diff --git a/_data/languages/es.yml b/_data/languages/es.yml
index de50821b..b416495e 100644
--- a/_data/languages/es.yml
+++ b/_data/languages/es.yml
@@ -1,106 +1,4268 @@
---
-Privacy_Tools: |
- Privacy Tools
+About_PrivacyTools_KEY: |
+ About PrivacyTools
-Prefer_the_classic_site?_View_a_singlepage_layout.: |
- ¿Prefieres el sitio clásico? Ver un diseño de una sola página.
+About_the_PrivacyTools_organization_and_contributors_to_the_PrivacyTools_website_communities_and_services._KEY: |
+ About the PrivacyTools organization, and contributors to the PrivacyTools website, communities, and services.
-Providers: |
- Proveedores
+DNS__Domain_Providers_KEY: |
+ DNS / Domain Providers
-Theres_a_ton_of_people_providing_services_online._Discover_which_ones_you_should_avoid_and_our_recom: |
- Hay un montón de gente que presta servicios en línea. Descubra cuáles debe evitar y nuestras recomendaciones para una variedad de servicios.
+Dont_let_Google_see_all_your_DNS_traffic._Discover_privacycentric_alternatives_to_the_traditional_DNS_providers._KEY: |
+ Don't let Google see all your DNS traffic. Discover privacy-centric alternatives to the traditional DNS providers.
-Discover_privacycentric_online_services_including_email_providers_VPN_operators_DNS_administrator: |
- Descubra servicios en línea centrados en la privacidad, incluyendo proveedores de correo electrónico, operadores de VPN, administradores de DNS y mucho más!
+Best_Secure_Email_Providers_for_Privacy_KEY: |
+ Best Secure Email Providers for Privacy
-Learn_More: |
- Aprenda Más
+Find_a_secure_email_provider_that_will_keep_your_privacy_in_mind._Dont_settle_for_adsupported_platforms._Never_trust_any_company_with_your_privacy_a_KEY: |
+ Find a secure email provider that will keep your privacy in mind. Don't settle for ad-supported platforms. Never trust any company with your privacy, always encrypt.
-Web_Browsers: |
- Navegadores Web
+Web_Hosting_KEY: |
+ Web Hosting
-Find_a_web_browser_that_respects_your_privacy_and_discover_how_to_harden_your_browser_against_tracki: |
- Encuentre un navegador web que respete su privacidad y descubra cómo proteger su navegador contra el rastreo y las fugas.
+Find_a_web_hosting_provider_that_wont_track_your_visitors_or_give_into_government_data_requests._KEY: |
+ Find a web hosting provider that won't track your visitors or give into government data requests.
-Software: |
- Software
+Pastebin_hosting_services_KEY: |
+ Pastebin hosting services
-Discover_a_variety_of_open_source_software_built_to_protect_your_privacy_and_keep_your_digital_data_s: |
- Descubra una variedad de software de código abierto creado para proteger su privacidad y mantener sus datos digitales seguros.
+Find_a_pastebin_provider_that_wont_read_your_content_to_share_sensitive_code_or_other_information._KEY: |
+ Find a pastebin provider that won't read your content to share sensitive code or other information.
-Operating_Systems: |
- Sistemas Operativos
+Providers_KEY: |
+ Providers
-Find_out_how_your_operating_system_is_compromising_your_privacy_and_what_simple_alternatives_exist.: |
- Descubra cómo su sistema operativo está comprometiendo su privacidad y qué alternativas sencillas existen.
+Theres_a_ton_of_people_providing_services_online._Discover_which_ones_you_should_avoid_and_our_recommendations_for_a_variety_of_services._KEY: |
+ There's a ton of people providing services online. Discover which ones you should avoid and our recommendations for a variety of services.
-PrivacyTools_Services: |
- Servicios de PrivacyTools
+Search_Engines_KEY: |
+ Search Engines
-The_PrivacyTools_team_is_proud_to_launch_a_variety_of_privacycentric_online_services_including_a_Ma: |
- El equipo de PrivacyTools se enorgullece de lanzar una variedad de servicios en línea centrados en la privacidad, incluyendo una instancia de Mastodon, un motor de búsqueda y mucho más.
+Find_a_search_engine_that_doesnt_track_your_queries_or_build_an_advertising_profile_based_on_your_searches._KEY: |
+ Find a search engine that doesn't track your queries or build an advertising profile based on your searches.
-Donate: |
- Donaciones
+Services_from_PrivacyTools_KEY: |
+ Services from PrivacyTools
-We_cant_operate_this_site_without_the_generous_contributions_we_receive_from_our_viewers._If_you_lov: |
- No podemos operar este sitio sin las generosas contribuciones que recibimos de nuestros televidentes. Si usted ama la privacidad y nuestro sitio web por favor considere donar.
+The_PrivacyTools_team_is_proud_to_introduce_a_suite_of_privacycentric_online_services_to_connect_you_with_other_privacyminded_individuals_and_stay_sa_KEY: |
+ The PrivacyTools team is proud to introduce a suite of privacy-centric online services to connect you with other privacy-minded individuals and stay safe and secure online. No advertisers, no Google Analytics, no tracking, no third-party requests of any kind.
-Sponsors: |
- Patrocinadores
+Social_Networks_KEY: |
+ Social Networks
-New: |
- Nuevo!
+Find_a_social_network_that_doesnt_pry_into_your_data_or_monetize_your_profile._KEY: |
+ Find a social network that doesn't pry into your data or monetize your profile.
-Showcase_your_brand_as_a_sponsor_of_PrivacyTools_here_and_support_our_mission_of_creating_a_world_fre: |
- Presente su marca como patrocinador de PrivacyTools aquí y apoye nuestra misión de crear un mundo libre de vigilancia masiva!
+Social_News_Aggregator_KEY: |
+ Social News Aggregator
-Learn_more...: |
- Aprenda más...
+Stay_uptodate_with_privacyrespecting_online_bulletin_boards._KEY: |
+ Stay up-to-date with privacy-respecting online bulletin boards.
-Encrypted_Cloud_Storage_Services: |
- Servicios de Almacenamiento en Nube Cifrada
+Cloud_Storage_KEY: |
+ Cloud Storage
-If_you_are_currently_using_Dropbox_Google_Drive_Microsoft_OneDrive_or_Apple_iCloud_you_should_pick: |
- Si actualmente usas Dropbox, Google Drive, Microsoft OneDrive o Apple iCloud, deberías elegir una alternativa aquí.
+Find_a_cloud_storage_provider_that_wont_look_through_your_files._KEY: |
+ Find a cloud storage provider that won't look through your files.
-Worth_Mentioning: |
- Destacados
+VPN_Services_KEY: |
+ VPN Services
-Services: |
- Servicios
+Find_a_nologging_VPN_operator_who_isnt_out_to_sell_or_read_your_web_traffic._KEY: |
+ Find a no-logging VPN operator who isn't out to sell or read your web traffic.
-Click_on_whatever_service_you_need_to_view_our_recommendations.: |
- Haga clic en cualquier servicio que necesite para ver nuestras recomendaciones.
+Provider_KEY: |
+ Provider
-Cloud_Storage: |
- Servidor Cloud
+Avoid_US__UK_services_KEY: |
+ Avoid US & UK services
-Find_a_cloud_storage_provider_that_wont_look_through_your_files.: |
- Busque un proveedor de almacenamiento en nube que no revise sus archivos.
-
-DNS: |
+DNS_KEY: |
DNS
-Email: |
- Correo electrónico
+Email_KEY: |
+ Email
-Hosting: |
- Alojamiento
+Hosting_KEY: |
+ Hosting
-Pastebins: |
+Pastebins_KEY: |
Pastebins
-Search_Engines: |
- Motores de Búsqueda
+Social_News_Aggregators_KEY: |
+ Social News Aggregators
-Social_Networks: |
- Redes Sociales
+VPN_KEY: |
+ VPN
-Social_News_Aggregators: |
- Noticias Sociales Agregadores
+Browser_KEY: |
+ Browser
-VPN: |
- RPV
+Recommendation_KEY: |
+ Recommendation
+
+Fingerprinting_Info_KEY: |
+ Fingerprinting Info
+
+WebRTC_IP_Leak_KEY: |
+ WebRTC IP Leak
+
+Browser_Addons_KEY: |
+ Browser Add-ons
+
+Firefox_Tweaks_KEY: |
+ Firefox Tweaks
+
+Software_KEY: |
+ Software
+
+CalendarContacts_Sync_Tools_KEY: |
+ Calendar/Contacts Sync Tools
+
+Digital_Notebook_KEY: |
+ Digital Notebook
+
+Email_Alternatives_KEY: |
+ Email Alternatives
+
+Email_Clients_KEY: |
+ Email Clients
+
+File_Encryption_KEY: |
+ File Encryption
+
+File_Sharing_KEY: |
+ File Sharing
+
+File_Sync_KEY: |
+ File Sync
+
+Metadata_Removal_Tools_KEY: |
+ Metadata Removal Tools
+
+Password_Manager_KEY: |
+ Password Manager
+
+Productivity_Tools_KEY: |
+ Productivity Tools
+
+RealTime_Communication_KEY: |
+ Real-Time Communication
+
+Selfcontained_Networks_KEY: |
+ Self-contained Networks
+
+SelfHosted_Cloud_Server_KEY: |
+ Self-Hosted Cloud Server
+
+OS_KEY: |
+ OS
+
+PC_OS_KEY: |
+ PC OS
+
+Live_CD_OS_KEY: |
+ Live CD OS
+
+Mobile_OS_KEY: |
+ Mobile OS
+
+Android_Privacy_Addons_KEY: |
+ Android Privacy Add-ons
+
+Router_Firmware_KEY: |
+ Router Firmware
+
+Dont_use_Windows_10_KEY: |
+ Don't use Windows 10
+
+Participate_KEY: |
+ Participate
+
+Services_KEY: |
+ Services
+
+Blog_KEY: |
+ Blog
+
+Sponsors_KEY: |
+ Sponsors
+
+About_Us_KEY: |
+ About Us
+
+Theme_KEY: |
+ Theme
+
+Toggle_Theme_KEY: |
+ Toggle Theme
+
+Language_KEY: |
+ Language
+
+Language_Selection_KEY: |
+ Language Selection
+
+You_are_being_watched._Private_and_statesponsored_organizations_are_monitoring_and_recording_your_online_activities._KEY: |
+ You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities.
+
+At_strongPrivacyToolsstrong_we_provide_services_tools_and_knowledge_to_protect_your_privacy_against_global_mass_surveillance_and_moderate_a_th_KEY: |
+ At PrivacyTools, we provide services, tools, and knowledge to protect your privacy against global mass surveillance, and moderate a thriving community of privacy-minded individuals like yourself to discuss and learn about new advances in protecting your online data. This website serves as the centerpiece of our organization, where we research and recommend various software solutions for our community.
+
+strongTransparencystrong_is_our_strongest_value_and_its_what_sets_us_apart_from_the_rest_of_the_privacy_recommendations_community._Editorial_c_KEY: |
+ Transparency is our strongest value, and it's what sets us apart from the rest of the "privacy recommendations" community. Editorial changes to this website and the products we recommend are always discussed on our extensive issue tracker, drafted in a public pull request open for further discussion, and logged in a comprehensive commit log dating back to our original founding date in 2015. The core team members listed below are responsible for most of the edits and final decisions to changes on this website and across our services, but this website is truly the work of hundreds contributors and fact checkers working to make sure our recommendations are solid and trustworthy.
+
+Additionally_we_are_a_notforprofit_organization._We_do_not_utilize_paid_recommendations_or_affiliate_programs_to_make_the_recommendations_on_this_we_KEY: |
+ Additionally, we are a not-for-profit organization. We do not utilize paid recommendations or affiliate programs to make the recommendations on this website. Unfortunately this practice is very common elsewhere online, which makes it difficult to trust other review sites. We are unique in this area, in that all of our research is conducted independently, and we will never accept payments to modify, add, or remove any of our reviews or recommendations. Our finances are provided entirely by our community donors and sponsors, and are handled by the Open Collective Foundation 501(c)(3). Because we are operating as a charity in the United States, we are legally obligated to only use our funding to further our mission of spreading privacy education and promoting online services like Mastodon, Matrix, and WriteFreely. This website is a public resource, not a profit generator. To that regard, all our financial transactions (incoming and outgoing) are logged and made available to the public via our page at opencollective.com/privacytoolsio.
+
+We_take_the_operation_of_our_various_a_href_services__translate_page_servicesa_very_seriously_and_require_all_participants_to_adhere__KEY: |
+ We take the operation of our various services very seriously, and require all participants to adhere to our Code of Conduct. For any questions or to report abuse, please see our CoC’s Enforcement section.
+
+Core_Contributors_KEY: |
+ Core Contributors
+
+Of_course_we_couldnt_do_any_of_this_without_our_very_generous_a_hrefhttpsopencollective.comprivacytoolsiofinancial_contributorsa_a_hre_KEY: |
+ Of course, we couldn't do any of this without our very generous financial contributors, website contributors, and the countless community members that help share new ideas and spread the word!
+
+Thank_you._KEY: |
+ Thank you.
+
+Get_involved!_KEY: |
+ Get involved!
+
+Donate_KEY: |
+ Donate
+
+Contact_Us_KEY: |
+ Contact Us
+
+Its_very_important_to_us_to_stay_uptodate_on_the_latest_changes_in_the_privacy_space._If_you_have_a_software_recommendation_for_us_or_want_to_reque_KEY: |
+ It's very important to us to stay up-to-date on the latest changes in the privacy space. If you have a software recommendation for us, or want to request a change on this website, please don't hesitate to reach out in one of the following ways.
+
+Start_a_discussion_in_our_Discourse_forum_KEY: |
+ Start a discussion in our Discourse forum
+
+Open_an_issue_on_GitHub_KEY: |
+ Open an issue on GitHub
+
+Suggest_something_new_on_our_subreddit_KEY: |
+ Suggest something new on our subreddit
+
+For_complete_transparency_software_and_providers_will_only_be_considered_for_this_website_after_discussions_take_place_on_our_GitHub_issue_tracker._We_KEY: |
+ For complete transparency, software and providers will only be considered for this website after discussions take place on our GitHub issue tracker. We of course don't make any changes in secret.
+
+Join_our_Matrix_room_at_codegeneralprivacytools.iocode_or_join_the_a_hrefhttpskeybase.ioteamprivacytools_ioprivacytools_io_Keybase_tea_KEY: |
+ Join our Matrix room at #general:privacytools.io
or join the privacytools_io Keybase team to chat with us and other members about this site and privacy in general! If you need a Matrix account, you can sign up with our own homeserver (https://chat.privacytools.io
) using Riot.
+
+Spread_the_word_and_help_your_friends_KEY: |
+ Spread the word and help your friends
+
+privacytools.io__encryption_against_global_mass_surveillance_KEY: |
+ privacytools.io - encryption against global mass surveillance
+
+Facebook_KEY: |
+ Facebook
+
+Knowledge_and_tools_to_protect_your_privacy_against_global_mass_surveillance_KEY: |
+ Knowledge and tools to protect your privacy against global mass surveillance
+
+Twitter_KEY: |
+ Twitter
+
+Mastodon_KEY: |
+ Mastodon
+
+reddit_KEY: |
+ reddit
+
+LinkedIn_KEY: |
+ LinkedIn
+
+Mix_KEY: |
+ Mix
+
+Diaspora_KEY: |
+ Diaspora*
+
+Copy_URL_and_Description_KEY: |
+ Copy URL and Description
+
+_site.name___Encryption_and_tools_to_protect_against_global_mass_surveillance___site.production_url__append_lang__uri_escape__KEY: |
+ {{ site.name }} - Encryption and tools to protect against global mass surveillance - {{ site.production_url | append_lang | uri_escape }}
+
+For_easy_copy_and_paste._Share_this_text_snippet._KEY: |
+ For easy copy and paste. Share this text snippet.
