Fix some typos, grammar, etc. on the site
Fixes some issues with typos, capitalization, grammar, and et cetera.
This commit is contained in:
@ -73,7 +73,7 @@
|
|||||||
</a>
|
</a>
|
||||||
<p class="mt-2">
|
<p class="mt-2">
|
||||||
<strong>No Ads, No Google Analytics, No Affiliates, No Cross-Site Requests.</strong>
|
<strong>No Ads, No Google Analytics, No Affiliates, No Cross-Site Requests.</strong>
|
||||||
<em>privacytools.io is a socially motivated website that provides information for protecting your data security and privacy. Never trust any company with your privacy, always encrypt.</em>
|
<em>privacytools.io is a socially-motivated website that provides information for protecting your data security and privacy. Never trust any company with your privacy, always encrypt.</em>
|
||||||
<a href="/privacy/">View our privacy statement</a>.
|
<a href="/privacy/">View our privacy statement</a>.
|
||||||
</p>
|
</p>
|
||||||
<p class="text-left">
|
<p class="text-left">
|
||||||
|
@ -12,7 +12,7 @@
|
|||||||
</a>
|
</a>
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>You need to find what <strong>most browsers</strong> are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a <a href="https://addons.mozilla.org/firefox/addon/uaswitcher/">spoofed user agent string</a> to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.</p>
|
<p>You need to find what <strong>most browsers</strong> are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a <a href="https://addons.mozilla.org/firefox/addon/uaswitcher/">spoofed user agent string</a> to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.</p>
|
||||||
|
|
||||||
<p>Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use <a href="#addons"><i class="fas fa-link"></i> free software plugins</a> like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.</p>
|
<p>Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use <a href="#addons"><i class="fas fa-link"></i> free software plugins</a> like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.</p>
|
||||||
|
|
||||||
|
@ -6,7 +6,7 @@
|
|||||||
{% include cardv2.html
|
{% include cardv2.html
|
||||||
title="Firefox"
|
title="Firefox"
|
||||||
image="/assets/img/tools/Firefox.png"
|
image="/assets/img/tools/Firefox.png"
|
||||||
description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our
|
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our
|
||||||
recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.'
|
recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.'
|
||||||
website="https://firefox.com"
|
website="https://firefox.com"
|
||||||
forum="https://forum.privacytools.io/t/discussion-firefox/279"
|
forum="https://forum.privacytools.io/t/discussion-firefox/279"
|
||||||
@ -22,7 +22,7 @@ netbsd="http://pkgsrc.se/www/firefox"
|
|||||||
{% include cardv2.html
|
{% include cardv2.html
|
||||||
title="Tor Browser - Provides Anonymity"
|
title="Tor Browser - Provides Anonymity"
|
||||||
image="/assets/img/tools/Tor-Browser.png"
|
image="/assets/img/tools/Tor-Browser.png"
|
||||||
description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption and an advanced proxy. <a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor">How does Tor work?</a>'
|
description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy. <a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor">How does Tor work?</a>'
|
||||||
website="https://www.torproject.org/"
|
website="https://www.torproject.org/"
|
||||||
tor="http://expyuzz4wqqyqhjn.onion/"
|
tor="http://expyuzz4wqqyqhjn.onion/"
|
||||||
forum="https://forum.privacytools.io/t/discussion-tor-browser/278"
|
forum="https://forum.privacytools.io/t/discussion-tor-browser/278"
|
||||||
@ -40,7 +40,7 @@ linux="https://www.torproject.org/download/"
|
|||||||
{% include cardv2.html
|
{% include cardv2.html
|
||||||
title="Firefox"
|
title="Firefox"
|
||||||
image="/assets/img/tools/Firefox.png"
|
image="/assets/img/tools/Firefox.png"
|
||||||
description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our
|
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our
|
||||||
recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.'
|
recommendations: <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> and <a href="#about_config"><i class="fas fa-link"></i> about:config</a> and get the <a href="#addons"><i class="fas fa-link"></i> privacy add-ons</a>.'
|
||||||
website="https://www.mozilla.org/en-US/firefox/mobile/"
|
website="https://www.mozilla.org/en-US/firefox/mobile/"
|
||||||
forum="https://forum.privacytools.io/t/discussion-firefox/279"
|
forum="https://forum.privacytools.io/t/discussion-firefox/279"
|
||||||
@ -79,7 +79,7 @@ android="https://www.bromite.org/#download-bromite"
|
|||||||
<ul>
|
<ul>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://www.stoutner.com/privacy-browser/">Privacy Browser</a>
|
<a href="https://www.stoutner.com/privacy-browser/">Privacy Browser</a>
|
||||||
- An open source web browser focused on user privacy. Features include integrated ad blocking with <a href="https://easylist.to/">EasyList</a>, <a href="https://www.stoutner.com/privacy-browser-2-5/">SSL certificate pinning</a>, and <a href='https://guardianproject.info/apps/orbot/'>Tor Orbot proxy support.</a>
|
- An open-source web browser focused on user privacy. Features include integrated ad blocking with <a href="https://easylist.to/">EasyList</a>, <a href="https://www.stoutner.com/privacy-browser-2-5/">SSL certificate pinning</a>, and <a href='https://guardianproject.info/apps/orbot/'>Tor Orbot proxy support.</a>
|
||||||
<a href="https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US">
|
<a href="https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US">
|
||||||
<span class="badge badge-warning" data-toggle="tooltip" title="Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid.">
|
<span class="badge badge-warning" data-toggle="tooltip" title="Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid.">
|
||||||
<span class="fas fa-exclamation-triangle"></span>
|
<span class="fas fa-exclamation-triangle"></span>
|
||||||
@ -95,7 +95,7 @@ android="https://www.bromite.org/#download-bromite"
|
|||||||
{% include cardv2.html
|
{% include cardv2.html
|
||||||
title="Firefox"
|
title="Firefox"
|
||||||
image="/assets/img/tools/Firefox.png"
|
image="/assets/img/tools/Firefox.png"
|
||||||
description='Firefox is fast, reliable, open source and respects your privacy. Note: because of limitations set by Apple in iOS, our recommended tweaks cannot be applied. However Firefox for iOS has an <a href="https://support.mozilla.org/en-US/kb/enhanced-tracking-protection-firefox-ios">Enhanced Tracking Protection</a> feature that uses a list provided by <a href="https://disconnect.me/trackerprotection">Disconnect</a> to identify and block ad, social and analytics trackers, as well as cryptominers and fingerprinters.'
