot, check tail -n +1 /sys/devices/system/cpu/vulnerabilities/* again to see that everything referring to SMT now says "SMT disabled."
How to install/update CPU microcode firmware on Linux - Regardless of your CPU manufacturer, you should always install the latest microcode packages available to be protected from CPU vulnerabilities, especially if the command above reports no microcode in its output.
diff --git a/_includes/sections/password-managers.html b/_includes/sections/password-managers.html
index 92c1f385..e22e16a3 100644
--- a/_includes/sections/password-managers.html
+++ b/_includes/sections/password-managers.html
@@ -82,9 +82,3 @@
Password Safe - Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted username/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire username/password list.
-
-
diff --git a/_includes/sections/selfhosted-cloud.html b/_includes/sections/selfhosted-cloud.html
index 91214b93..6348cf8d 100644
--- a/_includes/sections/selfhosted-cloud.html
+++ b/_includes/sections/selfhosted-cloud.html
@@ -7,7 +7,7 @@
{% include cardv2.html
title="Nextcloud"
image="/assets/img/provider/Nextcloud.png"
-description="Nextcloud is similar in functionality to the widely used Dropbox, with the difference being that Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server with no limits on storage space or the number of connected clients."
+description="Nextcloud is a suite of client-server software for creating your own file hosting services on a private server you control. Nextcloud is free and open-source, and supports end-to-end encryption with many of its clients. The only limits on storage and bandwidth are the limits on the server provider you choose."
website="https://nextcloud.com/"
forum="https://forum.privacytools.io/t/discussion-nextcloud/287"
windows="https://nextcloud.com/install/#install-clients"
diff --git a/_includes/sections/social-networks.html b/_includes/sections/social-networks.html
index 8bd20aa2..bdbe18c8 100644
--- a/_includes/sections/social-networks.html
+++ b/_includes/sections/social-networks.html
@@ -1,13 +1,13 @@
Decentralized Social Networks
- If you are currently using Social Networks like Facebook or Twitter, you should pick an alternative here.
+ If you are currently using Social Networks like Facebook or Twitter, you should pick an alternative here.
{% include cardv2.html
title="Mastodon - Twitter Alternative"
image="/assets/img/tools/Mastodon.png"
-description='Mastodon is a social network based on open web protocols and free, open-source software. It is decentralized like email. It also has the most users, and the most diverse (in terms of interests) users; looks good; and is easy to setup. Feel welcome to join our hosted instance: social.privacytools.io'
+description='Mastodon is a social network based on open web protocols and free, open-source software. It is decentralized like email, users can exist on different servers or even different platforms but still communicate with each other. It also has the most users, and the most diverse (in terms of interests) users, it looks good, and it is easy to setup yourself. If you are looking for a server to join, you are welcome to join our hosted instance: social.privacytools.io'
website="https://joinmastodon.org/"
forum="https://forum.privacytools.io/t/discussion-mastodon/289"
github="https://github.com/tootsuite/mastodon"
@@ -26,7 +26,7 @@ web="https://joinmastodon.org/#getting-started"
{% include cardv2.html
title="diaspora* - Google+ Alternative"
image="/assets/img/tools/diaspora.png"
-description="diaspora* is based on three key philosophies: Decentralization, freedom and privacy. It is intended to address privacy concerns related to centralized social networks by allowing users set up their own server (or \"pod\") to host content; pods can then interact to share status updates, photographs, and other social data."
+description="diaspora* is based on three key philosophies: Decentralization, Freedom, and Privacy. It is intended to address privacy concerns related to centralized social networks by allowing users set up their own server (or \"pod\") to host content. Pods can then interact to share status updates, photographs, and other social data."
website="https://diasporafoundation.org/"
forum="https://forum.privacytools.io/t/discussion-diaspora/290"
github="https://github.com/diaspora/diaspora"
@@ -51,7 +51,7 @@ web="https://friendi.ca/"
{% include cardv2.html
title="PixelFed - Instagram Alternative"
image="/assets/img/provider/pixelfed.png"
-description='PixelFed is a free and ethical photo sharing platform, powered by ActivityPub federation. Pixelfed is an open-source, federated platform. You can run your own instance or join one.'
+description='PixelFed is a free and ethical photo sharing platform, powered by ActivityPub federation. Pixelfed is an open-source, federated platform. You can run your own instance or join an existing one.'
website="https://pixelfed.org/"
forum="https://forum.privacytools.io/t/discussion-pixelfed/293"
github="https://github.com/pixelfed"
@@ -73,18 +73,3 @@ web="https://gnu.io/social/"
Minds - An open-source and distributed social networking service, integrating the blockchain to reward the community.
Movim - A federated social platform that relies on the XMPP standard and therefore allows you to exchange with many other clients on all devices.
Stop using Facebook - A curated list of reasons to stop using Facebook and how to do it.
-
diff --git a/pages/os.html b/pages/os.html
index 924ebc33..08d138da 100644
--- a/pages/os.html
+++ b/pages/os.html
@@ -7,6 +7,41 @@ description: "Even your own computer could be compromising your privacy. Discove
{% include sections/operating-systems.html %}
+
When running a recent enough Linux kernel, you can check the CPU vulnerabilities it detects by tail -n +1 /sys/devices/system/cpu/vulnerabilities/*. By using tail -n +1 instead of cat, the file names are also visible.