+
+This_work_is_free._You_can_redistribute_it_andor_modify_it_under_the_terms_of_the_quotCreative_Commons_CC0_1.0_Universal_Public_Domain_Dedicationqu_KEY: |
+ This work is free. You can redistribute it and/or modify it under the terms of the "Creative Commons CC0 1.0 Universal Public Domain Dedication".
+
+Contact_KEY: |
+ Contact
+
+Please_support_this_project_by_donating._We_are_adfree_and_not_affiliated_with_any_providers._Your_donation_will_cover_our_costs_for_servers_and_domai_KEY: |
+ Please support this project by donating. We are ad-free and not affiliated with any providers. Your donation will cover our costs for servers and domains.
+
+Support_Us!_KEY: |
+ Support Us!
+
+JavaScript_Licenses_KEY: |
+ JavaScript Licenses
+
+No_Ads_No_Google_Analytics_No_Affiliates_No_CrossSite_Requests._KEY: |
+ No Ads, No Google Analytics, No Affiliates, No Cross-Site Requests.
+
+_site.name__is_a_socially_motivated_website_that_provides_information_for_protecting_your_data_security_and_privacy._Never_trust_any_company_with_y_KEY: |
+ {{ site.name }} is a socially motivated website that provides information for protecting your data security and privacy. Never trust any company with your privacy, always encrypt.
+
+View_our_privacy_statement_KEY: |
+ View our privacy statement
+
+Learn_More_KEY: |
+ Learn More
+
+Firefox_KEY: |
+ Firefox
+
+Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_settings_according_to_our_recommendations_a_hrefwebr_KEY: |
+ Firefox is fast, reliable, open-source, and respects your privacy. Don't forget to adjust the settings according to our recommendations: WebRTC and about:config and get the privacy add-ons.
+
+httpsfirefox.com_KEY: |
+ https://firefox.com
+
+Website_KEY: |
+ Website
+
+Forum_KEY: |
+ Forum
+
+httpswww.mozilla.orgfirefoxwindows_KEY: |
+ https://www.mozilla.org/firefox/windows/
+
+httpswww.mozilla.orgfirefoxmac_KEY: |
+ https://www.mozilla.org/firefox/mac/
+
+httpswww.mozilla.orgfirefoxlinux_KEY: |
+ https://www.mozilla.org/firefox/linux/
+
+httpswww.freshports.orgwwwfirefox_KEY: |
+ https://www.freshports.org/www/firefox
+
+httpopenports.sewwwmozillafirefox_KEY: |
+ http://openports.se/www/mozilla-firefox
+
+httppkgsrc.sewwwfirefox_KEY: |
+ http://pkgsrc.se/www/firefox
+
+httpshg.mozilla.orgmozillacentral_KEY: |
+ https://hg.mozilla.org/mozilla-central/
+
+Tor_Browser__Provides_Anonymity_KEY: |
+ Tor Browser - Provides Anonymity
+
+Tor_Browser_is_your_choice_if_you_need_an_extra_layer_of_anonymity._Its_a_modified_version_of_Firefox_ESR_which_comes_with_preinstalled_privacy_add_KEY: |
+ Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy. How does Tor work?
+
+httpswww.torproject.org_KEY: |
+ https://www.torproject.org/
+
+Requires_specific_software_to_access_torproject.org_KEY: |
+ Requires specific software to access: torproject.org
+
+httpswww.torproject.orgdownload_KEY: |
+ https://www.torproject.org/download/
+
+httpstrac.torproject.orgprojectstor_KEY: |
+ https://trac.torproject.org/projects/tor
+
+Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_settings_according_to_ourrecommendations_a_hrefwebr_KEY: |
+ Firefox is fast, reliable, open-source, and respects your privacy. Don't forget to adjust the settings according to our
+recommendations: WebRTC and about:config and get the privacy add-ons.
+
+httpswww.mozilla.orgenUSfirefoxmobile_KEY: |
+ https://www.mozilla.org/en-US/firefox/mobile/
+
+httpsfdroid.orgenpackagesorg.mozilla.fennec_fdroid_KEY: |
+ https://f-droid.org/en/packages/org.mozilla.fennec_fdroid/
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefox
+
+httpswww.mozilla.orgfirefoxallproductandroidrelease_KEY: |
+ https://www.mozilla.org/firefox/all/#product-android-release
+
+httpsgithub.commozillamobile_KEY: |
+ https://github.com/mozilla-mobile
+
+httpsguardianproject.infofdroid_KEY: |
+ https://guardianproject.info/fdroid/
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpswww.torproject.orgdownloadandroid_KEY: |
+ https://www.torproject.org/download/#android
+
+httpsgitweb.torproject.orgtorbrowser.git_KEY: |
+ https://gitweb.torproject.org/tor-browser.git/
+
+Bromite_KEY: |
+ Bromite
+
+Bromite_is_a_Chromiumbased_browser_with_security_enhancement_patches_from_GrapheneOS_and_builtin_adblocking_and_DNS_over_HTTPS_support._More_info_can_KEY: |
+ Bromite is a Chromium-based browser with security enhancement patches from GrapheneOS and built-in adblocking and DNS over HTTPS support. More info can be found here.
+
+httpswww.bromite.org_KEY: |
+ https://www.bromite.org/
+
+httpswww.bromite.orgfdroid_KEY: |
+ https://www.bromite.org/fdroid
+
+httpswww.bromite.orgdownloadbromite_KEY: |
+ https://www.bromite.org/#download-bromite
+
+httpsgithub.combromitebromite_KEY: |
+ https://github.com/bromite/bromite
+
+Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Note_Because_of_limitations_set_by_Apple_in_iOS_our_recommended_tweaks_cannot_be_a_KEY: |
+ Firefox is fast, reliable, open-source, and respects your privacy. Note: Because of limitations set by Apple in iOS, our recommended tweaks cannot be applied. However, Firefox for iOS has an Enhanced Tracking Protection feature that uses a list provided by Disconnect to identify and block ad, social, and analytics trackers, as well as cryptominers and fingerprinters.
+
+httpsapps.apple.comusappfirefoxprivatesafebrowserid989804926_KEY: |
+ https://apps.apple.com/us/app/firefox-private-safe-browser/id989804926
+
+httpsgithub.commozillamobilefirefoxios_KEY: |
+ https://github.com/mozilla-mobile/firefox-ios
+
+Onion_Browser_KEY: |
+ Onion Browser
+
+Onion_Browser_is_an_opensource_browser_that_lets_you_browse_the_web_anonymously_over_the_Tor_network_on_iOS_devices_and_is_endorsed_by_the_Tor_Project_KEY: |
+ Onion Browser is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the Tor Project. Warning: there are certain anonymity-related issues with Onion Browser due to iOS limitations.
+
+httpsonionbrowser.com_KEY: |
+ https://onionbrowser.com/
+
+httpsapps.apple.comusapponionbrowserid519296448_KEY: |
+ https://apps.apple.com/us/app/onion-browser/id519296448
+
+httpsgithub.comOnionBrowserOnionBrowser_KEY: |
+ https://github.com/OnionBrowser/OnionBrowser
+
+DuckDuckGo_Privacy_Browser_KEY: |
+ DuckDuckGo Privacy Browser
+
+DuckDuckGo_Privacy_Browser_is_an_opensource_web_browser_that_has_builtin_ad_and_tracker_blocking_and_utilizes_a_hrefhttpstosdr.orgToSDRa_KEY: |
+ DuckDuckGo Privacy Browser is an open-source web browser that has built-in ad and tracker blocking and utilizes ToS;DR to rate the privacy policies of the sites you visit.
+
+httpsduckduckgo.comapp_KEY: |
+ https://duckduckgo.com/app
+
+httpsapps.apple.comusappduckduckgoprivacybrowserid663592361_KEY: |
+ https://apps.apple.com/us/app/duckduckgo-privacy-browser/id663592361
+
+httpsgithub.comduckduckgoiOS_KEY: |
+ https://github.com/duckduckgo/iOS
+
+uBlock_Origin_Block_Ads_and_Trackers_KEY: |
+ uBlock Origin: Block Ads and Trackers
+
+stronguBlock_Originstrong_is_an_efficient_a_hrefhttpsgithub.comgorhilluBlockwikiBlockingmodewidespectrum_blockera_thats_easy_on_me_KEY: |
+ uBlock Origin is an efficient wide-spectrum blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source.
+
+httpsaddons.mozilla.orgfirefoxaddonublockorigin_KEY: |
+ https://addons.mozilla.org/firefox/addon/ublock-origin/
+
+httpsaddons.mozilla.orgenUSfirefoxaddonublockorigin_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
+
+httpschrome.google.comwebstoredetailublockorigincjpalhdlnbpafiamejdnhcphjbkeiagm_KEY: |
+ https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm
+
+httpsaddons.opera.comenextensionsdetailsublock_KEY: |
+ https://addons.opera.com/en/extensions/details/ublock/
+
+httpswww.microsoft.comenuspublockorigin9nblggh444l4_KEY: |
+ https://www.microsoft.com/en-us/p/ublock-origin/9nblggh444l4
+
+httpsgithub.comgorhilluBlock_KEY: |
+ https://github.com/gorhill/uBlock/
+
+Cookie_AutoDelete_Automatically_Delete_Cookies_KEY: |
+ Cookie AutoDelete: Automatically Delete Cookies
+
+strongCookie_AutoDeletestrong_automatically_removes_cookies_when_they_are_no_longer_used_by_open_browser_tabs._With_the_cookies_lingering_session_KEY: |
+ Cookie AutoDelete automatically removes cookies when they are no longer used by open browser tabs. With the cookies, lingering sessions, as well as information used to spy on you, will be expunged.
+
+httpsaddons.mozilla.orgfirefoxaddoncookieautodelete_KEY: |
+ https://addons.mozilla.org/firefox/addon/cookie-autodelete/
+
+httpsaddons.mozilla.orgenUSfirefoxaddoncookieautodelete_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/cookie-autodelete
+
+httpschrome.google.comwebstoredetailcookieautodeletefhcgjolkccmbidfldomjliifgaodjagh_KEY: |
+ https://chrome.google.com/webstore/detail/cookie-autodelete/fhcgjolkccmbidfldomjliifgaodjagh
+
+httpsgithub.comCookieAutoDeleteCookieAutoDelete_KEY: |
+ https://github.com/Cookie-AutoDelete/Cookie-AutoDelete
+
+HTTPS_Everywhere_Secure_Connections_KEY: |
+ HTTPS Everywhere: Secure Connections
+
+strongHTTPS_Everywherestrong_encrypts_your_communications_with_many_major_websites_making_your_browsing_more_secure._A_collaboration_between_The__KEY: |
+ HTTPS Everywhere encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation.
+
+httpswww.eff.orghttpseverywhere_KEY: |
+ https://www.eff.org/https-everywhere
+
+httpsaddons.mozilla.orgenUSfirefoxaddonhttpseverywhere_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/https-everywhere
+
+httpschrome.google.comwebstoredetailhttpseverywheregcbommkclmclpchllfjekcdonpmejbdp_KEY: |
+ https://chrome.google.com/webstore/detail/https-everywhere/gcbommkclmclpchllfjekcdonpmejbdp
+
+httpsaddons.opera.comenextensionsdetailshttpseverywhere_KEY: |
+ https://addons.opera.com/en/extensions/details/https-everywhere
+
+httpsgithub.comEFForghttpseverywhere_KEY: |
+ https://github.com/EFForg/https-everywhere
+
+Decentraleyes_Block_Content_Delivery_Networks_KEY: |
+ Decentraleyes: Block Content Delivery Networks
+
+strongDecentraleyesstrong_emulates_Content_Delivery_Networks_locally_by_intercepting_requests_finding_the_required_resource_and_injecting_it_int_KEY: |
+ Decentraleyes emulates Content Delivery Networks locally by intercepting requests, finding the required resource, and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required.
+
+httpsdecentraleyes.org_KEY: |
+ https://decentraleyes.org/
+
+httpsaddons.mozilla.orgenUSfirefoxaddondecentraleyes_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/decentraleyes
+
+httpschrome.google.comwebstoredetaildecentraleyesldpochfccmkkmhdbclfhpagapcfdljkj_KEY: |
+ https://chrome.google.com/webstore/detail/decentraleyes/ldpochfccmkkmhdbclfhpagapcfdljkj
+
+httpsaddons.opera.comenextensionsdetailsdecentraleyes_KEY: |
+ https://addons.opera.com/en/extensions/details/decentraleyes
+
+httpsgit.synz.ioSynzvatodecentraleyes_KEY: |
+ https://git.synz.io/Synzvato/decentraleyes
+
+Terms_of_Service_Didnt_Read_Be_Informed_KEY: |
+ Terms of Service; Didn’t Read: Be Informed
+
+strongTerms_of_Service_Didnt_Readstrong_is_an_addon_that_aims_to_fix_how_I_have_read_and_agree_to_the_Terms_is_the_biggest_lie_on_the_web_by_g_KEY: |
+ Terms of Service; Didn’t Read is an addon that aims to fix how “I have read and agree to the Terms” is the biggest lie on the web by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are done transparently by a community of reviewers.
+
+httpstosdr.org_KEY: |
+ https://tosdr.org/
+
+httpsaddons.mozilla.orgenUSfirefoxaddontermsofservicedidntread_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/terms-of-service-didnt-read/
+
+httpschrome.google.comwebstoredetailtermsofservicedidnE28099trhjdoplcnndgiblooccencgcggcoihigg_KEY: |
+ https://chrome.google.com/webstore/detail/terms-of-service-didn%E2%80%99t-r/hjdoplcnndgiblooccencgcggcoihigg
+
+httpsaddons.opera.comenextensionsdetailstermsofservicedidntread_KEY: |
+ https://addons.opera.com/en/extensions/details/terms-of-service-didnt-read
+
+httpsgithub.comtosdr_KEY: |
+ https://github.com/tosdr/
+
+Snowflake_KEY: |
+ Snowflake
+
+strongSnowflakestrong_is_a_new_a_hrefhttps2019.www.torproject.orgdocspluggabletransports.html.enpluggable_transporta_from_the_Tor_Proj_KEY: |
+ Snowflake is a new pluggable transport from the Tor Project. If you have an uncensored connection, running this extension volunteers your connection to be used as a Snowflake proxy to help users unable to connect to the Tor network. Your IP will not be visible to the sites users visit using your proxy, as this extension will not make you an exit node. If your access to the Tor network is blocked, this extension will not assist you, and you should use the Tor Browser instead.
+
+httpssnowflake.torproject.org_KEY: |
+ https://snowflake.torproject.org
+
+httpsaddons.mozilla.orgenUSfirefoxaddontorprojectsnowflake_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/torproject-snowflake
+
+httpschrome.google.comwebstoredetailsnowflakemafpmfcccpbjnhfhjnllmmalhifmlcie_KEY: |
+ https://chrome.google.com/webstore/detail/snowflake/mafpmfcccpbjnhfhjnllmmalhifmlcie
+
+httpsgitweb.torproject.orgpluggabletransportssnowflake.git_KEY: |
+ https://gitweb.torproject.org/pluggable-transports/snowflake.git
+
+Privacy_Badger_Stop_Tracking_KEY: |
+ Privacy Badger: Stop Tracking
+
+strongPrivacy_Badgerstrong_is_a_browser_addon_that_stops_advertisers_and_other_thirdparty_trackers_from_secretly_tracking_where_you_go_and_what__KEY: |
+ Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. Privacy Badger learns about trackers as you browse.