|
description='Firefox is fast, reliable, open-source, and respects your privacy. Note: Because of limitations set by Apple in iOS, our recommended tweaks cannot be applied. However, Firefox for iOS has an <a href="https://support.mozilla.org/en-US/kb/enhanced-tracking-protection-firefox-ios">Enhanced Tracking Protection</a> feature that uses a list provided by <a href="https://disconnect.me/trackerprotection">Disconnect</a> to identify and block ad, social, and analytics trackers, as well as cryptominers and fingerprinters.'
|
||||||
website="https://www.mozilla.org/en-US/firefox/mobile/"
|
website="https://www.mozilla.org/en-US/firefox/mobile/"
|
||||||
forum="https://forum.privacytools.io/t/discussion-firefox/279"
|
forum="https://forum.privacytools.io/t/discussion-firefox/279"
|
||||||
source="https://github.com/mozilla-mobile/firefox-ios"
|
source="https://github.com/mozilla-mobile/firefox-ios"
|
||||||
@ -106,7 +106,7 @@ ios="https://apps.apple.com/us/app/firefox-private-safe-browser/id989804926"
|
|||||||
{% include cardv2.html
|
{% include cardv2.html
|
||||||
title="Onion Browser"
|
title="Onion Browser"
|
||||||
image="/assets/img/tools/onionbrowser.png"
|
image="/assets/img/tools/onionbrowser.png"
|
||||||
description='Onion Browser is an open source browser that lets you browse the web anonymously over the Tor network on iOS devices, and is endorsed by the Tor Project. Warning: there are certain anonymity related <a href="https://onionbrowser.com/#security-advisories">issues</a> with Onion browser due to iOS limitations.'
|
description='Onion Browser is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices, and is endorsed by the Tor Project. Warning: there are certain anonymity related <a href="https://onionbrowser.com/#security-advisories">issues</a> with Onion Browser due to iOS limitations.'
|
||||||
website="https://onionbrowser.com/"
|
website="https://onionbrowser.com/"
|
||||||
forum="https://forum.privacytools.io/t/discussion-onion-browser-browsers/1523"
|
forum="https://forum.privacytools.io/t/discussion-onion-browser-browsers/1523"
|
||||||
github="https://github.com/OnionBrowser/OnionBrowser"
|
github="https://github.com/OnionBrowser/OnionBrowser"
|
||||||
@ -117,7 +117,7 @@ ios="https://apps.apple.com/us/app/onion-browser/id519296448"
|
|||||||
{% include cardv2.html
|
{% include cardv2.html
|
||||||
title="DuckDuckGo Privacy Browser"
|
title="DuckDuckGo Privacy Browser"
|
||||||
image="/assets/img/provider/DuckDuckGo.png"
|
image="/assets/img/provider/DuckDuckGo.png"
|
||||||
description='DuckDuckGo Privacy Browser is an open source web browser that has built-in ad and tracker blocking and utilizes <a href="https://tosdr.org/">ToS;DR</a> to rate the privacy policies of the sites you visit.'
|
description='DuckDuckGo Privacy Browser is an open-source web browser that has built-in ad and tracker blocking and utilizes <a href="https://tosdr.org/">ToS;DR</a> to rate the privacy policies of the sites you visit.'
|
||||||
website="https://duckduckgo.com/app"
|
website="https://duckduckgo.com/app"
|
||||||
tor="https://3g2upl4pq6kufc4m.onion/app"
|
tor="https://3g2upl4pq6kufc4m.onion/app"
|
||||||
forum="https://forum.privacytools.io/t/discussion-duckduckgo-privacy-browser-browsers/1524"
|
forum="https://forum.privacytools.io/t/discussion-duckduckgo-privacy-browser-browsers/1524"
|
||||||
@ -130,6 +130,6 @@ ios="https://apps.apple.com/us/app/duckduckgo-privacy-browser/id663592361"
|
|||||||
<ul>
|
<ul>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://snowhaze.com/en/index.html">SnowHaze</a>
|
<a href="https://snowhaze.com/en/index.html">SnowHaze</a>
|
||||||
- An open source web browser with built-in ad, tracker, cookie, and fingerprint blocking, all customizable on a per-site basis.
|
- An open-source web browser with built-in ad, tracker, cookie, and fingerprint blocking, all customizable on a per-site basis.