+
+
+ In case you have an Intel CPU, you may notice "SMT vulnerable" display after running the tail command. To mitigate this, disable hyper-threading from the UEFI/BIOS. You can also take the following mitigation steps below if your system/distribution uses GRUB and supports /etc/default/grub.d/:
+
+
+
+
sudo mkdir /etc/default/grub.d/ to create a directory for additional grub configuration
+
echo GRUB_CMDLINE_LINUX_DEFAULT="$GRUB_CMDLINE_LINUX_DEFAULT l1tf=full,force mds=full,nosmt mitigations=auto,nosmt nosmt=force" | sudo tee /etc/default/grub.d/mitigations.cfg to create a new grub config file source with the echoed content
+
sudo grub-mkconfig -o /boot/grub/grub.cfg to generate a new grub config file including these new kernel boot flags
+
sudo reboot to reboot
+
after the reboot, check tail -n +1 /sys/devices/system/cpu/vulnerabilities/* again to see that everything referring to SMT now says "SMT disabled."
How to install/update CPU microcode firmware on Linux - Regardless of your CPU manufacturer, you should always install the latest microcode packages available to be protected from CPU vulnerabilities, especially if the command above reports no microcode in its output.
+
{% include sections/live-operating-systems.html %}
{% include sections/mobile-operating-systems.html %}
diff --git a/pages/providers/dns.html b/pages/providers/dns.html
index cf1aa1e8..546f2319 100644
--- a/pages/providers/dns.html
+++ b/pages/providers/dns.html
@@ -6,3 +6,82 @@ description: "Don't let Google see all your DNS traffic. Discover privacy-centri
---
{% include sections/dns.html %}
+
+
Terms
+
+
+
DNS-over-TLS (DoT) - A security protocol for encrypted DNS on a dedicated port 853. Some providers support port 443 which generally works everywhere while port 853 is often blocked by restrictive firewalls. DoT has two modes:
+
+
Oppurtunistic mode: the client attempts to form a DNS-over-TLS connection to the server on port 853 without performing certificate validation. If it fails, it will use unencrypted DNS.
+
Strict mode: the client connects to a specific hostname and performs certificate validation for it. If it fails, no DNS queries are made until it succeeds.
+
+
DNS-over-HTTPS (DoH) - Similar to DoT, but uses HTTPS instead, being indistinguishable from "normal" HTTPS traffic on port 443.
+
DNSCrypt - An older yet robust method of encrypting DNS.
Check the website of your DNS provider. They may have a page for telling "you are using our DNS." Examples include AdGuard and Cloudflare.
+
If using Firefox's trusted recursive resolver (TRR), navigate to about:networking#dns. If the TRR column says "true" for some fields, you are using DoH.
QNAME Minimization - Run dig +short txt qnamemintest.internet.nl from the command-line (taken from this NLnet Labs presentation). If you are on Windows 10, run Resolve-DnsName -Type TXT -Name qnamemintest.internet.nl from the PowerShell. You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
+
+
+
Software suggestions and Additional Information
+
+
+
Encrypted DNS clients for desktop:
+
+
Firefox comes with built-in DoH support with Cloudflare set as the default resolver, but can be configured to use any DoH resolver. Currently Mozilla is conducting studies before enabling DoH by default for all US-based Firefox users.
+
+
DNS over HTTPS can be enabled in Menu -> Preferences (about:preferences) -> Network Settings -> Enable DNS over HTTPS. Set "Use Provider" to "Custom", and enter your DoH provider's address.
+
Advanced users may enable it in about:config by setting network.trr.custom_uri and network.trr.uri as the address you find from the documentation of your DoH provider and network.trr.mode as 2. It may also be desirable to set network.security.esni.enabled to True in order to enable encrypted SNI and make sites supporting ESNI a bit more difficult to track.
We recommend selecting Private DNS provider hostname and entering the DoT address from documentation of your DoT provider to enable strict mode (see Terms above).
+
diff --git a/pages/providers/email.html b/pages/providers/email.html
index 83a821a0..974e0018 100644
--- a/pages/providers/email.html
+++ b/pages/providers/email.html
@@ -15,3 +15,13 @@ description: "Find a secure email provider that will keep your privacy in mind.
{% include sections/email-providers.html %}
+
+
Related Information
+
+
+
Aging 'Privacy' Law Leaves Cloud E-Mail Open to Cops - Data stored in the cloud for longer than 6 months is considered abandoned and may be accessed by intelligence agencies without
+ a warrant. Learning: Use an external email client like Thunderbird or Enigmail, download your emails and store them locally. Never leave them on the server.
Autistici/Inventati server compromised - The cryptographic services offered by the Autistici/Inventati server have been compromised on 15th June 2004. It was discovered on 21st June 2005. One year
+ later. During an enquiry on a single mailbox, the Postal Police may have tapped for a whole year every user's private communication going through the server autistici.org/inventati.org.
+
diff --git a/pages/providers/social-networks.html b/pages/providers/social-networks.html
index b9ef5d77..744363c9 100644
--- a/pages/providers/social-networks.html
+++ b/pages/providers/social-networks.html
@@ -6,3 +6,18 @@ description: "Find a social network that doesn't pry into your data or monetize
---
{% include sections/social-networks.html %}
+
+