+
+httpswww.eff.orgprivacybadger_KEY: |
+ https://www.eff.org/privacybadger
+
+httpsaddons.mozilla.orgenUSfirefoxaddonprivacybadger17_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17
+
+httpschrome.google.comwebstoredetailprivacybadgerpkehgijcmpdhfbdbbnkijodmdjhbjlgp_KEY: |
+ https://chrome.google.com/webstore/detail/privacy-badger/pkehgijcmpdhfbdbbnkijodmdjhbjlgp
+
+httpsaddons.opera.comenextensionsdetailsprivacybadger_KEY: |
+ https://addons.opera.com/en/extensions/details/privacy-badger/
+
+httpsgithub.comEFForgprivacybadger_KEY: |
+ https://github.com/EFForg/privacybadger
+
+uMatrix_Stop_CrossSite_Requests_KEY: |
+ uMatrix: Stop Cross-Site Requests
+
+stronguMatrixstrong_gives_you_control_over_the_requests_that_websites_make_to_other_websites._Many_websites_integrate_features_which_let_other_web_KEY: |
+ uMatrix gives you control over the requests that websites make to other websites. Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics.
+
+httpsaddons.mozilla.orgfirefoxaddonumatrix_KEY: |
+ https://addons.mozilla.org/firefox/addon/umatrix/
+
+httpsaddons.mozilla.orgenUSfirefoxaddonumatrix_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/umatrix
+
+httpschrome.google.comwebstoredetailumatrixogfcmafjalglgifnmanfmnieipoejdcf_KEY: |
+ https://chrome.google.com/webstore/detail/umatrix/ogfcmafjalglgifnmanfmnieipoejdcf
+
+httpsaddons.opera.comenextensionsdetailsumatrix_KEY: |
+ https://addons.opera.com/en/extensions/details/umatrix
+
+httpsgithub.comgorhilluMatrix_KEY: |
+ https://github.com/gorhill/uMatrix
+
+NoScript_Security_Suite_Be_in_total_control_KEY: |
+ NoScript Security Suite: Be in total control
+
+strongNoScriptstrong_is_a_highly_customizable_plugin_to_selectively_allow_JavaScript_Java_and_Flash_to_run_only_on_websites_you_trust._Not_for_c_KEY: |
+ NoScript is a highly customizable plugin to selectively allow JavaScript, Java, and Flash to run only on websites you trust. Not for casual users, it requires technical knowledge to configure.
+
+httpsaddons.mozilla.orgfirefoxaddonnoscript_KEY: |
+ https://addons.mozilla.org/firefox/addon/noscript/
+
+httpsaddons.mozilla.orgenUSfirefoxaddonnoscript_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/noscript
+
+httpschrome.google.comwebstoredetailnoscriptdoojmbjmlfjjnbmnoijecmcbfeoakpjm_KEY: |
+ https://chrome.google.com/webstore/detail/noscript/doojmbjmlfjjnbmnoijecmcbfeoakpjm
+
+httpsgithub.comhackademixnoscript_KEY: |
+ https://github.com/hackademix/noscript
+
+Nextcloud_KEY: |
+ Nextcloud
+
+strongNextcloudstrong_is_a_suite_of_clientserver_software_for_creating_and_using_file_hosting_services._This_includes_calendar_sync_via_CalDAV_an_KEY: |
+ Nextcloud is a suite of client-server software for creating and using file hosting services. This includes calendar sync via CalDAV and contacts sync via CardDAV. Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server.
+
+httpsnextcloud.com_KEY: |
+ https://nextcloud.com/
+
+httpsnextcloud.cominstall_KEY: |
+ https://nextcloud.com/install/
+
+httpswww.freshports.orgdeskutilsnextcloudclient_KEY: |
+ https://www.freshports.org/deskutils/nextcloudclient/
+
+httpopenports.sewwwnextcloud_KEY: |
+ http://openports.se/www/nextcloud
+
+httppkgsrc.sewwwphpnextcloud_KEY: |
+ http://pkgsrc.se/www/php-nextcloud
+
+httpsgithub.comnextcloud_KEY: |
+ https://github.com/nextcloud
+
+Email_Providers_KEY: |
+ Email Providers
+
+Many_email_providers_also_offer_calendar_and_or_contacts_sync_services._Refer_to_the_a_hrefprovidersemailEmail_Providers_sectiona_to_choose_a_KEY: |
+ Many email providers also offer calendar and or contacts sync services. Refer to the Email Providers section to choose an email provider and check if they also offer calendar and/or contacts sync.
+
+providersemail_KEY: |
+ /providers/email
+
+EteSync_KEY: |
+ EteSync
+
+strongEteSyncstrong_is_a_secure_endtoend_encrypted_and_journaled_personal_information_e.g._contacts_and_calendar_cloud_synchronization_and_b_KEY: |
+ EteSync is a secure, end-to-end encrypted, and journaled personal information (e.g. contacts and calendar) cloud synchronization and backup for Android and any OS that supports CalDAV/CardDAV. It costs $24 per year to use, or you can host the server yourself for free.
+
+httpswww.etesync.com_KEY: |
+ https://www.etesync.com/
+
+httpsgithub.cometesyncetesyncdavblobmasterREADME.mdinstallation_KEY: |
+ https://github.com/etesync/etesync-dav/blob/master/README.md#installation
+
+httpsfdroid.orgpackagescom.etesync.syncadapter_KEY: |
+ https://f-droid.org/packages/com.etesync.syncadapter/
+
+httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter_KEY: |
+ https://play.google.com/store/apps/details?id=com.etesync.syncadapter
+
+httpsclient.etesync.com_KEY: |
+ https://client.etesync.com/
+
+httpsgithub.cometesync_KEY: |
+ https://github.com/etesync
+
+Nextcloud_is_similar_in_functionality_to_the_widely_used_Dropbox_with_the_difference_being_that_Nextcloud_is_free_and_opensource_thereby_allowing_an_KEY: |
+ Nextcloud is similar in functionality to the widely used Dropbox, with the difference being that Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server with no limits on storage space or the number of connected clients.
+
+httpsnextcloud.cominstallinstallclients_KEY: |
+ https://nextcloud.com/install/#install-clients
+
+httpswww.freshports.orgwwwnextcloud_KEY: |
+ https://www.freshports.org/www/nextcloud/
+
+httpsfdroid.orgpackagescom.nextcloud.client_KEY: |
+ https://f-droid.org/packages/com.nextcloud.client/
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+TahoeLAFS_KEY: |
+ Tahoe-LAFS
+
+TahoeLAFS_is_a_free_and_open_decentralized_cloud_storage_system._It_distributes_your_data_across_multiple_servers._Even_if_some_of_the_servers_fail_or_KEY: |
+ Tahoe-LAFS is a free and open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security.
+
+httpswww.tahoelafs.org_KEY: |
+ https://www.tahoe-lafs.org/
+
+httpsgithub.comtahoelafstahoelafsviapip_KEY: |
+ https://github.com/tahoe-lafs/tahoe-lafs#via-pip
+
+httpsgithub.comtahoelafstahoelafsusingospackages_KEY: |
+ https://github.com/tahoe-lafs/tahoe-lafs#using-os-packages
+
+httppkgsrc.sefilesystemstahoelafs_KEY: |
+ http://pkgsrc.se/filesystems/tahoe-lafs
+
+httpswww.tahoelafs.orgtractahoelafsbrowser_KEY: |
+ https://www.tahoe-lafs.org/trac/tahoe-lafs/browser
+
+Domain_Name_System_DNS_KEY: |
+ Domain Name System (DNS)
+
+Njalla__Domain_Registration_KEY: |
+ Njalla - Domain Registration
+
+Njalla_is_a_privacyaware_domain_registration_service_based_in_Nevis_that_only_needs_your_email_or_XMPP_address_in_order_to_register_a_domain_name_for__KEY: |
+ Njalla is a privacy-aware domain registration service based in Nevis that only needs your email or XMPP address in order to register a domain name for you. It is created by people from The Pirate Bay and IPredator VPN. Accepted payments: Bitcoin, Litecoin, Monero, DASH, Bitcoin Cash and PayPal.
+
+httpsnjal.la_KEY: |
+ https://njal.la/
+
+DNSCryptProxy__Tool_KEY: |
+ DNSCrypt-Proxy - Tool
+
+DNSCryptProxy_is_a_commandline_DNS_proxy_with_support_for_the_encrypted_DNS_protocols_DNS_over_HTTPS_and_DNSCrypt._Can_cache_results_to_improve_spee_KEY: |
+ DNSCrypt-Proxy is a command-line DNS proxy with support for the encrypted DNS protocols, DNS over HTTPS and DNSCrypt. Can cache results to improve speed, and allows filtering, forwarding, and cloaking.
+
+httpsgithub.comjedisct1dnscryptproxy_KEY: |
+ https://github.com/jedisct1/dnscrypt-proxy/
+
+httpsgithub.comjedisct1dnscryptproxyreleases_KEY: |
+ https://github.com/jedisct1/dnscrypt-proxy/releases
+
+httpswww.freshports.orgdnsdnscryptproxy2_KEY: |
+ https://www.freshports.org/dns/dnscrypt-proxy2/
+
+httpopenports.senetdnscryptproxy_KEY: |
+ http://openports.se/net/dnscrypt-proxy
+
+httppkgsrc.senetdnscryptproxy2_KEY: |
+ http://pkgsrc.se/net/dnscrypt-proxy2
+
+Encrypted_ICANN_DNS_Providers_KEY: |
+ Encrypted ICANN DNS Providers
+
+Note_Using_an_encrypted_DNS_resolver_will_not_make_you_anonymous_nor_hide_your_internet_traffic_from_your_Internet_Service_Provider._But_it_will_prev_KEY: |
+ Note: Using an encrypted DNS resolver will not make you anonymous, nor hide your internet traffic from your Internet Service Provider. But it will prevent DNS hijacking, and make your DNS requests harder for third parties to eavesdrop on and tamper with. If you are currently using Google's DNS resolver, you should pick an alternative here.
+
+ICANN_DNS_Provider_KEY: |
+ ICANN DNS Provider
+
+Server_Locations_KEY: |
+ Server Locations
+
+Privacy_Policy_KEY: |
+ Privacy Policy
+
+Type_KEY: |
+ Type
+
+Logging_KEY: |
+ Logging
+
+Protocols_KEY: |
+ Protocols
+
+DNSSEC_KEY: |
+ DNSSEC
+
+QNAME_Minimization_KEY: |
+ QNAME Minimization
+
+Filtering_KEY: |
+ Filtering
+
+Source_Code_KEY: |
+ Source Code
+
+Hosting_Provider_KEY: |
+ Hosting Provider
+
+AdGuard_KEY: |
+ AdGuard
+
+httpsadguard.comenadguarddnsoverview.html_KEY: |
+ https://adguard.com/en/adguard-dns/overview.html
+
+Anycast_based_in_span_classnotextwrapspan_classflagicon_flagiconcyspan_Cyprusspan_KEY: |
+ Anycast (based in Cyprus)
+
+httpsadguard.comenprivacydns.html_KEY: |
+ https://adguard.com/en/privacy/dns.html
+
+Commercial_KEY: |
+ Commercial
+
+No_KEY: |
+ No
+
+DoH_DoT_DNSCrypt_KEY: |
+ DoH, DoT, DNSCrypt
+
+Yes_KEY: |
+ Yes
+
+Ads_trackers_KEY: |
+ Ads, trackers,
+
+malicious_domains_KEY: |
+ malicious domains
+
+httpsgithub.comAdguardTeamAdGuardDNS_KEY: |
+ https://github.com/AdguardTeam/AdGuardDNS/
+
+httpsflops.ruenabout.html_KEY: |
+ https://flops.ru/en/about.html
+
+Serveroid_LLC_KEY: |
+ Serveroid, LLC
+
+BlahDNS_KEY: |
+ BlahDNS
+
+httpsblahdns.com_KEY: |
+ https://blahdns.com/
+
+Finland_KEY: |
+ Finland
+
+Germany_KEY: |
+ Germany
+
+Japan_KEY: |
+ Japan
+
+Hobby_Project_KEY: |
+ Hobby Project
+
+DoH_KEY: |
+ DoH
+
+Supports_port_443_in_addition_to_853_KEY: |
+ Supports port 443 in addition to 853
+
+DoT_KEY: |
+ DoT
+
+DNSCrypt_KEY: |
+ DNSCrypt
+
+And_some_wildcard_and_IDN_domains._KEY: |
+ And some wildcard and IDN domains.
+
+httpsgithub.comookangzhengblahdnsdefaultblockedwildcarddomain_KEY: |
+ https://github.com/ookangzheng/blahdns#default-blocked-wildcard-domain
+
+httpsgithub.comookangzhengblahdns_KEY: |
+ https://github.com/ookangzheng/blahdns/
+
+httpswww.choopa.com_KEY: |
+ https://www.choopa.com/
+
+Choopa_LLC_KEY: |
+ Choopa, LLC
+
+httpswww.datacenterlight.ch_KEY: |
+ https://www.datacenterlight.ch/
+
+Data_Center_Light_KEY: |
+ Data Center Light
+
+httpswww.hetzner.com_KEY: |
+ https://www.hetzner.com/
+
+Hetzner_Online_GmbH_KEY: |
+ Hetzner Online GmbH
+
+Cloudflare_KEY: |
+ Cloudflare
+
+httpsdevelopers.cloudflare.com1.1.1.1settingup1.1.1.1_KEY: |
+ https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/
+
+Cloudflare_is_one_of_the_worlds_largest_networks_and_a_problem_considering_anonymity_and_decentralization._KEY: |
+ Cloudflare is one of the world's largest networks, and a problem considering anonymity and decentralization.
+
+httpscodeberg.orgcrimeflarecloudflaretor_KEY: |
+ https://codeberg.org/crimeflare/cloudflare-tor/
+
+Anycast_based_in_span_classnotextwrap_span_classflagicon_flagiconusspan_USspan_KEY: |
+ Anycast (based in US)
+
+httpswww.cloudflare.comprivacypolicy_KEY: |
+ https://www.cloudflare.com/privacypolicy/
+
+We_will_collect_limited_DNS_query_data_that_is_sent_to_the_resolvers._This_data_does_not_contain_user_IP_addresses_or_any_other_personally_identifiabl_KEY: |
+ "We will collect limited DNS query data that is sent to the resolvers. This data does not contain user IP addresses or any other personally identifiable information, and the bulk of the data is only stored for 24 hours."
+
+httpsdevelopers.cloudflare.com1.1.1.1commitmenttoprivacyprivacypolicyprivacypolicy_KEY: |
+ https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/privacy-policy/
+
+Some_KEY: |
+ Some
+
+Self_KEY: |
+ Self
+
+CZ.NIC_KEY: |
+ CZ.NIC
+
+httpswww.nic.czodvr_KEY: |
+ https://www.nic.cz/odvr/
+
+Czech_Republic_KEY: |
+ Czech Republic
+
+CZ.NIC_resolvers_neither_collect_any_personal_data_nor_gather_information_on_pages_where_your_computer_sends_personal_data._KEY: |
+ "CZ.NIC resolvers neither collect any personal data nor gather information on pages where your computer sends personal data."