|
||||||
</li>
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
@ -23,7 +23,7 @@
|
|||||||
<li>Done. Do the WebRTC leak test again.</li>
|
<li>Done. Do the WebRTC leak test again.</li>
|
||||||
</ol>
|
</ol>
|
||||||
|
|
||||||
<p>If you want to make sure every single WebRTC related setting is really disabled change these settings:</p>
|
<p>If you want to make sure every single WebRTC-related setting is really disabled change these settings:</p>
|
||||||
|
|
||||||
<ol class="long-string-list">
|
<ol class="long-string-list">
|
||||||
<li>media.peerconnection.turn.disable = true</li>
|
<li>media.peerconnection.turn.disable = true</li>
|
||||||
@ -40,7 +40,7 @@
|
|||||||
|
|
||||||
<h3>How to fix the WebRTC Leak in Google Chrome?</h3>
|
<h3>How to fix the WebRTC Leak in Google Chrome?</h3>
|
||||||
|
|
||||||
<p>WebRTC cannot be fully disabled in Chrome, however it is possible to change its routing settings (and prevent leaks) using an extension. Two open source solutions include <a href="https://chrome.google.com/webstore/detail/webrtc-leak-prevent/eiadekoaikejlgdbkbdfeijglgfdalml">WebRTC Leak Prevent</a> (options may need to be changed depending on the scenario), and <a href="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm">uBlock Origin</a> (select "Prevent WebRTC from leaking local IP addresses" in Settings).</p>
|
<p>WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include <a href="https://chrome.google.com/webstore/detail/webrtc-leak-prevent/eiadekoaikejlgdbkbdfeijglgfdalml">WebRTC Leak Prevent</a> (options may need to be changed depending on the scenario), and <a href="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm">uBlock Origin</a> (select "Prevent WebRTC from leaking local IP addresses" in Settings).</p>
|
||||||
|
|
||||||
<h3>What about other browsers?</h3>
|
<h3>What about other browsers?</h3>
|
||||||
|
|
||||||
|
@ -50,10 +50,10 @@
|
|||||||
|
|
||||||
<ul>
|
<ul>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://fruux.com/">fruux</a> - a unified contacts/calendaring system that works across platforms and devices.
|
<a href="https://fruux.com/">fruux</a> - A unified contacts/calendaring system that works across platforms and devices.
|
||||||
</li>
|
</li>
|
||||||
|
|
||||||
<li>
|
<li>
|
||||||
<a href="../cloud">cloud backups</a> - consider regularly exporting your calendar and or contacts and backing them up on a separate storage drive or uploading them to cloud storage (ideally after <a href="../encryption-tools/">encrypting</a> them).
|
<a href="../cloud">cloud backups</a> - Consider regularly exporting your calendar and or contacts and backing them up on a separate storage drive or uploading them to cloud storage (ideally after <a href="../encryption-tools/">encrypting</a> them).
|
||||||
</li>
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
{% include cardv2.html
|
{% include cardv2.html
|
||||||
title="Nextcloud - Choose your hoster"
|
title="Nextcloud - Choose your hoster"
|
||||||
image="/assets/img/provider/Nextcloud.png"
|
image="/assets/img/provider/Nextcloud.png"
|
||||||
description="Similar functionally to the widely used Dropbox, with the difference being that Nextcloud is free and open-source, and thereby allowing anyone to install and operate it without charge on a private server, with no limits on storage space or the number of connected clients."
|
description="Nextcloud is similar in functionality to the widely-used Dropbox, with the difference being that Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server, with no limits on storage space or the number of connected clients."
|
||||||
website="https://nextcloud.com/"
|
website="https://nextcloud.com/"
|
||||||
forum="https://forum.privacytools.io/t/discussion-nextcloud/287"
|
forum="https://forum.privacytools.io/t/discussion-nextcloud/287"
|
||||||
github="https://github.com/nextcloud"
|
github="https://github.com/nextcloud"
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
title="Firefox Send"
|
title="Firefox Send"
|
||||||
image="/assets/img/tools/Firefox-Send.png"
|
image="/assets/img/tools/Firefox-Send.png"
|
||||||
website="https://send.firefox.com/"
|
website="https://send.firefox.com/"
|
||||||
description="Send uses end-to-end encryption to keep your data secure from the moment you share to the moment your file is opened. It also offers security controls that you can set. You can choose when your file link expires, the number of downloads, and whether to add an optional password for an extra layer of security."
|
description="Firefox Send uses end-to-end encryption to keep your data secure from the moment you share to the moment your file is opened. It also offers security controls that you can set. You can choose when your file link expires, the number of downloads, and whether to add an optional password for an extra layer of security."
|
||||||
forum="https://forum.privacytools.io/t/discussion-firefox-send/755"
|
forum="https://forum.privacytools.io/t/discussion-firefox-send/755"
|
||||||
github="https://github.com/mozilla/send"
|
github="https://github.com/mozilla/send"
|
||||||
web="https://send.firefox.com/"
|
web="https://send.firefox.com/"
|
||||||
@ -45,5 +45,5 @@ netbsd="https://pypi.org/project/magic-wormhole/"
|
|||||||
|
|
||||||
<ul>
|
<ul>
|
||||||
<li><a href="https://github.com/schollz/croc">croc</a> - Easily and securely send things from one computer to another.</li>
|
<li><a href="https://github.com/schollz/croc">croc</a> - Easily and securely send things from one computer to another.</li>
|
||||||
<li><a href="https://freedombox.org/">FreedomBox</a> - Designed to be your own inexpensive server at home. It runs free software and offers an increasing number of services ranging from a calendar or jabber server to a wiki or VPN.</li>
|
<li><a href="https://freedombox.org/">FreedomBox</a> - Designed to be your own inexpensive server at home. It runs free software and offers an increasing number of services ranging from a calendar or Jabber server to a wiki or VPN.</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
<img src="/assets/img/layout/UKUSA.png" width="260" height="115" class="img-fluid float-right ml-2" alt="UKUSA Agreement">
|
<img src="/assets/img/layout/UKUSA.png" width="260" height="115" class="img-fluid float-right ml-2" alt="UKUSA Agreement">
|
||||||
|
|
||||||
<p>The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and <a href="https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">share intelligence</a> to <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.</p>
|
<p>The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and <a href="https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">share intelligence</a> to <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.</p>
|
||||||
|
|
||||||
<div class="row mb-3">
|
<div class="row mb-3">
|
||||||
{% include panel.html color="danger"
|
{% include panel.html color="danger"
|
||||||
|
@ -26,7 +26,7 @@ ios="https://apps.apple.com/us/app/signal-private-messenger/id874139669"
|
|||||||
{% include cardv2.html
|
{% include cardv2.html
|
||||||
title="Wire"
|
title="Wire"
|
||||||
image="/assets/img/tools/wire.png"
|
image="/assets/img/tools/wire.png"
|
||||||
description="A free software End-to-End Encrypted chatting application that supports instant messaging, voice, and video calls. Full source code is available."
|
description="A free end-to-end encrypted chatting application that supports instant messaging, voice, and video calls. Full source code is available."
|
||||||
labels="warning:<a href=//www.vice.com/en_us/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text>Warning</a>:Wire stores some plaintext metadata about its users on their servers. This data includes profile names, profile pictures, usernames, and users' lists of connections and conversations.|success:VoIP"
|
labels="warning:<a href=//www.vice.com/en_us/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text>Warning</a>:Wire stores some plaintext metadata about its users on their servers. This data includes profile names, profile pictures, usernames, and users' lists of connections and conversations.|success:VoIP"
|
||||||
website="https://wire.com/"
|
website="https://wire.com/"
|
||||||
forum="https://forum.privacytools.io/t/discussion-wire/750"
|
forum="https://forum.privacytools.io/t/discussion-wire/750"
|
||||||
|
@ -69,7 +69,7 @@
|
|||||||
|
|
||||||
<img src="/assets/img/layout/USA.png" width="200" height="200" class="img-fluid float-right ml-3" alt="USA">
|
<img src="/assets/img/layout/USA.png" width="200" height="200" class="img-fluid float-right ml-3" alt="USA">
|
||||||
|
|
||||||
<p>Services based in the United States are not recommended because of the country's surveillance programs, use of <a href="https://www.eff.org/issues/national-security-letters/faq">National Security Letters</a> (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html">secretly force</a> companies to grant complete access to customer data and transform the service into a tool of mass surveillance.</p>
|
<p>Services based in the United States are not recommended because of the country's surveillance programs and use of <a href="https://www.eff.org/issues/national-security-letters/faq">National Security Letters</a> (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html">secretly force</a> companies to grant complete access to customer data and transform the service into a tool of mass surveillance.</p>
|
||||||
|
|
||||||
<p>An example of this is <a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit</a> – a secure email service created by Ladar Levison. The FBI <a href="https://www.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy">requested</a> Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access
|
<p>An example of this is <a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit</a> – a secure email service created by Ladar Levison. The FBI <a href="https://www.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy">requested</a> Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access
|
||||||
communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.</p>
|
communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.</p>
|
||||||
|
@ -3,7 +3,7 @@
|
|||||||
{% include cardv2.html
|
{% include cardv2.html
|
||||||
title="Tails"
|
title="Tails"
|
||||||
image="/assets/img/tools/Tails.png"
|
image="/assets/img/tools/Tails.png"
|
||||||
description='Tails is a live operating system, that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and helps to: Use the Internet anonymously and circumvent censorship; Internet connections go through the Tor network; leave no trace on the computer; use state-of-the-art cryptographic tools to encrypt files, emails and instant messaging.'
|
description='Tails is a live operating system that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and helps you to use the Internet anonymously and circumvent censorship by forcing Internet connections to go through the Tor network; leave no trace on the computer; and use state-of-the-art cryptographic tools to encrypt files, emails and instant messaging.'
|
||||||
badges="info:GNU/Linux"
|
badges="info:GNU/Linux"
|
||||||
labels="warning:contrib:This software may depend on or recommend non-free software."
|
labels="warning:contrib:This software may depend on or recommend non-free software."