+
+CZ.NIC_is_an_interest_association_of_legal_entities_founded_in_1998_by_leading_providers_of_Internet_services._KEY: |
+ "CZ.NIC is an interest association of legal entities, founded in 1998 by leading providers of Internet services."
+
+httpswww.nic.czpage351aboutassociation_KEY: |
+ https://www.nic.cz/page/351/about-association/
+
+Association_KEY: |
+ Association
+
+DoH_DoT_KEY: |
+ DoH, DoT
+
+dnswarden_KEY: |
+ dnswarden
+
+httpsgithub.combhanupratapysdnswardenblobmasterREADME.md_KEY: |
+ https://github.com/bhanupratapys/dnswarden/blob/master/README.md
+
+httpsgithub.combhanupratapysdnswardenblobmasterREADME.mdprivacypolicyandtc_KEY: |
+ https://github.com/bhanupratapys/dnswarden/blob/master/README.md#privacy-policy-and-tc
+
+Based_on_server_choice_KEY: |
+ Based on server choice
+
+Foundation_for_Applied_Privacy_KEY: |
+ Foundation for Applied Privacy
+
+httpsappliedprivacy.netservicesdns_KEY: |
+ https://appliedprivacy.net/services/dns/
+
+Austria_KEY: |
+ Austria
+
+httpsappliedprivacy.netprivacypolicy_KEY: |
+ https://appliedprivacy.net/privacy-policy
+
+NonProfit_KEY: |
+ Non-Profit
+
+We_do_NOT_log_your_IP_address_or_DNS_queries_during_normal_operations._We_do_NOT_share_query_data_with_third_parties_that_are_not_directly_involved_wi_KEY: |
+ "We do NOT log your IP address or DNS queries during normal operations. We do NOT share query data with third parties that are not directly involved with resolving the query (i.e. sending queries to authoritative nameservers for resolution)."
+
+httpswww.ipax.at_KEY: |
+ https://www.ipax.at/
+
+IPAX_OG_KEY: |
+ IPAX OG
+
+httpswww.nextdns.io_KEY: |
+ https://www.nextdns.io/
+
+NextDNS_KEY: |
+ NextDNS
+
+Anycast_based_in_span_classnotextwrapspan_classflagicon_flagiconusspan_USspan_KEY: |
+ Anycast (based in US)
+
+httpswww.nextdns.ioprivacy_KEY: |
+ https://www.nextdns.io/privacy
+
+Some_of_the_features_require_some_sort_of_data_retention._In_that_case_we_give_our_users_the_choice_to_granularly_or_completely_disable_those_feature_KEY: |
+ "Some of the features require some sort of data retention. In that case, we give our users the choice to granularly or completely disable those features (and associated data retention), and we follow up immediately on that promise"
+
+Based_on_user_choice_KEY: |
+ Based on user choice
+
+NixNet_KEY: |
+ NixNet
+
+httpsnixnet.xyzdns_KEY: |
+ https://nixnet.xyz/dns/
+
+Anycast_based_in_span_classflagicon_flagiconusspan_USspan_KEY: |
+ Anycast (based in US),
+
+US_KEY: |
+ US
+
+Luxembourg_KEY: |
+ Luxembourg
+
+httpsnixnet.xyzprivacy_KEY: |
+ https://nixnet.xyz/privacy/
+
+Part_of_LibreHosters_a_network_of_cooperation_and_solidarity_that_uses_free_software_to_encourage_decentralisation_through_federation_and_distributed_KEY: |
+ Part of LibreHosters, "a network of cooperation and solidarity that uses free software to encourage decentralisation through federation and distributed platforms."
+
+httpslibreho.st_KEY: |
+ https://libreho.st/
+
+Informal_collective_KEY: |
+ Informal collective
+
+httpsgit.nixnet.xyzNixNetdns_KEY: |
+ https://git.nixnet.xyz/NixNet/dns
+
+httpsfrantech.ca_KEY: |
+ https://frantech.ca/
+
+FranTech_Solutions_KEY: |
+ FranTech Solutions
+
+PowerDNS_KEY: |
+ PowerDNS
+
+httpspowerdns.org_KEY: |
+ https://powerdns.org/
+
+The_Netherlands_KEY: |
+ The Netherlands
+
+httpspowerdns.orgdohprivacy.html_KEY: |
+ https://powerdns.org/doh/privacy.html
+
+httpsgithub.comPowerDNSpdns_KEY: |
+ https://github.com/PowerDNS/pdns
+
+httpswww.transip.nl_KEY: |
+ https://www.transip.nl/
+
+TransIP_B.V._Admin_KEY: |
+ TransIP B.V. Admin
+
+Quad9_KEY: |
+ Quad9
+
+httpsquad9.net_KEY: |
+ https://quad9.net/
+
+Founders_include_the_Global_Cyber_Alliance_composed_of_the_City_of_London_Police_and_Manhattan_District_Attorneys_Office_KEY: |
+ Founders include the Global Cyber Alliance, composed of the City of London Police and Manhattan District Attorney's Office
+
+httpsquad9.netpolicy_KEY: |
+ https://quad9.net/policy/
+
+Our_normal_course_of_data_management_does_not_have_any_IP_address_information_or_other_PII_logged_to_disk_or_transmitted_out_of_the_location_in_which__KEY: |
+ "Our normal course of data management does not have any IP address information or other PII logged to disk or transmitted out of the location in which the query was received."
+
+Malicious_domains_KEY: |
+ Malicious domains
+
+httpswww.pch.net_KEY: |
+ https://www.pch.net/
+
+Packet_Clearing_House_KEY: |
+ Packet Clearing House
+
+SecureDNS_KEY: |
+ SecureDNS
+
+httpssecuredns.eu_KEY: |
+ https://securedns.eu/
+
+httpssecuredns.euprivacy_KEY: |
+ https://securedns.eu/#privacy
+
+httpswww.digitalocean.com_KEY: |
+ https://www.digitalocean.com/
+
+DigitalOcean_Inc._KEY: |
+ DigitalOcean, Inc.
+
+httpssnopyta.orgservicednsindex.html_KEY: |
+ https://snopyta.org/service/dns/index.html
+
+Snopyta_KEY: |
+ Snopyta
+
+httpssnopyta.orgprivacy_policy_KEY: |
+ https://snopyta.org/privacy_policy/
+
+UncensoredDNS_KEY: |
+ UncensoredDNS
+
+httpsblog.uncensoreddns.org_KEY: |
+ https://blog.uncensoreddns.org/
+
+Anycast_based_in_span_classnotextwrapspan_classflagicon_flagicondkspan_Denmark_KEY: |
+ Anycast (based in Denmark)
+
+Denmark_KEY: |
+ Denmark
+
+Absolutely_nothing_is_being_logged_neither_about_the_users_nor_the_usage_of_this_service._I_do_keep_graphs_of_the_total_number_of_queries_but_no_per_KEY: |
+ "Absolutely nothing is being logged, neither about the users nor the usage of this service. I do keep graphs of the total number of queries, but no personally identifiable information is saved. The data that is saved will never be sold or used for anything except capacity planning of the service."
+
+httpswww.teliacompany.com_KEY: |
+ https://www.teliacompany.com
+
+Telia_Company_AB_KEY: |
+ Telia Company AB
+
+Terms_KEY: |
+ Terms
+
+DNSoverTLS_DoT__A_security_protocol_for_encrypted_DNS_on_a_dedicated_port_853._Some_providers_support_port_443_which_generally_works_everywhere_wh_KEY: |
+ DNS-over-TLS (DoT) - A security protocol for encrypted DNS on a dedicated port 853. Some providers support port 443 which generally works everywhere while port 853 is often blocked by restrictive firewalls. DoT has two modes:
+
+Oppurtunistic_mode_the_client_attempts_to_form_a_DNSoverTLS_connection_to_the_server_on_port_853_without_performing_certificate_validation._If_it_fa_KEY: |
+ Oppurtunistic mode: the client attempts to form a DNS-over-TLS connection to the server on port 853 without performing certificate validation. If it fails, it will use unencrypted DNS.
+
+In_other_words_automatic_mode_leaves_your_DNS_traffic_vulnerable_to_SSL_strip_and_MITM_attacks_KEY: |
+ In other words automatic mode leaves your DNS traffic vulnerable to SSL strip and MITM attacks
+
+Strict_mode_the_client_connects_to_a_specific_hostname_and_performs_certificate_validation_for_it._If_it_fails_no_DNS_queries_are_made_until_it_succe_KEY: |
+ Strict mode: the client connects to a specific hostname and performs certificate validation for it. If it fails, no DNS queries are made until it succeeds.
+
+DNSoverHTTPS_DoH__Similar_to_DoT_but_uses_HTTPS_instead_being_indistinguishable_from_normal_HTTPS_traffic_on_port_443._KEY: |
+ DNS-over-HTTPS (DoH) - Similar to DoT, but uses HTTPS instead, being indistinguishable from "normal" HTTPS traffic on port 443.
+
+DoH_contains_metadata_such_as_useragent_which_may_include_system_information_that_is_sent_to_the_DNS_server._KEY: |
+ DoH contains metadata such as user-agent (which may include system information) that is sent to the DNS server.
+
+httpstools.ietf.orghtmlrfc8484section8.2_KEY: |
+ https://tools.ietf.org/html/rfc8484#section-8.2
+
+DNSCrypt__An_older_yet_robust_method_of_encrypting_DNS._KEY: |
+ DNSCrypt - An older yet robust method of encrypting DNS.
+
+How_to_verify_DNS_is_encrypted_KEY: |
+ How to verify DNS is encrypted
+
+DoH__DoT_KEY: |
+ DoH / DoT
+
+Check_a_hrefhttpswww.dnsleaktest.comDNSLeakTest.coma._KEY: |
+ Check DNSLeakTest.com.
+
+Your_DNS_provider_may_not_appear_with_their_own_name_so_compare_the_responses_to_what_you_know_or_can_find_about_your_DNS_provider._Just_ensure_you_do_KEY: |
+ Your DNS provider may not appear with their own name, so compare the responses to what you know or can find about your DNS provider. Just ensure you don't see your ISP or old unencrypted DNS provider.
+
+Check_the_website_of_your_DNS_provider._They_may_have_a_page_for_telling_you_are_using_our_DNS._Examples_include_a_hrefhttpsadguard.comenadgu_KEY: |
+ Check the website of your DNS provider. They may have a page for telling "you are using our DNS." Examples include AdGuard and Cloudflare.
+
+If_using_Firefoxs_trusted_recursive_resolver_TRR_navigate_to_codeaboutnetworkingdnscode._If_the_TRR_column_says_true_for_some_fields_you__KEY: |
+ If using Firefox's trusted recursive resolver (TRR), navigate to about:networking#dns
. If the TRR column says "true" for some fields, you are using DoH.
+
+Some_fields_will_say_false_depending_on_the_the_value_of_network.trr.mode_in_aboutconfig_KEY: |
+ Some fields will say "false" depending on the the value of network.trr.mode in about:config
+
+dnscryptproxy__Check_a_hrefhttpsgithub.comjedisct1dnscryptproxywikiCheckingdnscryptproxys_wiki_on_how_to_verify_that_your_DNS_is_encry_KEY: |
+ dnscrypt-proxy - Check dnscrypt-proxy's wiki on how to verify that your DNS is encrypted.
+
+DNSSEC__Check_a_hrefhttpsdnssec.vs.unidue.deDNSSEC_Resolver_Test_by_Matthus_Wandera._KEY: |
+ DNSSEC - Check DNSSEC Resolver Test by Matthäus Wander.
+
+QNAME_Minimization__Run_codedig_short_txt_qnamemintest.internet.nlcode_from_the_commandline_taken_from_a_hrefhttpsnlnetlabs.nldownloads_KEY: |
+ QNAME Minimization - Run dig +short txt qnamemintest.internet.nl
from the command-line (taken from this NLnet Labs presentation). If you are on Windows 10, run Resolve-DnsName -Type TXT -Name qnamemintest.internet.nl
from the PowerShell. You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
+
+Worth_Mentioning_and_Additional_Information_KEY: |
+ Worth Mentioning and Additional Information
+
+Encrypted_DNS_clients_for_desktop_KEY: |
+ Encrypted DNS clients for desktop:
+
+emFirefoxem_comes_with_builtin_DoH_support_with_Cloudflare_set_as_the_default_resolver_but_can_be_configured_to_use_any_DoH_resolver._KEY: |
+ Firefox comes with built-in DoH support with Cloudflare set as the default resolver, but can be configured to use any DoH resolver.
+
+Cloudflare_has_agreed_to_collect_only_a_limited_amount_of_data_about_the_DNS_requests_that_are_sent_to_the_Cloudflare_Resolver_for_Firefox_via_the_Fir_KEY: |
+ "Cloudflare has agreed to collect only a limited amount of data about the DNS requests that are sent to the Cloudflare Resolver for Firefox via the Firefox browser."
+
+httpsdevelopers.cloudflare.com1.1.1.1commitmenttoprivacyprivacypolicyfirefox_KEY: |
+ https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/
+
+Currently_Mozilla_is_a_hrefhttpsblog.mozilla.orgfuturereleases20190731dnsoverhttpsdohupdatedetectingmanagednetworksanduserchoice_KEY: |
+ Currently Mozilla is conducting studies before enabling DoH by default for all US-based Firefox users.
+
+DNS_over_HTTPS_can_be_enabled_in_Menu__Preferences_codeaboutpreferencescode__Network_Settings__Enable_DNS_over_HTTPS._Set_Use_Provider__KEY: |
+ DNS over HTTPS can be enabled in Menu -> Preferences (about:preferences
) -> Network Settings -> Enable DNS over HTTPS. Set "Use Provider" to "Custom", and enter your DoH provider's address.
+
+Advanced_users_may_enable_it_in_codeaboutconfigcode_by_setting_codenetwork.trr.custom_uricode_and_codenetwork.trr.uricode_as_the_addres_KEY: |
+ Advanced users may enable it in about:config
by setting network.trr.custom_uri
and network.trr.uri
as the address you find from the documentation of your DoH provider and network.trr.mode
as 2
. It may also be desirable to set network.security.esni.enabled
to True
in order to enable encrypted SNI and make sites supporting ESNI a bit more difficult to track.
+
+Encrypted_DNS_clients_for_mobile_KEY: |
+ Encrypted DNS clients for mobile:
+
+emAndroid_9em_comes_with_a_DoT_client_by_a_hrefhttpssupport.google.comandroidanswer9089903defaulta._KEY: |
+ Android 9 comes with a DoT client by default.
+
+...but_with_some_caveats_KEY: |
+ ...but with some caveats
+
+httpswww.quad9.netprivatednsquad9android9_KEY: |
+ https://www.quad9.net/private-dns-quad9-android9/
+
+We_recommend_selecting_emPrivate_DNS_provider_hostnameem_and_entering_the_DoT_address_from_documentation_of_your_DoT_provider_to_enable_strict_mod_KEY: |
+ We recommend selecting Private DNS provider hostname and entering the DoT address from documentation of your DoT provider to enable strict mode (see Terms above).
+
+If_you_are_on_a_network_blocking_access_to_port_853_Android_will_error_about_the_network_not_having_internet_connectivity._KEY: |
+ If you are on a network blocking access to port 853, Android will error about the network not having internet connectivity.