|
||||||
website="https://tails.boum.org/"
|
website="https://tails.boum.org/"
|
||||||
|
@ -33,5 +33,5 @@ git="https://gogs.librecmc.org/libreCMC/libreCMC"
|
|||||||
|
|
||||||
<ul>
|
<ul>
|
||||||
<li><a href="https://www.openbsd.org/">OpenBSD</a> <span class="badge badge-info">BSD</span> - A project that produces a free, multi-platform 4.4BSD-based UNIX-like operating system. Emphasizes portability, standardization, correctness, proactive security and integrated cryptography.</li>
|
<li><a href="https://www.openbsd.org/">OpenBSD</a> <span class="badge badge-info">BSD</span> - A project that produces a free, multi-platform 4.4BSD-based UNIX-like operating system. Emphasizes portability, standardization, correctness, proactive security and integrated cryptography.</li>
|
||||||
<li><a href="https://dd-wrt.com/">DD-WRT</a> <span class="badge badge-info">Linux</span> <span class="badge badge-warning" data-toggle="tooltip" title="This software may depend on or recommend non-free software.">contrib <i class="far fa-question-circle"></i></span> - A is Linux-based firmware for wireless routers and wireless access points. It is compatible with several models of routers and access points.</li>
|
<li><a href="https://dd-wrt.com/">DD-WRT</a> <span class="badge badge-info">Linux</span> <span class="badge badge-warning" data-toggle="tooltip" title="This software may depend on or recommend non-free software.">contrib <i class="far fa-question-circle"></i></span> - A Linux-based firmware for wireless routers and wireless access points. It is compatible with several models of routers and access points.</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
@ -9,7 +9,7 @@
|
|||||||
title="Riot.im (Matrix)"
|
title="Riot.im (Matrix)"
|
||||||
image="/assets/img/tools/Riot.png"
|
image="/assets/img/tools/Riot.png"
|
||||||
description="Riot.im is a federated free-software messaging application based on the <a href\"https://matrix.org/\">Matrix</a> protocol, a recent open protocol for real-time communication offering optional E2E encryption. It also has bridging functionality, allowing you to connect to other chat protocols such as IRC or Telegram."
|
description="Riot.im is a federated free-software messaging application based on the <a href\"https://matrix.org/\">Matrix</a> protocol, a recent open protocol for real-time communication offering optional E2E encryption. It also has bridging functionality, allowing you to connect to other chat protocols such as IRC or Telegram."
|
||||||
labels="warning:<a href=//github.com/vector-im/riot-web/issues/6779>Experimental E2EE</a>:The end-to-end encryption is currently in beta and the mobile client states 'End-to-end encryption is in beta and may not be reliable. You should not yet trust it to secure data."
|
labels="warning:<a href=//github.com/vector-im/riot-web/issues/6779>Experimental E2EE</a>:The end-to-end encryption is currently in beta and the mobile client states, 'End-to-end encryption is in beta and may not be reliable. You should not yet trust it to secure data.'"
|
||||||
website="https://about.riot.im/"
|
website="https://about.riot.im/"
|
||||||
forum="https://forum.privacytools.io/t/discussion-riot-im/665/"
|
forum="https://forum.privacytools.io/t/discussion-riot-im/665/"
|
||||||
github="https://github.com/vector-im/riot-web/"
|
github="https://github.com/vector-im/riot-web/"
|
||||||
@ -27,7 +27,7 @@
|
|||||||
title="Rocket.chat"
|
title="Rocket.chat"
|
||||||
image="/assets/img/tools/rocket.chat.png"
|
image="/assets/img/tools/rocket.chat.png"
|
||||||
description="Rocket.chat is an self-hostable open source platform for team communication. It has optional federation and experimental E2EE."
|
description="Rocket.chat is an self-hostable open source platform for team communication. It has optional federation and experimental E2EE."
|
||||||
labels="warning:<a href=//rocket.chat/docs/user-guides/end-to-end-encryption/>Experimental E2EE</a>:Regarding E2EE their documentation states 'This feature is currently in alpha. It's also not yet supported on mobile'. There is no forward secrecy so compromised decryption password would leak all messages. The federation was also added afterwards potentially causing room for mistakes."
|
labels="warning:<a href=//rocket.chat/docs/user-guides/end-to-end-encryption/>Experimental E2EE</a>:Regarding E2EE their documentation states 'This feature is currently in alpha. It's also not yet supported on mobile'. There is no forward secrecy so compromised decryption password would leak all messages. Federation was also added afterwards, potentially causing room for mistakes."
|
||||||
website="https://rocket.chat/"
|
website="https://rocket.chat/"
|
||||||
forum="https://forum.privacytools.io/t/discussion-rocket-chat/1223"
|
forum="https://forum.privacytools.io/t/discussion-rocket-chat/1223"
|
||||||
github="https://github.com/rocketchat/"
|
github="https://github.com/rocketchat/"
|
||||||
|
@ -12,11 +12,11 @@
|
|||||||
</div>
|
</div>
|
||||||
<div class="col">
|
<div class="col">
|
||||||
<h2>Mullvad <span class="badge badge-info">EUR €60/Year</span></h2>
|
<h2>Mullvad <span class="badge badge-info">EUR €60/Year</span></h2>
|
||||||
<p><strong>Mullvad</strong> is a fast and inexpensive VPN with a serious focus on transparency and security, they have been in operation since <strong>2009</strong>. It is the only VPN provider that currently meets our criteria for recommendation. Mullvad is based in <span class="flag-icon flag-icon-se"></span> Sweden and does not have a free trial. Visit <a href="https://mullvad.net/">mullvad.net</a> to create an account.</p>
|
<p><strong>Mullvad</strong> is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since <strong>2009</strong>. It is the only VPN provider that currently meets our criteria for recommendation. Mullvad is based in <span class="flag-icon flag-icon-se"></span> Sweden and does not have a free trial. Visit <a href="https://mullvad.net/">mullvad.net</a> to create an account.</p>
|
||||||
<h5><span class="badge badge-success">409+ Servers</span></h5>
|
<h5><span class="badge badge-success">409+ Servers</span></h5>
|
||||||
<p>Mullvad has 409 servers in 38 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.</p>
|
<p>Mullvad has 409 servers in 38 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.</p>
|
||||||
<h5><span class="badge badge-success">WireGuard Support</span></h5>
|
<h5><span class="badge badge-success">WireGuard Support</span></h5>
|
||||||
<p>In addition to standard OpenVPN connections, Mullvad supports Wireguard. Wireguard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.</p>
|
<p>In addition to standard OpenVPN connections, Mullvad supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.</p>
|
||||||
<h5><span class="badge badge-success">Independently Audited</span></h5>
|
<h5><span class="badge badge-success">Independently Audited</span></h5>
|
||||||
<p>Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest report <a href="https://cure53.de/pentest-report_mullvad_v2.pdf">published at cure53.de</a>. The security researchers concluded:</p>
|
<p>Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest report <a href="https://cure53.de/pentest-report_mullvad_v2.pdf">published at cure53.de</a>. The security researchers concluded:</p>
|
||||||
<blockquote class="blockquote">
|
<blockquote class="blockquote">
|
||||||
@ -58,7 +58,7 @@
|
|||||||
<h5><span class="badge badge-success">442+ Servers</span></h5>
|
<h5><span class="badge badge-success">442+ Servers</span></h5>
|
||||||
<p>ProtonVPN has 442 servers in 33 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.</p>
|
<p>ProtonVPN has 442 servers in 33 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.</p>
|
||||||
<h5><span class="badge badge-success">Accepts Bitcoin</span></h5>
|
<h5><span class="badge badge-success">Accepts Bitcoin</span></h5>
|
||||||
<p>ProtonVPN does technically accept Bitcoin payments, however you either need to have an existing account, or contact their support team in advance to register with Bitcoin.</p>
|
<p>ProtonVPN does technically accept Bitcoin payments; however, you either need to have an existing account, or contact their support team in advance to register with Bitcoin.</p>
|
||||||
<h5><span class="badge badge-success">Mobile Clients</span></h5>
|
<h5><span class="badge badge-success">Mobile Clients</span></h5>
|
||||||
<p>In addition to providing standard OpenVPN configuration files, ProtonVPN has mobile clients for iOS or Android allowing for easy connections to their servers.</p>
|
<p>In addition to providing standard OpenVPN configuration files, ProtonVPN has mobile clients for iOS or Android allowing for easy connections to their servers.</p>
|
||||||
<h5><span class="badge badge-info">Extra Functionality</span></h5>
|
<h5><span class="badge badge-info">Extra Functionality</span></h5>
|
||||||
@ -72,7 +72,7 @@
|
|||||||
</div>
|
</div>
|
||||||
<div class="col">
|
<div class="col">
|
||||||
<h2>IVPN <span class="badge badge-info">USD $100/Year</span></h2>
|
<h2>IVPN <span class="badge badge-info">USD $100/Year</span></h2>
|
||||||
<p><strong>IVPN</strong> is another strong premium VPN provider, and they have been in operation since <strong>2009</strong>. IVPN is based in <span class="flag-icon flag-icon-gi"></span> Gibraltar and offers a 3 day free trial. Unfortunately due to its lack of an independent security audit it does not meet the complete criteria for recommendation, see our notes below.</p>
|
<p><strong>IVPN</strong> is another strong premium VPN provider, and they have been in operation since <strong>2009</strong>. IVPN is based in <span class="flag-icon flag-icon-gi"></span> Gibraltar and offers a 3 day free trial. Unfortunately, due to its lack of an independent security audit, it does not meet the complete criteria for recommendation, see our notes below.</p>
|
||||||
<h5><span class="badge badge-danger">No Security Audit</span></h5>
|
<h5><span class="badge badge-danger">No Security Audit</span></h5>
|
||||||
<p>IVPN has undergone a <a href="https://cure53.de/audit-report_ivpn.pdf">no-logging audit from Cure53</a> which concluded in agreement with IVPN's no-logging claim. However, IVPN has not undergone a more comprehensive security audit by an independent third party, and therefore cannot be strongly recommended at this time. We have still chosen to list it on this page with the assumption that an audit will be published soon: The IVPN team <a href="https://twitter.com/yaelwrites/status/1161796418220089344">reportedly plans to begin the process in September</a>.</p>
|
<p>IVPN has undergone a <a href="https://cure53.de/audit-report_ivpn.pdf">no-logging audit from Cure53</a> which concluded in agreement with IVPN's no-logging claim. However, IVPN has not undergone a more comprehensive security audit by an independent third party, and therefore cannot be strongly recommended at this time. We have still chosen to list it on this page with the assumption that an audit will be published soon: The IVPN team <a href="https://twitter.com/yaelwrites/status/1161796418220089344">reportedly plans to begin the process in September</a>.</p>
|
||||||
<p>We will reevaluate this listing at the end of 2019 or when the aforementioned report has been published, whichever is sooner.
|
<p>We will reevaluate this listing at the end of 2019 or when the aforementioned report has been published, whichever is sooner.