+
+httpsapps.apple.comappid1452162351_KEY: |
+ https://apps.apple.com/app/id1452162351
+
+DNSCloak_KEY: |
+ DNSCloak
+
+An_a_hrefhttpsgithub.comssdnscloakopensourcea_DNSCrypt_and_DoH_client_for_iOS_by_tda_datatoggletooltip_dataplacementbottom_da_KEY: |
+ An open-source DNSCrypt and DoH client for iOS by
#general:privacytools.io
.
+
+Reddit_KEY: |
+ Reddit
+
+Contributor_List_KEY: |
+ Contributor List
+
+Discourse__Reddit_KEY: |
+ Discourse & Reddit
+
+Join_our_Discourse_community_to_stay_up_to_date_on_privacy_news_or_make_suggestions!_KEY: |
+ Join our Discourse community to stay up to date on privacy news or make suggestions!
+
+httpsforum.privacytools.io_KEY: |
+ https://forum.privacytools.io/
+
+Discourse_KEY: |
+ Discourse
+
+Follow_on_Mastodon__Twitter_KEY: |
+ Follow on Mastodon & Twitter
+
+Get_the_latest_privacyrelated_updates_from_our_Mastodon_Feed._Follow_us_today!_KEY: |
+ Get the latest privacy-related updates from our Mastodon Feed. Follow us today!
+
+httpssocial.privacytools.io_KEY: |
+ https://social.privacytools.io/
+
+Develop_on_GitHub_KEY: |
+ Develop on GitHub
+
+The_complete_website_source_code_is_available_on_GitHub._Join_our_developer_team!_KEY: |
+ The complete website source code is available on GitHub. Join our developer team!
+
+httpsgithub.comprivacytoolsIOprivacytools.io_KEY: |
+ https://github.com/privacytoolsIO/privacytools.io
+
+GitHub_KEY: |
+ GitHub
+
+This_is_a_community_project_aiming_to_deliver_the_best_information_available_to_improve_privacy_online._Thank_you_for_participating._This_project_needs_KEY: |
+ This is a community project aiming to deliver the best information available to improve privacy online. Thank you for participating. This project needs you.
+
+The_Tor_network_is_a_group_of_volunteeroperated_servers_that_allows_people_to_improve_their_privacy_and_security_on_the_Internet._Tors_users_employ_t_KEY: |
+ The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Tor is an effective censorship circumvention tool.
+
+httpswww.freshports.orgsecuritytor_KEY: |
+ https://www.freshports.org/security/tor
+
+httpopenports.senettor_KEY: |
+ http://openports.se/net/tor
+
+httppkgsrc.senettor_KEY: |
+ http://pkgsrc.se/net/tor
+
+httpssupport.torproject.orgtormobiletormobile7_KEY: |
+ https://support.torproject.org/tormobile/tormobile-7/
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpsgitweb.torproject.orgtor.git_KEY: |
+ https://gitweb.torproject.org/tor.git
+
+I2P_Anonymous_Network_KEY: |
+ I2P Anonymous Network
+
+The_Invisible_Internet_Project_I2P_is_a_computer_network_layer_that_allows_applications_to_send_messages_to_each_other_pseudonymously_and_securely._U_KEY: |
+ The Invisible Internet Project (I2P) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous Web surfing, chatting, blogging, and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. The software is free and open-source and is published under multiple licenses.
+
+httpsgeti2p.net_KEY: |
+ https://geti2p.net/
+
+Requires_specific_software_to_access_geti2p.net_KEY: |
+ Requires specific software to access: geti2p.net
+
+httpsgeti2p.netendownloadwindows_KEY: |
+ https://geti2p.net/en/download#windows
+
+httpsgeti2p.netendownloadmac_KEY: |
+ https://geti2p.net/en/download#mac
+
+httpsgeti2p.netendownloadunix_KEY: |
+ https://geti2p.net/en/download#unix
+
+httpswww.freshports.orgsecurityi2p_KEY: |
+ https://www.freshports.org/security/i2p/
+
+httpopenports.seneti2pd_KEY: |
+ http://openports.se/net/i2pd
+
+httppkgsrc.sewipi2pd_KEY: |
+ http://pkgsrc.se/wip/i2pd
+
+httpsfdroid.orgappnet.i2p.android.router_KEY: |
+ https://f-droid.org/app/net.i2p.android.router
+
+httpsplay.google.comstoreappsdetails?idnet.i2p.android_KEY: |
+ https://play.google.com/store/apps/details?id=net.i2p.android
+
+httpsdownload.i2p2.deandroidcurrent_KEY: |
+ https://download.i2p2.de/android/current/
+
+httpsgeti2p.netengetinvolvedguidesnewdevelopersgettingthei2pcode_KEY: |
+ https://geti2p.net/en/get-involved/guides/new-developers#getting-the-i2p-code
+
+The_Freenet_Project_KEY: |
+ The Freenet Project
+
+Freenet_is_a_peertopeer_platform_for_censorshipresistant_communication._It_uses_a_decentralized_distributed_data_store_to_keep_and_deliver_informati_KEY: |
+ Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools were originally designed by Ian Clarke, who defined Freenet's goal as providing freedom of speech on the Internet with strong anonymity protection.
+
+httpsfreenetproject.org_KEY: |
+ https://freenetproject.org/
+
+httpsfreenetproject.orgpagesdownload.htmlwindows_KEY: |
+ https://freenetproject.org/pages/download.html#windows
+
+httpsfreenetproject.orgpagesdownload.htmlosx_KEY: |
+ https://freenetproject.org/pages/download.html#os-x
+
+httpsfreenetproject.orgpagesdownload.htmlgnulinuxposix_KEY: |
+ https://freenetproject.org/pages/download.html#gnulinux-posix
+
+httpsgithub.comfreenet_KEY: |
+ https://github.com/freenet/
+
+Joplin_KEY: |
+ Joplin
+
+Joplin_is_a_free_opensource_and_fullyfeatured_notetaking_and_todo_application_which_can_handle_a_large_number_of_markdown_notes_organized_into_no_KEY: |
+ Joplin is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers end-to-end encryption and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes.
+
+httpsjoplinapp.org_KEY: |
+ https://joplinapp.org/
+
+httpsjoplinapp.orgdesktopapplications_KEY: |
+ https://joplinapp.org/#desktop-applications
+
+httpswww.npmjs.compackagejoplin_KEY: |
+ https://www.npmjs.com/package/joplin
+
+httpsaddons.mozilla.orgenUSfirefoxaddonjoplinwebclipper_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/joplin-web-clipper/
+
+httpschrome.google.comwebstoredetailjoplinwebclipperalofnhikmmkdbbbgpnglcpdollgjjfek_KEY: |
+ https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek
+
+httpsjoplinapp.orgimagesBadgeAndroid.png_KEY: |
+ https://joplinapp.org/images/BadgeAndroid.png
+
+httpsjoplinapp.orgmobileapplications_KEY: |
+ https://joplinapp.org/#mobile-applications
+
+httpsitunes.apple.comusappjoplinid1315599797_KEY: |
+ https://itunes.apple.com/us/app/joplin/id1315599797
+
+httpsgithub.comlaurent22joplin_KEY: |
+ https://github.com/laurent22/joplin
+
+Standard_Notes_KEY: |
+ Standard Notes
+
+Standard_Notes_is_a_simple_and_private_notes_app_that_makes_your_notes_easy_and_available_everywhere_you_are._Features_endtoend_encryption_on_every_p_KEY: |
+ Standard Notes is a simple and private notes app that makes your notes easy and available everywhere you are. Features end-to-end encryption on every platform, and a powerful desktop experience with themes and custom editors.
+
+httpsstandardnotes.org_KEY: |
+ https://standardnotes.org/
+
+httpsstandardnotes.orggetstarted_KEY: |
+ https://standardnotes.org/#get-started
+
+httpsfdroid.orgpackagescom.standardnotes_KEY: |
+ https://f-droid.org/packages/com.standardnotes/
+
+httpsplay.google.comstoreappsdetails?idcom.standardnotes_KEY: |
+ https://play.google.com/store/apps/details?id=com.standardnotes
+
+httpsitunes.apple.comusappstandardnotesid1285392450_KEY: |
+ https://itunes.apple.com/us/app/standard-notes/id1285392450
+
+httpsapp.standardnotes.org_KEY: |
+ https://app.standardnotes.org/
+
+httpsgithub.comstandardnotes_KEY: |
+ https://github.com/standardnotes
+
+Turtl_KEY: |
+ Turtl
+
+Turtl_lets_you_take_notes_bookmark_websites_and_store_documents_for_sensitive_projects._From_sharing_passwords_with_your_coworkers_to_tracking_resear_KEY: |
+ Turtl lets you take notes, bookmark websites, and store documents for sensitive projects. From sharing passwords with your coworkers to tracking research on an article you're writing, Turtl keeps it all safe from everyone but you and those you share with.
+
+httpsturtlapp.com_KEY: |
+ https://turtlapp.com/
+
+httpsturtlapp.comdownload_KEY: |
+ https://turtlapp.com/download/
+
+httpsaddons.mozilla.orgenUSfirefoxaddonturtlbookmarking_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/turtl-bookmarking/
+
+httpschrome.google.comwebstoredetailturtldgcojenhfdjhieoglmiaheihjadlpcml_KEY: |
+ https://chrome.google.com/webstore/detail/turtl/dgcojenhfdjhieoglmiaheihjadlpcml
+
+httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl_KEY: |
+ https://play.google.com/store/apps/details?id=com.lyonbros.turtl
+
+httpsgithub.comturtl_KEY: |
+ https://github.com/turtl
+
+Privacy?_I_dont_have_anything_to_hide._KEY: |
+ Privacy? I don't have anything to hide.
+
+How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com_KEY: |
+ How do you counter the "I have nothing to hide?" argument? (reddit.com)
+
+httpspapers.ssrn.comsol3papers.cfm?abstract_id998565_KEY: |
+ https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
+
+Global_Mass_Surveillance__The_Fourteen_Eyes_KEY: |
+ Global Mass Surveillance - The Fourteen Eyes
+
+UKUSA_Agreement_KEY: |
+ UKUSA Agreement
+
+The_UKUSA_Agreement_is_an_agreement_between_the_United_Kingdom_United_States_Australia_Canada_and_New_Zealand_to_cooperatively_collect_analyze_an_KEY: |
+ The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.
+
+Australia_KEY: |
+ Australia
+
+Canada_KEY: |
+ Canada
+
+New_Zealand_KEY: |
+ New Zealand
+
+United_Kingdom_KEY: |
+ United Kingdom
+
+United_States_of_America_KEY: |
+ United States of America
+
+Five_Eyes_KEY: |
+ Five Eyes
+
+France_KEY: |
+ France
+
+Nine_Eyes_KEY: |
+ Nine Eyes
+
+Italy_KEY: |
+ Italy
+
+Spain_KEY: |
+ Spain
+
+Sweden_KEY: |
+ Sweden
+
+Fourteen_Eyes_KEY: |
+ Fourteen Eyes
+
+Key_Disclosure_Law_KEY: |
+ Key Disclosure Law
+
+Who_is_required_to_hand_over_the_encryption_keys_to_authorities?_KEY: |
+ Who is required to hand over the encryption keys to authorities?
+
+Mandatory_a_hrefhttpsen.wikipedia.orgwikiKey_disclosure_lawkey_disclosure_lawsa_require_individuals_to_turn_over_encryption_keys_to_law_en_KEY: |
+ Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability. Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawAntigua_and_Barbuda_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda
+
+Antigua_and_Barbuda_KEY: |
+ Antigua and Barbuda
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawAustralia_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Australia
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawCanada_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Canada
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawFrance_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#France
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawIndia_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#India
+
+India_KEY: |
+ India
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawIreland_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Ireland
+
+Ireland_KEY: |
+ Ireland
+
+httpsedri.orgnorwayintroducesforcedbiometricauthentication_KEY: |
+ https://edri.org/norway-introduces-forced-biometric-authentication/
+
+httpswww.bloomberg.comnewsarticles20180320telegramlosesbidtostoprussiafromgettingencryptionkeys_KEY: |
+ https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys
+
+Russia_KEY: |
+ Russia
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawSouth_Africa_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa
+
+South_Africa_KEY: |
+ South Africa
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawUnited_Kingdom_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom
+
+Key_disclosure_laws_apply_KEY: |
+ Key disclosure laws apply
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawBelgium_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium
+
+Belgium__KEY: |
+ Belgium *
+
+httpswww.riigiteataja.eeakt106012016019_KEY: |
+ https://www.riigiteataja.ee/akt/106012016019
+
+Estonia_KEY: |
+ Estonia
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawFinland_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Finland
+
+Finland__KEY: |
+ Finland *
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawNew_Zealand_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand
+
+unclear_KEY: |
+ unclear
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawThe_Netherlands_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands
+
+The_Netherlands__KEY: |
+ The Netherlands *
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawUnited_States_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#United_States
+
+United_States_KEY: |
+ United States
+
+see_related_info_KEY: |
+ see related info
+
+Key_disclosure_laws_may_apply_KEY: |
+ Key disclosure laws may apply
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawCzech_Republic_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawGermany_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Germany
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawIceland_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Iceland
+
+Iceland_KEY: |
+ Iceland
+
+httpsiclg.compracticeareascybersecuritylawsandregulationsitaly_KEY: |
+ https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/italy
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawPoland_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Poland
+
+Poland_KEY: |
+ Poland
+
+httpsen.wikipedia.orgwikiKey_disclosure_lawSweden_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden
+
+proposed_KEY: |
+ proposed
+
+httpswww.wikipedia.orgwikiKey_disclosure_lawSwitzerland_KEY: |
+ https://www.wikipedia.org/wiki/Key_disclosure_law#Switzerland
+
+Key_disclosure_laws_dont_apply_KEY: |
+ Key disclosure laws don't apply
+
+_people_who_know_how_to_access_a_system_may_be_ordered_to_share_their_knowledge_stronghowever_this_doesnt_apply_to_the_suspect_itself_or_family__KEY: |
+ * (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)
+
+httpsen.wikipedia.orgwikiKey_disclosure_law_KEY: |
+ https://en.wikipedia.org/wiki/Key_disclosure_law
+
+Wikipedia_page_on_key_disclosure_law_KEY: |
+ Wikipedia page on key disclosure law
+
+httpslaw.stackexchange.comquestions1523canauscitizenberequiredtoprovidetheauthenticationkeyforencrypteddat_KEY: |
+ https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat
+
+law.stackexchange.com_question_about_key_disclosure_law_in_US_KEY: |
+ law.stackexchange.com question about key disclosure law in US
+
+httpspeertube.mastodon.hostvideoswatche09915eb59624830a02f8da5c2b59e71_KEY: |
+ https://peertube.mastodon.host/videos/watch/e09915eb-5962-4830-a02f-8da5c2b59e71
+
+DEFCON_20_Crypto_and_the_Cops_the_Law_of_Key_Disclosure_and_Forced_Decryption_KEY: |
+ DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption
+
+Why_is_it_not_recommended_to_choose_a_USbased_service?_KEY: |
+ Why is it not recommended to choose a US-based service?
+
+USA_KEY: |
+ USA
+
+Services_based_in_the_United_States_are_not_recommended_because_of_the_countrys_surveillance_programs_and_use_of_a_hrefhttpswww.eff.orgissuesn_KEY: |
+ Services based in the United States are not recommended because of the country's surveillance programs and use of National Security Letters (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
+
+An_example_of_this_is_a_hrefhttpsen.wikipedia.orgwikiLavabitSuspension_and_gag_orderLavabita__a_secure_email_service_created_by_Ladar_Le_KEY: |
+ An example of this is Lavabit – a secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
+
+Ultimately_Levison_turned_over_the_SSL_keys_and_a_hrefhttpswww.theguardian.comcommentisfree2014may20whydidlavabitshutdownsnowdenemail_KEY: |
+ Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order.