|
||||||
|
@ -80,7 +80,7 @@
|
|||||||
<h3>Related Information</h3>
|
<h3>Related Information</h3>
|
||||||
|
|
||||||
<ul>
|
<ul>
|
||||||
<li><a href="https://privacy.microsoft.com/en-us/privacystatement">Microsoft Privacy Statement</a> - Microsoft collects, uses and discloses personal information as described here. This allows One Drive data, Cortana searches and MS browser history to be sold to third parties.</li>
|
<li><a href="https://privacy.microsoft.com/en-us/privacystatement">Microsoft Privacy Statement</a> - Microsoft collects, uses and discloses personal information as described here. This allows OneDrive data, Cortana searches, and MS browser history to be sold to third parties.</li>
|
||||||
<li><a href="https://support.microsoft.com/en-us/help/4468233/cortana-and-privacy-microsoft-privacy">Cortana and privacy</a> - To personalize your experience and provide the best possible suggestions, Cortana accesses your email and other communications and collects data about your contacts (People), like their title, suffix, first name, last name, middle name, nicknames, and company name. If you call, email, or text someone or they call, email, or text you, Cortana collects that person’s email address or phone number.</li>
|
<li><a href="https://support.microsoft.com/en-us/help/4468233/cortana-and-privacy-microsoft-privacy">Cortana and privacy</a> - To personalize your experience and provide the best possible suggestions, Cortana accesses your email and other communications and collects data about your contacts (People), like their title, suffix, first name, last name, middle name, nicknames, and company name. If you call, email, or text someone or they call, email, or text you, Cortana collects that person’s email address or phone number.</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
@ -89,7 +89,7 @@
|
|||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<h3>Some good news</h3>
|
<h3>Some good news</h3>
|
||||||
<ul>
|
<ul>
|
||||||
<li><a href="https://github.com/crazy-max/WindowsSpyBlocker/releases">WindowsSpyBlocker</a> - Open source tool that blocks data collection.</li>
|
<li><a href="https://github.com/crazy-max/WindowsSpyBlocker/releases">WindowsSpyBlocker</a> - Open-source tool that blocks data collection.</li>
|
||||||
<li><a href="https://www.ghacks.net/2015/08/14/comparison-of-windows-10-privacy-tools/">Comparison of Windows 10 Privacy tools</a> - ghacks.net</li>
|
<li><a href="https://www.ghacks.net/2015/08/14/comparison-of-windows-10-privacy-tools/">Comparison of Windows 10 Privacy tools</a> - ghacks.net</li>
|
||||||
</ul>
|
</ul>
|
||||||
</div>
|
</div>
|
||||||
|
@ -47,7 +47,7 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your
|
|||||||
|
|
||||||
<div class="col-12">
|
<div class="col-12">
|
||||||
<h3><span class="badge badge-info">Technology</span></h3>
|
<h3><span class="badge badge-info">Technology</span></h3>
|
||||||
<p>We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. <strong>If</strong> a VPN provides their own custom client, we require a kill-switch to block network data leaks when disconnected.</p>
|
<p>We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. <strong>If</strong> a VPN provides their own custom client, we require a killswitch to block network data leaks when disconnected.</p>
|
||||||
</div>
|
</div>
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<p><strong>Minimum to Qualify:</strong></p>
|
<p><strong>Minimum to Qualify:</strong></p>
|
||||||
@ -59,8 +59,8 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your
|
|||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<p><strong>Best Case:</strong></p>
|
<p><strong>Best Case:</strong></p>
|
||||||
<ul>
|
<ul>
|
||||||
<li>OpenVPN and Wireguard support.</li>
|
<li>OpenVPN and WireGuard support.</li>
|
||||||
<li>Kill-switch with highly configurable options (enable/disable on certain networks, on boot, etc.)</li>
|
<li>Killswitch with highly configurable options (enable/disable on certain networks, on boot, etc.)</li>
|
||||||
<li>Easy-to-use mobile clients, especially open-source.</li>
|
<li>Easy-to-use mobile clients, especially open-source.</li>
|
||||||
</ul>
|
</ul>
|
||||||
</div>
|
</div>
|
||||||
@ -86,7 +86,7 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your
|
|||||||
|
|
||||||
<div class="col-12">
|
<div class="col-12">
|
||||||
<h3><span class="badge badge-info">Security</span></h3>
|
<h3><span class="badge badge-info">Security</span></h3>
|
||||||
<p>A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards for their OpenVPN connections. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security. Ideally in a very comprehensive manner and on a repeated (yearly) basis.</p>
|
<p>A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards for their OpenVPN connections. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security, ideally in a very comprehensive manner and on a repeated (yearly) basis.</p>
|
||||||
</div>
|
</div>
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<p><strong>Minimum to Qualify:</strong></p>
|
<p><strong>Minimum to Qualify:</strong></p>
|
||||||
@ -102,7 +102,7 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your
|
|||||||
<li>Strongest Encryption: RSA-4096.</li>
|
<li>Strongest Encryption: RSA-4096.</li>
|
||||||
<li>Perfect Forward Secrecy (PFS).</li>
|
<li>Perfect Forward Secrecy (PFS).</li>
|
||||||
<li>Comprehensive published security audits from a reputable third-party firm.</li>
|
<li>Comprehensive published security audits from a reputable third-party firm.</li>
|
||||||
<li>Bug-bounty programs and/or a coordinated vulnerability-disclosure process</li>
|
<li>Bug-bounty programs and/or a coordinated vulnerability-disclosure process.</li>
|
||||||
</ul>
|
</ul>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
@ -145,7 +145,7 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your
|
|||||||