+
+httpswww.bestvpn.comtheultimateprivacyguideavoidus_KEY: |
+ https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus
+
+Avoid_all_US_and_UK_based_services_KEY: |
+ Avoid all US and UK based services
+
+httpsen.wikipedia.orgwikiSurespotHistory_KEY: |
+ https://en.wikipedia.org/wiki/Surespot#History
+
+Proof_that_warrant_canaries_work_based_on_the_surespot_example._KEY: |
+ Proof that warrant canaries work based on the surespot example.
+
+httpsen.wikipedia.orgwikiUKUSA_Agreement_KEY: |
+ https://en.wikipedia.org/wiki/UKUSA_Agreement
+
+The_United_Kingdom__United_States_of_America_Agreement_UKUSA_KEY: |
+ The United Kingdom – United States of America Agreement (UKUSA)
+
+httpsen.wikipedia.orgwikiLavabitSuspension_and_gag_order_KEY: |
+ https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order
+
+Lavabit_Suspension_and_gag_order_KEY: |
+ Lavabit: Suspension and gag order
+
+Key_disclosure_law_KEY: |
+ Key disclosure law
+
+httpsen.wikipedia.orgwikiPortalMass_surveillance_KEY: |
+ https://en.wikipedia.org/wiki/Portal:Mass_surveillance
+
+Wikipedia_Portal_Mass_surveillance_KEY: |
+ Wikipedia Portal: Mass_surveillance
+
+Recommended_VPN_Service_KEY: |
+ Recommended VPN Service
+
+Our_recommended_provider_is_outside_the_US_uses_encryption_accepts_Bitcoin_supports_OpenVPN_and_has_a_no_logging_policy._a_hrefcriteriaRead_o_KEY: |
+ Our recommended provider is outside the US, uses encryption, accepts Bitcoin, supports OpenVPN, and has a no logging policy. Read our full list of criteria for more information.
+
+Mullvad_KEY: |
+ Mullvad
+
+EUR_KEY: |
+ EUR
+
+60Year_KEY: |
+ €60/Year
+
+strongMullvadstrong_is_a_fast_and_inexpensive_VPN_with_a_serious_focus_on_transparency_and_security._They_have_been_in_operation_since_strong200_KEY: |
+ Mullvad is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since 2009. It is the only VPN provider that currently meets our criteria for recommendation. Mullvad is based in Sweden and does not have a free trial. Visit mullvad.net to create an account.
+
+406_Servers_KEY: |
+ 406+ Servers
+
+Mullvad_has_409_servers_in_39_countries_at_the_time_of_writing_this_page._Typically_the_more_servers_a_provider_offers_the_better_With_hundreds_of_se_KEY: |
+ Mullvad has 409 servers in 39 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.
+
+WireGuard_Support_KEY: |
+ WireGuard Support
+
+In_addition_to_standard_OpenVPN_connections_Mullvad_supports_WireGuard._WireGuard_is_an_experimental_protocol_with_theoretically_better_security_and_h_KEY: |
+ In addition to standard OpenVPN connections, Mullvad supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
+
+Independently_Audited_KEY: |
+ Independently Audited
+
+Mullvads_VPN_clients_have_been_audited_by_Cure53_and_Assured_AB_in_a_pentest_report_a_hrefhttpscure53.depentestreport_mullvad_v2.pdfpublishe_KEY: |
+ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest report published at cure53.de.
+
+The_security_researchers_concluded_KEY: |
+ The security researchers concluded:
+
+...Cure53_and_Assured_AB_are_happy_with_the_results_of_the_audit_and_the_software_leaves_an_overall_positive_impression._With_security_dedication_of_th_KEY: |
+ ...Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint.
+
+Accepts_Bitcoin_KEY: |
+ Accepts Bitcoin
+
+Mullvad_in_addition_to_accepting_creditdebit_cards_and_PayPal_accepts_strongBitcoinstrong_strongBitcoin_Cashstrong_and_strongcashlocal_KEY: |
+ Mullvad in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, and cash/local currency as anonymous forms of payment. They also accept Swish and bank wire transfers.
+
+No_Mobile_Clients_KEY: |
+ No Mobile Clients
+
+While_iOS_and_Android_clients_are_reportedly_in_the_works_mobile_users_will_need_to_use_a_traditional_OpenVPN_client_and_configuration_files_which_ar_KEY: |
+ While iOS and Android clients are reportedly in the works, mobile users will need to use a traditional OpenVPN client and configuration files, which are a bit more difficult to configure.
+
+Extra_Functionality_KEY: |
+ Extra Functionality
+
+The_Mullvad_VPN_clients_have_a_builtin_killswitch_to_block_internet_connections_outside_of_the_VPN._They_also_are_able_to_automatically_start_on_boot._KEY: |
+ The Mullvad VPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. The Mullvad website is also accessible via Tor at xcln5hkbriyklr6n.onion.
+
+Note_Using_a_VPN_provider_will_not_make_you_anonymous_but_it_will_give_you_better_privacy_in_certain_situations._A_VPN_is_not_a_tool_for_illegal_acti_KEY: |
+ Note: Using a VPN provider will not make you anonymous, but it will give you better privacy in certain situations. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.
+
+Other_Providers_Worth_Mentioning_KEY: |
+ Other Providers Worth Mentioning
+
+ProtonVPN_KEY: |
+ ProtonVPN
+
+USD_KEY: |
+ USD
+
+96year_KEY: |
+ $96/year
+
+strongProtonVPNstrong_is_a_strong_contender_in_the_VPN_space_and_they_have_been_in_operation_since_strong2016strong._ProtonVPN_is_based_in__KEY: |
+ ProtonVPN is a strong contender in the VPN space, and they have been in operation since 2016. ProtonVPN is based in Switzerland and offers a limited free pricing tier, as well as premium options. Unfortunately due to its lack of an independent security audit it does not meet the complete criteria for recommendation, see our notes below.
+
+Not_Audited_KEY: |
+ Not Audited
+
+ProtonVPN_has_not_undergone_a_security_audit_by_an_independent_third_party_and_therefore_cannot_be_strongly_recommended_at_this_time._We_have_still_ch_KEY: |
+ ProtonVPN has not undergone a security audit by an independent third party, and therefore cannot be strongly recommended at this time. We have still chosen to list it on this page with the assumption that an audit will be published soon
+
+We_are_currently_undergoing_a_complete_security_audit_of_our_VPN_applications_by_a_reputable_Swiss_security_company._The_results_of_the_audit_will_be_s_KEY: |
+ We are currently undergoing a complete security audit of our VPN applications by a reputable Swiss security company. The results of the audit will be summarized in a public report for cases like this.
+
+Marc_Loebekken_ProtonVPN_AG_Legal_counsel_KEY: |
+ Marc Loebekken, ProtonVPN AG Legal counsel
+
+We_will_reevaluate_this_listing_at_the_end_of_2019_or_when_the_aforementioned_report_has_been_published_whichever_is_sooner._KEY: |
+ We will reevaluate this listing at the end of 2019 or when the aforementioned report has been published, whichever is sooner.
+
+526_Servers_KEY: |
+ 526+ Servers
+
+ProtonVPN_has_526_servers_in_42_countries_at_the_time_of_writing_this_page._Typically_the_more_servers_a_provider_offers_the_better_With_hundreds_of__KEY: |
+ ProtonVPN has 526 servers in 42 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.
+
+ProtonVPN_does_technically_accept_Bitcoin_payments_however_you_either_need_to_have_an_existing_account_or_contact_their_support_team_in_advance_to_r_KEY: |
+ ProtonVPN does technically accept Bitcoin payments; however, you either need to have an existing account, or contact their support team in advance to register with Bitcoin.
+
+Mobile_Clients_KEY: |
+ Mobile Clients
+
+In_addition_to_providing_standard_OpenVPN_configuration_files_ProtonVPN_has_mobile_clients_for_iOS_or_Android_allowing_for_easy_connections_to_their_s_KEY: |
+ In addition to providing standard OpenVPN configuration files, ProtonVPN has mobile clients for iOS or Android allowing for easy connections to their servers.
+
+The_ProtonVPN_clients_have_a_builtin_killswitch_to_block_internet_connections_outside_of_the_VPN._They_also_are_able_to_automatically_start_on_boot._P_KEY: |
+ The ProtonVPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. ProtonVPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using the official Tor Browser for this purpose.
+
+IVPN_KEY: |
+ IVPN
+
+100Year_KEY: |
+ $100/Year
+
+strongIVPNstrong_is_another_strong_premium_VPN_provider_and_they_have_been_in_operation_since_strong2009strong._IVPN_is_based_in_span_class_KEY: |
+ IVPN is another strong premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar and offers a 3 day free trial. Unfortunately, due to its lack of an independent security audit, it does not meet the complete criteria for recommendation, see our notes below.
+
+No_Security_Audit_KEY: |
+ No Security Audit
+
+IVPN_has_undergone_a_a_hrefhttpscure53.deauditreport_ivpn.pdfnologging_audit_from_Cure53a_which_concluded_in_agreement_with_IVPNs_nolog_KEY: |
+ IVPN has undergone a no-logging audit from Cure53 which concluded in agreement with IVPN's no-logging claim. However, IVPN has not undergone a more comprehensive security audit by an independent third party, and therefore cannot be strongly recommended at this time. We have still chosen to list it on this page with the assumption that an audit will be published soon: The IVPN team reportedly plans to begin the process in September.
+
+77_Servers_KEY: |
+ 77+ Servers
+
+IVPN_has_77_servers_in_31_countries_at_the_time_of_writing_this_page._Typically_the_more_servers_a_provider_offers_the_better._IVPN_has_a_decent_but__KEY: |
+ IVPN has 77 servers in 31 countries at the time of writing this page. Typically the more servers a provider offers, the better. IVPN has a decent (but not exceptional) server count that will most likely provide adequate coverage to most users.
+
+In_addition_to_accepting_creditdebit_cards_and_PayPal_IVPN_accepts_strongBitcoinstrong_and_strongcashlocal_currencystrong_on_annual_plans_KEY: |
+ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin and cash/local currency (on annual plans) as anonymous forms of payment.
+
+In_addition_to_providing_standard_OpenVPN_configuration_files_IVPN_has_mobile_clients_for_iOS_or_Android_allowing_for_easy_connections_to_their_server_KEY: |
+ In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for iOS or Android allowing for easy connections to their servers.
+
+The_IVPN_clients_have_a_builtin_killswitch_to_block_internet_connections_outside_of_the_VPN._They_also_are_able_to_automatically_start_on_boot._IVPN_a_KEY: |
+ The IVPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. IVPN also provides "AntiTracker" functionality, which blocks advertising networks and trackers from the network level.
+
+What_is_a_warrant_canary?_KEY: |
+ What is a warrant canary?
+
+Warrant_Canary_Example_KEY: |
+ Warrant Canary Example
+
+A_warrant_canary_is_a_posted_document_stating_that_an_organization_has_not_received_any_secret_subpoenas_during_a_specific_period_of_time._If_this_docu_KEY: |
+ A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.
+
+Warrant_Canary_Examples_KEY: |
+ Warrant Canary Examples:
+
+httpsproxy.shcanary_KEY: |
+ https://proxy.sh/canary
+
+httpswww.ivpn.netresourcescanary.txt_KEY: |
+ https://www.ivpn.net/resources/canary.txt
+
+httpswww.bolehvpn.netcanary.txt_KEY: |
+ https://www.bolehvpn.net/canary.txt
+
+httpswww.ipredator.sestaticdownloadscanary.txt_KEY: |
+ https://www.ipredator.se/static/downloads/canary.txt
+
+Related_Warrant_Canary_Information_KEY: |
+ Related Warrant Canary Information
+
+httpswww.eff.orgdeeplinks201404warrantcanaryfaq_KEY: |
+ https://www.eff.org/deeplinks/2014/04/warrant-canary-faq
+
+Warrant_Canary_Frequently_Asked_Questions_KEY: |
+ Warrant Canary Frequently Asked Questions
+
+httpsen.wikipedia.orgwikiWarrant_canaryCompanies_and_organizations_with_warrant_canaries_KEY: |
+ https://en.wikipedia.org/wiki/Warrant_canary#Companies_and_organizations_with_warrant_canaries
+
+Companies_and_organizations_with_warrant_canaries_KEY: |
+ Companies and organizations with warrant canaries
+
+httpswww.schneier.comblogarchives201503australia_outla.html_KEY: |
+ https://www.schneier.com/blog/archives/2015/03/australia_outla.html
+
+Warrant_canary_criticism_by_Bruce_Schneier_and_an_example_of_a_law_against_warrant_canaries._KEY: |
+ Warrant canary criticism by Bruce Schneier and an example of a law against warrant canaries.
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefox
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: |
+ https://www.claws-mail.org/downloads.php?section=downloads
+
+PrivacyRespecting_Search_Engines_KEY: |
+ Privacy-Respecting Search Engines
+
+If_you_are_currently_using_search_engines_like_Google_Bing_or_Yahoo_you_should_pick_an_alternative_here._KEY: |
+ If you are currently using search engines like Google, Bing, or Yahoo, you should pick an alternative here.
+
+searx__Decentral_KEY: |
+ searx - Decentral
+
+searx_is_an_a_hrefhttpsgithub.comasciimoosearxopensourcea_metasearch_engine_aggregating_the_results_of_other_search_engines_while_not_st_KEY: |
+ searx is an open-source metasearch engine, aggregating the results of other search engines while not storing information about its users. No logs, no ads and no tracking. There is a list of public instances, or you can try the PrivacyTools Search
+
+httpssearx.me_KEY: |
+ https://searx.me/
+
+httpsgithub.comasciimoosearx_KEY: |
+ https://github.com/asciimoo/searx
+
+DuckDuckGo__USA_KEY: |
+ DuckDuckGo - USA
+
+DuckDuckGo_is_a_search_engine_that_doesnt_track_you._Some_of_DuckDuckGos_code_is_free_software_hosted_at_GitHub_but_the_core_is_proprietary._span_KEY: |
+ DuckDuckGo is a "search engine that doesn't track you." Some of DuckDuckGo's code is free software hosted at GitHub, but the core is proprietary. The company is based in the USA.
+
+httpsduckduckgo.com_KEY: |
+ https://duckduckgo.com/
+
+httpsgithub.comduckduckgo_KEY: |
+ https://github.com/duckduckgo
+
+Qwant__France_KEY: |
+ Qwant - France
+
+Qwant_is_a_search_engine_with_its_philosophy_based_on_two_principles_no_user_tracking_and_no_filter_bubble._Qwant_was_launched_in_France_in_February_2_KEY: |
+ Qwant is a search engine with its philosophy based on two principles: no user tracking and no filter bubble. Qwant was launched in France in February 2013.
+
+httpswww.qwant.com_KEY: |
+ https://www.qwant.com/
+
+httpsgithub.comQwant_KEY: |
+ https://github.com/Qwant/
+
+Firefox_Addon_KEY: |
+ Firefox Addon
+
+httpsaddons.mozilla.orgfirefoxaddongooglesearchlinkfix_KEY: |
+ https://addons.mozilla.org/firefox/addon/google-search-link-fix/
+
+Google_search_link_fix_KEY: |
+ Google search link fix
+
+Firefox_extension_that_prevents_Google_and_Yandex_search_pages_from_modifying_search_result_links_when_you_click_them._This_is_useful_when_copying_link_KEY: |
+ Firefox extension that prevents Google and Yandex search pages from modifying search result links when you click them. This is useful when copying links but it also helps privacy by preventing the search engines from recording your clicks.
+
+Open_Source_KEY: |
+ Open Source
+
+Worth_Mentioning_KEY: |
+ Worth Mentioning
+
+httpsyacy.net_KEY: |
+ https://yacy.net/
+
+YaCy_KEY: |
+ YaCy
+
+A_freesoftware_P2P_search_engine_powered_by_its_users._KEY: |
+ A free-software P2P search engine powered by its users.
+
+httpsjivesearch.com_KEY: |
+ https://jivesearch.com/
+
+Jive_Search_KEY: |
+ Jive Search
+
+A_freesoftware_search_engine_with_a_similar_look_and_feel_to_Google._KEY: |
+ A free-software search engine with a similar look and feel to Google.
+
+httpsmetager.deen_KEY: |
+ https://metager.de/en/
+
+MetaGer_KEY: |
+ MetaGer
+
+An_opensource_metasearch_engine_which_is_based_in_Germany._It_focuses_on_protecting_the_users_privacy._KEY: |
+ An open-source metasearch engine, which is based in Germany. It focuses on protecting the user's privacy.
+
+httpswww.mojeek.com_KEY: |
+ https://www.mojeek.com/
+
+Mojeek_KEY: |
+ Mojeek
+
+Independent_and_unbiased_search_results_with_no_user_tracking._KEY: |
+ Independent and unbiased search results with no user tracking.
+
+Signal_KEY: |
+ Signal
+
+Signal_is_a_mobile_app_developed_by_Open_Whisper_Systems._The_app_provides_instant_messaging_as_well_as_voice_and_video_calling._All_communications_ar_KEY: |
+ Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling. All communications are end-to-end encrypted. Signal is free and open source.
+
+VoIP_KEY: |
+ VoIP
+
+httpssignal.org_KEY: |
+ https://signal.org/
+
+httpssignal.orgdownload_KEY: |
+ https://signal.org/download/
+
+httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms_KEY: |
+ https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
+
+httpssignal.organdroidapkapkdanger_KEY: |
+ https://signal.org/android/apk/#apk-danger
+
+httpsapps.apple.comusappsignalprivatemessengerid874139669_KEY: |
+ https://apps.apple.com/us/app/signal-private-messenger/id874139669
+
+httpsgithub.comsignalapp_KEY: |
+ https://github.com/signalapp
+
+Wire_KEY: |
+ Wire
+
+Wire_is_a_free_and_endtoend_encrypted_chatting_application_that_supports_instant_messaging_voice_and_video_calls._Full_source_code_is_available._KEY: |
+ Wire is a free and end-to-end encrypted chatting application that supports instant messaging, voice, and video calls. Full source code is available.
+
+Wire_stores_some_plaintext_metadata_about_its_users_on_their_servers._This_data_includes_profile_names_profile_pictures_usernames_and_users_lists_o_KEY: |
+ Wire stores some plaintext metadata about its users on their servers. This data includes profile names, profile pictures, usernames, and users' lists of connections and conversations.
+
+a_hrefwww.vice.comen_usarticlegvzw5xsecuremessagingappwirestoreseveryoneyouveevercontactedinplaintextWarninga_KEY: |
+ Warning
+
+httpswire.com_KEY: |
+ https://wire.com/
+
+httpswire.comendownload_KEY: |
+ https://wire.com/en/download
+
+httpsplay.google.comstoreappsdetails?idcom.wire_KEY: |
+ https://play.google.com/store/apps/details?id=com.wire
+
+httpsitunes.apple.comappwireid930944768?mt8_KEY: |
+ https://itunes.apple.com/app/wire/id930944768?mt=8
+
+httpsapp.wire.com_KEY: |
+ https://app.wire.com
+
+httpsgithub.comwireapp_KEY: |
+ https://github.com/wireapp/
+
+Linphone_KEY: |
+ Linphone
+
+Linphone_is_an_opensource_SIP_Phone_and_a_free_voice_over_IP_service_available_on_mobile_and_desktop_environments_and_on_web_browsers._It_supports_ZR_KEY: |
+ Linphone is an open-source SIP Phone and a free voice over IP service, available on mobile and desktop environments and on web browsers. It supports ZRTP for end-to-end encrypted voice and video communication.
+
+httpswww.linphone.org_KEY: |
+ https://www.linphone.org/
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpsfdroid.orgpackagesorg.linphone_KEY: |
+ https://f-droid.org/packages/org.linphone
+
+httpsplay.google.comstoreappsdetails?idorg.linphone_KEY: |
+ https://play.google.com/store/apps/details?id=org.linphone
+
+httpsitunes.apple.comusapplinphoneid360065638?mt8_KEY: |
+ https://itunes.apple.com/us/app/linphone/id360065638?mt=8
+
+httpsgithub.comBelledonneCommunications_KEY: |
+ https://github.com/BelledonneCommunications
+
+Mumble_KEY: |
+ Mumble
+
+Mumble_is_an_opensource_lowlatency_and_high_quality_voice_chat_application_primarily_intended_for_use_while_gaming._Note_that_while_Mumble_doesnt__KEY: |
+ Mumble is an open-source, low-latency, and high quality voice chat application primarily intended for use while gaming. Note that while Mumble doesn't log messages or record by default, it's missing end-to-end encryption, so self-hosting is recommended.
+
+httpsmumble.info_KEY: |
+ https://mumble.info/
+
+httpswww.mumble.infodownloads_KEY: |
+ https://www.mumble.info/downloads
+
+httpswww.mumble.infodownloadsthirdpartyclients_KEY: |
+ https://www.mumble.info/downloads/#third-party-clients
+
+httpsapps.apple.comusappmumbleid443472808?ls1_KEY: |
+ https://apps.apple.com/us/app/mumble/id443472808?ls=1
+
+httpsgithub.commumblevoip_KEY: |
+ https://github.com/mumble-voip/
+
+Riot.im_Matrix_KEY: |
+ Riot.im (Matrix)
+
+Riot.im_is_a_federated_freesoftware_messaging_application_based_on_the_a_hrefhttpsmatrix.orgMatrixa_protocol_a_recent_open_protocol_for_re_KEY: |
+ Riot.im is a federated free-software messaging application based on the Matrix protocol, a recent open protocol for real-time communication offering optional E2E encryption. It also has bridging functionality, allowing you to connect to other chat protocols such as IRC or Telegram.
+
+The_endtoend_encryption_is_currently_in_beta_and_the_mobile_client_states_Endtoend_encryption_is_in_beta_and_may_not_be_reliable._You_should_not__KEY: |
+ The end-to-end encryption is currently in beta, and the mobile client states 'End-to-end encryption is in beta and may not be reliable. You should not yet trust it to secure data.'
+
+a_hrefgithub.comvectorimriotwebissues6779Experimental_E2EEa_KEY: |
+ Experimental E2EE
+
+httpsabout.riot.im_KEY: |
+ https://about.riot.im/
+
+httpsriot.imdownloaddesktop_KEY: |
+ https://riot.im/download/desktop/
+
+httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha_KEY: |
+ https://f-droid.org/repository/browse/?fdid=im.vector.alpha
+
+httpsplay.google.comstoreappsdetails?idim.vector.app_KEY: |
+ https://play.google.com/store/apps/details?id=im.vector.app
+
+httpsitunes.apple.comusappvector.imid1083446067_KEY: |
+ https://itunes.apple.com/us/app/vector.im/id1083446067
+
+httpsriot.imapp_KEY: |
+ https://riot.im/app/
+
+httpsgithub.comvectorimriotweb_KEY: |
+ https://github.com/vector-im/riot-web/
+
+Rocket.chat_KEY: |
+ Rocket.chat
+
+Rocket.chat_is_an_selfhostable_open_source_platform_for_team_communication._It_has_optional_federation_and_experimental_E2EE._KEY: |
+ Rocket.chat is an self-hostable open source platform for team communication. It has optional federation and experimental E2EE.
+
+Regarding_E2EE_their_documentation_states_This_feature_is_currently_in_alpha._Its_also_not_yet_supported_on_mobile._There_is_no_forward_secrecy_so_c_KEY: |
+ Regarding E2EE their documentation states 'This feature is currently in alpha. It's also not yet supported on mobile'. There is no forward secrecy so compromised decryption password would leak all messages. Federation was also added afterwards, potentially causing room for mistakes.
+
+a_hrefrocket.chatdocsuserguidesendtoendencryptionExperimental_E2EEa_KEY: |
+ Experimental E2EE
+
+httpsrocket.chat_KEY: |
+ https://rocket.chat/
+
+httpsrocket.chatinstall_KEY: |
+ https://rocket.chat/install
+
+httpsitunes.apple.comusapprocketchatid1086818840_KEY: |
+ https://itunes.apple.com/us/app/rocket-chat/id1086818840
+
+httpsfdroid.orgpackageschat.rocket.android_KEY: |
+ https://f-droid.org/packages/chat.rocket.android
+
+httpsplay.google.comstoreappsdetails?idchat.rocket.android_KEY: |
+ https://play.google.com/store/apps/details?id=chat.rocket.android
+
+httpsitunes.apple.comapprocketchatid1148741252_KEY: |
+ https://itunes.apple.com/app/rocket-chat/id1148741252
+
+httpsgithub.comrocketchat_KEY: |
+ https://github.com/rocketchat/
+
+Keybase_KEY: |
+ Keybase
+
+Keybase_provides_a_hosted_team_chat_with_endtoend_encryption._It_has_also_been_a_hrefhttpskeybase.iodocsassetsblogNCC_Group_Keybase_KB2018__KEY: |
+ Keybase provides a hosted team chat with end-to-end encryption. It has also been indepedently audited (PDF).
+
+The_server_side_of_Keybase_runs_on_proprietary_code_and_is_centralized._KEY: |
+ The server side of Keybase runs on proprietary code and is centralized.
+
+a_hrefgithub.comkeybaseclientissues6374Warninga_KEY: |
+ Warning
+
+httpskeybase.io_KEY: |
+ https://keybase.io/
+
+httpskeybase.iodocsthe_appinstall_windows_KEY: |
+ https://keybase.io/docs/the_app/install_windows
+
+httpskeybase.iodocsthe_appinstall_macos_KEY: |
+ https://keybase.io/docs/the_app/install_macos
+
+httpskeybase.iodocsthe_appinstall_linux_KEY: |
+ https://keybase.io/docs/the_app/install_linux
+
+httpswww.freshports.orgsecuritykeybase_KEY: |
+ https://www.freshports.org/security/keybase/
+
+httpsaddons.mozilla.orgenUSfirefoxaddonkeybaseforfirefox_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/keybase-for-firefox/
+
+httpschrome.google.comwebstoredetailkeybaseforredditognfafcpbkogffpmmdglhbjboeojlefj_KEY: |
+ https://chrome.google.com/webstore/detail/keybase-for-reddit/ognfafcpbkogffpmmdglhbjboeojlefj
+
+httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US_KEY: |
+ https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US
+
+httpskeybase.io_downloadkeybaseforios_KEY: |
+ https://keybase.io/_/download/keybase-for-ios
+
+httpsgithub.comKeybase_KEY: |
+ https://github.com/Keybase
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend
+
+Encrypted_Cloud_Storage_Services_KEY: |
+ Encrypted Cloud Storage Services
+
+If_you_are_currently_using_Dropbox_Google_Drive_Microsoft_OneDrive_or_Apple_iCloud_you_should_pick_an_alternative_here._KEY: |
+ If you are currently using Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should pick an alternative here.
+
+Nextcloud__Choose_your_hoster_KEY: |
+ Nextcloud - Choose your hoster
+
+Nextcloud_is_similar_in_functionality_to_the_widelyused_Dropbox_with_the_difference_being_that_Nextcloud_is_free_and_opensource_thereby_allowing_an_KEY: |
+ Nextcloud is similar in functionality to the widely-used Dropbox, with the difference being that Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server, with no limits on storage space or the number of connected clients.
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+httpscryptomator.org_KEY: |
+ https://cryptomator.org/
+
+Cryptomator_KEY: |
+ Cryptomator
+
+Free_clientside_AES_encryption_for_your_cloud_files._Open_source_software_No_backdoors_no_registration._KEY: |
+ Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
+
+Cryptomators_mobile_apps_are_not_opensource._KEY: |
+ Cryptomator's mobile apps are not open-source.
+
+httpscryptpad.fr_KEY: |
+ https://cryptpad.fr
+
+CryptPad_KEY: |
+ CryptPad
+
+Free_and_endtoend_encrypted_real_time_collaboration_sharing_folders_media_and_documents._KEY: |
+ Free and end-to-end encrypted real time collaboration sharing folders, media, and documents.
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid_KEY: |
+ https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid
+
+httpsgithub.comsyncthing?typesource_KEY: |
+ https://github.com/syncthing?type=source
+
+Bitwarden__CloudSelfhost_KEY: |
+ Bitwarden - Cloud/Self-host
+
+strongBitwardenstrong_is_a_free_and_opensource_password_manager._It_aims_to_solve_password_management_problems_for_individuals_teams_and_busine_KEY: |
+ Bitwarden is a free and open-source password manager. It aims to solve password management problems for individuals, teams, and business organizations. Bitwarden is among the easiest and safest solutions to store all of your logins and passwords while conveniently keeping them synced between all of your devices. If you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden server.
+
+httpsbitwarden.com_KEY: |
+ https://bitwarden.com/
+
+httpsbitwarden.comdownload_KEY: |
+ https://bitwarden.com/#download
+
+httpswww.npmjs.compackagebitwardencli_KEY: |
+ https://www.npmjs.com/package/@bitwarden/cli
+
+httpsaddons.mozilla.orgfirefoxaddonbitwardenpasswordmanager_KEY: |
+ https://addons.mozilla.org/firefox/addon/bitwarden-password-manager/
+
+httpschrome.google.comwebstoredetailbitwardenfreepasswordmnngceckbapebfimnlniiiahkandclblb_KEY: |
+ https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb
+
+httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6_KEY: |
+ https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6
+
+httpsaddons.opera.comextensionsdetailsbitwardenfreepasswordmanager_KEY: |
+ https://addons.opera.com/extensions/details/bitwarden-free-password-manager/
+
+httpswww.microsoft.comstoreapps9P6KXL0SVNNL_KEY: |
+ https://www.microsoft.com/store/apps/9P6KXL0SVNNL
+
+httpsmobileapp.bitwarden.comfdroid_KEY: |
+ https://mobileapp.bitwarden.com/fdroid/
+
+httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden_KEY: |
+ https://play.google.com/store/apps/details?id=com.x8bit.bitwarden
+
+httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8_KEY: |
+ https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8
+
+httpsvault.bitwarden.com_KEY: |
+ https://vault.bitwarden.com/#/
+
+httpsgithub.combitwarden_KEY: |
+ https://github.com/bitwarden
+
+KeePassXC__Local_KEY: |
+ KeePassXC - Local
+
+strongKeePassXCstrong_is_a_community_fork_of_KeePassX_a_native_crossplatform_port_of_KeePass_Password_Safe_with_the_goal_to_extend_and_improve__KEY: |
+ KeePassXC is a community fork of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal to extend and improve it with new features and bugfixes to provide a feature-rich, fully cross-platform and modern open-source password manager.