<p>In most cases, most of your traffic is already encrypted! Over 98% of the top 3000 websites offer <strong>HTTPS</strong>, meaning your non-DNS traffic is safe regardless of using a VPN. It is incredibly rare for applications that handle personal data to not support HTTPS in 2019, especially with services like Let's Encrypt offering free HTTPS certificates to any website operator.</p>
|
<p>In most cases, most of your traffic is already encrypted! Over 98% of the top 3000 websites offer <strong>HTTPS</strong>, meaning your non-DNS traffic is safe regardless of using a VPN. It is incredibly rare for applications that handle personal data to not support HTTPS in 2019, especially with services like Let's Encrypt offering free HTTPS certificates to any website operator.</p>
|
||||||
<p>Even if a site you visit doesn't support HTTPS, a VPN will not protect you, because a VPN cannot magically encrypt the traffic between the VPN's servers and the website's servers. Installing an extension like <a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> and making sure every site you visit uses HTTPS is far more helpful than using a VPN.</p>
|
<p>Even if a site you visit doesn't support HTTPS, a VPN will not protect you, because a VPN cannot magically encrypt the traffic between the VPN's servers and the website's servers. Installing an extension like <a href="https://www.eff.org/https-everywhere">HTTPS Everywhere</a> and making sure every site you visit uses HTTPS is far more helpful than using a VPN.</p>
|
||||||
<h4>Should I use encrypted DNS with a VPN?</h4>
|
<h4>Should I use encrypted DNS with a VPN?</h4>
|
||||||
<p>The answer to this question is also the not very helpful: <strong>it depends</strong>. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the <a href="/providers/dns/#icanndns">encrypted DNS provider</a> in addition to the VPN provider and unless your client and target server support <a href="https://www.eff.org/deeplinks/2018/09/esni-privacy-protecting-upgrade-https">encrypted SNI</a>, the VPN provider can still see which domains you are visiting.</p>
|
<p>The answer to this question is also not very helpful: <strong>it depends</strong>. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the <a href="/providers/dns/#icanndns">encrypted DNS provider</a> in addition to the VPN provider and unless your client and target server support <a href="https://www.eff.org/deeplinks/2018/09/esni-privacy-protecting-upgrade-https">encrypted SNI</a>, the VPN provider can still see which domains you are visiting.</p>
|
||||||
<p>However <strong>you shouldn't use encrypted DNS with Tor</strong>. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.</p>
|
<p>However <strong>you shouldn't use encrypted DNS with Tor</strong>. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.</p>
|
||||||
<h3>What if I need anonymity?</h3>
|
<h3>What if I need anonymity?</h3>
|
||||||
<p>VPNs cannot provide strong anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data.</p>
|
<p>VPNs cannot provide strong anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data.</p>
|
||||||
@ -159,9 +159,9 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your
|
|||||||
<p>A VPN may still be useful to you in a variety of scenarios, such as:</p>
|
<p>A VPN may still be useful to you in a variety of scenarios, such as:</p>
|
||||||
<ol>
|
<ol>
|
||||||
<li>Hiding your traffic from <strong>only</strong> your Internet Service Provider.</li>
|
<li>Hiding your traffic from <strong>only</strong> your Internet Service Provider.</li>
|
||||||
<li>Hiding your downloads (such as Torrents) from your ISP and anti-piracy organizations.</li>
|
<li>Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations.</li>
|
||||||
</ol>
|
</ol>
|
||||||
<p>For use-cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're <em>trusting</em> the provider. In pretty much any other scenario you should be using a secure<strong>-by-design</strong> tool such as Tor.</p>
|
<p>For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're <em>trusting</em> the provider. In pretty much any other scenario you should be using a secure<strong>-by-design</strong> tool such as Tor.</p>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<div class="row">
|
<div class="row">
|
||||||
@ -170,7 +170,7 @@ description: "Find a no-logging VPN operator who isn't out to sell or read your
|
|||||||
<ol>
|
<ol>
|
||||||
<li><a href="https://schub.io/blog/2019/04/08/very-precarious-narrative.html">VPN - a Very Precarious Narrative</a> by Dennis Schubert</li>
|
<li><a href="https://schub.io/blog/2019/04/08/very-precarious-narrative.html">VPN - a Very Precarious Narrative</a> by Dennis Schubert</li>
|
||||||
<li><a href="https://gist.github.com/joepie91/5a9909939e6ce7d09e29">Don't use VPN services</a> by Sven Slootweg</li>
|
<li><a href="https://gist.github.com/joepie91/5a9909939e6ce7d09e29">Don't use VPN services</a> by Sven Slootweg</li>
|
||||||
<li><a href="/software/networks/">Self-contained networks</a> on privacytools.io are able to replace a VPN that allows access to services on local area network</li>
|
<li><a href="/software/networks/">The self-contained networks</a> recommended on privacytools.io are able to replace a VPN that allows access to services on local area network</li>
|
||||||
<li><a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor">Slicing Onions: Part 1 – Myth-busting Tor</a> by blacklight447</li>
|
<li><a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor">Slicing Onions: Part 1 – Myth-busting Tor</a> by blacklight447</li>
|
||||||
<li><a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-2-onion-recipes-vpn-not-required">Slicing Onions: Part 2 – Onion recipes; VPN not required</a> by blacklight447</li>
|
<li><a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-2-onion-recipes-vpn-not-required">Slicing Onions: Part 2 – Onion recipes; VPN not required</a> by blacklight447</li>
|
||||||
</ol>
|
</ol>
|
||||||
|
Reference in New Issue
Block a user