+
+httpskeepassxc.org_KEY: |
+ https://keepassxc.org/
+
+httpskeepassxc.orgdownloadwindows_KEY: |
+ https://keepassxc.org/download/#windows
+
+httpskeepassxc.orgdownloadmac_KEY: |
+ https://keepassxc.org/download/#mac
+
+httpskeepassxc.orgdownloadlinux_KEY: |
+ https://keepassxc.org/download/#linux
+
+httpswww.freshports.orgsecuritykeepassxc_KEY: |
+ https://www.freshports.org/security/keepassxc/
+
+httpopenports.sesecuritykeepassxc_KEY: |
+ http://openports.se/security/keepassxc
+
+httppkgsrc.sesecuritykeepassxc_KEY: |
+ http://pkgsrc.se/security/keepassxc
+
+httpsaddons.mozilla.orgenUSfirefoxaddonkeepassxcbrowser_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/keepassxc-browser
+
+httpschrome.google.comwebstoredetailkeepassxcbrowseroboonakemofpalcgghocfoadofidjkkk_KEY: |
+ https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk
+
+httpsfdroid.orgpackagescom.kunzisoft.keepass.libre_KEY: |
+ https://f-droid.org/packages/com.kunzisoft.keepass.libre/
+
+httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free_KEY: |
+ https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
+
+httpsgithub.comkeepassxrebootkeepassxc_KEY: |
+ https://github.com/keepassxreboot/keepassxc
+
+LessPass__Browser_KEY: |
+ LessPass - Browser
+
+strongLessPassstrong_is_a_free_and_opensource_password_manager_that_generates_unique_passwords_for_websites_email_accounts_or_anything_else_bas_KEY: |
+ LessPass is a free and open-source password manager that generates unique passwords for websites, email accounts, or anything else based on a master password and information you know. No sync needed. Uses PBKDF2 and SHA-256. It's advised to use the browser addons for more security.
+
+httpslesspass.com_KEY: |
+ https://lesspass.com/
+
+httpspypi.orgprojectlesspass_KEY: |
+ https://pypi.org/project/lesspass/
+
+httpsaddons.mozilla.orgenUSfirefoxaddonlesspass_KEY: |
+ https://addons.mozilla.org/en-US/firefox/addon/lesspass/
+
+httpschrome.google.comwebstoredetaillesspasslcmbpoclaodbgkbjafnkbbinogcbnjih_KEY: |
+ https://chrome.google.com/webstore/detail/lesspass/lcmbpoclaodbgkbjafnkbbinogcbnjih
+
+httpsfdroid.orgpackagescom.lesspass.android_KEY: |
+ https://f-droid.org/packages/com.lesspass.android
+
+httpsplay.google.comstoreappsdetails?idcom.lesspass.android_KEY: |
+ https://play.google.com/store/apps/details?id=com.lesspass.android
+
+httpsgithub.comlesspasslesspass_KEY: |
+ https://github.com/lesspass/lesspass
+
+httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter_KEY: |
+ https://play.google.com/store/apps/details?id=com.etesync.syncadapter
+
+httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain_KEY: |
+ https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain
+
+httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git_KEY: |
+ https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpsplay.google.comstoreappsdetails?idnet.i2p.android_KEY: |
+ https://play.google.com/store/apps/details?id=net.i2p.android
+
+Decentralized_Social_Networks_KEY: |
+ Decentralized Social Networks
+
+If_you_are_currently_using_Social_Networks_like_Facebook_or_Twitter_you_should_pick_an_alternative_here._KEY: |
+ If you are currently using Social Networks like Facebook or Twitter, you should pick an alternative here.
+
+Mastodon__Twitter_Alternative_KEY: |
+ Mastodon - Twitter Alternative
+
+Mastodon_is_a_social_network_based_on_open_web_protocols_and_free_opensource_software._It_is_decentralized_like_email._It_also_has_the_most_users_an_KEY: |
+ Mastodon is a social network based on open web protocols and free, open-source software. It is decentralized like email. It also has the most users, and the most diverse (in terms of interests) users; looks good; and is easy to setup. Feel welcome to join our hosted instance: social.privacytools.io
+
+httpsjoinmastodon.org_KEY: |
+ https://joinmastodon.org/
+
+httpsjoinmastodon.orgapps_KEY: |
+ https://joinmastodon.org/apps
+
+httpsjoinmastodon.orggettingstarted_KEY: |
+ https://joinmastodon.org/#getting-started
+
+httpsgithub.comtootsuitemastodon_KEY: |
+ https://github.com/tootsuite/mastodon
+
+diaspora__Google_Alternative_KEY: |
+ diaspora* - Google+ Alternative
+
+diaspora_is_based_on_three_key_philosophies_Decentralization_freedom_and_privacy._It_is_intended_to_address_privacy_concerns_related_to_centralized__KEY: |
+ diaspora* is based on three key philosophies: Decentralization, freedom and privacy. It is intended to address privacy concerns related to centralized social networks by allowing users set up their own server (or "pod") to host content; pods can then interact to share status updates, photographs, and other social data.
+
+httpsdiasporafoundation.org_KEY: |
+ https://diasporafoundation.org/
+
+httpswiki.diasporafoundation.orgTools_to_use_with_DiasporaAndroid_KEY: |
+ https://wiki.diasporafoundation.org/Tools_to_use_with_Diaspora#Android
+
+httpsgithub.comdiasporadiaspora_KEY: |
+ https://github.com/diaspora/diaspora
+
+Friendica__Facebook_Alternative_KEY: |
+ Friendica - Facebook Alternative
+
+Friendica_has_an_emphasis_on_extensive_privacy_settings_and_easy_server_installation._It_aims_to_federate_with_as_many_other_social_networks_as_possibl_KEY: |
+ Friendica has an emphasis on extensive privacy settings and easy server installation. It aims to federate with as many other social networks as possible. Currently, Friendica users can integrate contacts from Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io and other services in their social streams.
+
+httpsfriendi.ca_KEY: |
+ https://friendi.ca/
+
+httpsfriendi.caresourcesmobileclients_KEY: |
+ https://friendi.ca/resources/mobile-clients/
+
+httpsgithub.comfriendicafriendica_KEY: |
+ https://github.com/friendica/friendica
+
+PixelFed__Instagram_Alternative_KEY: |
+ PixelFed - Instagram Alternative
+
+PixelFed_is_a_free_and_ethical_photo_sharing_platform_powered_by_ActivityPub_federation._Pixelfed_is_an_opensource_federated_platform._You_can_run_y_KEY: |
+ PixelFed is a free and ethical photo sharing platform, powered by ActivityPub federation. Pixelfed is an open-source, federated platform. You can run your own instance or join one.
+
+httpspixelfed.org_KEY: |
+ https://pixelfed.org/
+
+httpsgithub.compixelfed_KEY: |
+ https://github.com/pixelfed
+
+GNU_social__Twitter_Alternative_KEY: |
+ GNU social - Twitter Alternative
+
+GNU_social_is_socialcommunication_software_for_both_public_and_private_communications._It_is_widely_supported_and_has_a_large_userbase._It_is_already__KEY: |
+ GNU social is social-communication software for both public and private communications. It is widely supported and has a large userbase. It is already used by the Free Software Foundation.
+
+httpsgnu.iosocial_KEY: |
+ https://gnu.io/social/
+
+httpsgit.gnu.iognugnusocial_KEY: |
+ https://git.gnu.io/gnu/gnu-social/
+
+httpswww.minds.com_KEY: |
+ https://www.minds.com/
+
+Minds_KEY: |
+ Minds
+
+An_a_hrefhttpsgitlab.commindsopensourcea_and_distributed_social_networking_service_integrating_the_blockchain_to_reward_the_community._KEY: |
+ An open-source and distributed social networking service, integrating the blockchain to reward the community.
+
+httpsmovim.eu_KEY: |
+ https://movim.eu/
+
+Movim_KEY: |
+ Movim
+
+A_federated_social_platform_that_relies_on_the_XMPP_standard_and_therefore_allows_you_to_exchange_with_many_other_clients_on_all_devices._KEY: |
+ A federated social platform that relies on the XMPP standard and therefore allows you to exchange with many other clients on all devices.
+
+httpsaddons.mozilla.orgfirefoxaddonmastodonsimplifiedfederation_KEY: |
+ https://addons.mozilla.org/firefox/addon/mastodon-simplified-federation/
+
+Mastodon_Simplified_Federation_KEY: |
+ Mastodon: Simplified Federation
+
+Firefox_Extension_to_improve_usability_for_remote_Mastodon_instances._KEY: |
+ Firefox Extension to improve usability for remote Mastodon instances.
+
+httpsjustdeleteme.xyz_KEY: |
+ https://justdeleteme.xyz/
+
+JustDeleteMe_KEY: |
+ JustDeleteMe
+
+A_directory_of_direct_links_to_delete_your_account_from_web_services._KEY: |
+ A directory of direct links to delete your account from web services.
+
+httpsforget.codl.fr_KEY: |
+ https://forget.codl.fr/
+
+Forget_KEY: |
+ Forget
+
+A_service_that_automatically_deletes_your_old_posts_on_Twitter_and_Mastodon_that_everyone_has_forgotten_about._KEY: |
+ A service that automatically deletes your old posts on Twitter and Mastodon that everyone has forgotten about.
+
+Facebook_Related_KEY: |
+ Facebook Related
+
+httpswww.facebook.comhelpdelete_account_KEY: |
+ https://www.facebook.com/help/delete_account
+
+Delete_your_Facebook_account_KEY: |
+ Delete your Facebook account
+
+Direct_link_to_delete_your_Facebook_account_without_being_able_to_reactivate_it_again._KEY: |
+ Direct link to delete your Facebook account without being able to reactivate it again.
+
+httpsdeletefacebook.com_KEY: |
+ https://deletefacebook.com/
+
+How_To_Permanently_Delete_A_Facebook_Account_KEY: |
+ How To Permanently Delete A Facebook Account
+
+This_guide_will_take_you_through_a_smooth_and_successful_Facebook_account_deletion._KEY: |
+ This guide will take you through a smooth and successful Facebook account deletion.
+
+httpsaddons.mozilla.orgfirefoxaddonfacebookcontainer_KEY: |
+ https://addons.mozilla.org/firefox/addon/facebook-container/
+
+Facebook_Container_by_Mozilla_KEY: |
+ Facebook Container by Mozilla
+
+Prevent_Facebook_from_tracking_you_around_the_web._KEY: |
+ Prevent Facebook from tracking you around the web.
+
+httpswww.stopusingfacebook.co_KEY: |
+ https://www.stopusingfacebook.co/
+
+Stop_using_Facebook_KEY: |
+ Stop using Facebook
+
+A_curated_list_of_reasons_to_stop_using_Facebook_and_how_to_do_it._KEY: |
+ A curated list of reasons to stop using Facebook and how to do it.
+
+If_you_are_currently_using_a_online_bulletin_board_like_Reddit_you_should_pick_an_alternative_here._KEY: |
+ If you are currently using a online bulletin board like Reddit, you should pick an alternative here.
+
+Aether_KEY: |
+ Aether
+
+a_hrefhttpsgithub.comnehbitaetherblobmasterLICENSE.mdAether_is_a_free_and_opensourcea_decentralized_social_news_aggregator_with_a_buil_KEY: |
+ Aether is a free and open-source decentralized social news aggregator with a built-in voting system.
+
+httpsgetaether.net_KEY: |
+ https://getaether.net/
+
+httpsgetaether.netdownload_KEY: |
+ https://getaether.net/download/
+
+httpsgithub.comnehbitaether_KEY: |
+ https://github.com/nehbit/aether
+
+Tildes_KEY: |
+ Tildes
+
+Tildes_is_a_webbased_selfhostable_online_bulletin_board._It_is_licensed_under_a_hrefhttpsgitlab.comtildestildesblobmasterLICENSEGPL_3.0_KEY: |
+ Tildes is a web-based self-hostable online bulletin board. It is licensed under GPL 3.0.
+
+httpstildes.net_KEY: |
+ https://tildes.net
+
+httpsgitlab.comtildestildes_KEY: |
+ https://gitlab.com/tildes/tildes
+
+Raddle_KEY: |
+ Raddle
+
+Raddle_is_a_public_Postmill_instance_focused_on_privacy_and_anticensorship._KEY: |
+ Raddle is a public Postmill instance focused on privacy and anti-censorship.
+
+httpsraddle.me_KEY: |
+ https://raddle.me
+
+httpsgitlab.compostmill_KEY: |
+ https://gitlab.com/postmill/
+
+httpsbeta.akasha.world_KEY: |
+ https://beta.akasha.world/
+
+Akasha_KEY: |
+ Akasha
+
+A_decentralized_online_bulletin_board_using_a_hrefhttpswww.wikipedia.orgwikiInterPlanetary_File_SystemIPFSa_and_a_hrefhttpswww.wikip_KEY: |
+ A decentralized online bulletin board using IPFS and Ethereum.
+
+httpsdev.lemmy.ml_KEY: |
+ https://dev.lemmy.ml/
+
+Lemmy_KEY: |
+ Lemmy
+
+An_a_hrefhttpsgithub.comdessalineslemmyblobmasterLICENSEAGPLalicensed_selfhostable_link_aggregator_intended_to_work_in_the_a_hrefh_KEY: |
+ An AGPL-licensed self-hostable link aggregator intended to work in the Fediverse.
+
+httpsnotabug.io_KEY: |
+ https://notabug.io/
+
+notabug.io_KEY: |
+ notabug.io
+
+A_a_hrefhttpsgithub.comnotabugionotabugblobmasterLICENSE.mdfree_and_opensourcea_P2P_link_aggregator_with_a_strong_resemblance_to_old.r_KEY: |
+ A free and open-source P2P link aggregator with a strong resemblance to old.reddit.com (not to be confused with NotABug.org).
+
+httpsbugzilla.mozilla.orgshow_bug.cgi?id1500289_KEY: |
+ https://bugzilla.mozilla.org/show_bug.cgi?id=1500289
+
+httpsbugzilla.mozilla.orgshow_bug.cgi?id1542754_KEY: |
+ https://bugzilla.mozilla.org/show_bug.cgi?id=1542754
+
+httpsplay.google.comstoreappsdetails?idcom.standardnotes_KEY: |
+ https://play.google.com/store/apps/details?id=com.standardnotes
+
+httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl_KEY: |
+ https://play.google.com/store/apps/details?id=com.lyonbros.turtl
+
+Pastebin_Services_KEY: |
+ Pastebin Services
+
+PrivateBin_KEY: |
+ PrivateBin
+
+PrivateBin_is_a_minimalist_opensource_online_pastebin_where_the_server_has_zero_knowledge_of_pasted_data._Data_is_encrypteddecrypted_in_the_browser__KEY: |
+ PrivateBin is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin.
+
+httpsprivatebin.info_KEY: |
+ https://privatebin.info/
+
+httpsgithub.comPrivateBinPrivateBin_KEY: |
+ https://github.com/PrivateBin/PrivateBin
+
+CryptPad_is_an_opensource_zero_knowledge_and_realtime_collaborative_editor._Data_is_encrypteddecrypted_in_the_browser_using_Salsa20_with_Poly1305_KEY: |
+ CryptPad is an open-source, zero knowledge, and real-time collaborative editor. Data is encrypted/decrypted in the browser, using Salsa20 with Poly1305 to encrypt pads.
+
+httpscryptpad.frpad_KEY: |
+ https://cryptpad.fr/pad/
+
+httpsgithub.comxwikilabscryptpad_KEY: |
+ https://github.com/xwiki-labs/cryptpad
+
+strongCryptPadstrong_is_a_privatebydesign_alternative_to_popular_office_tools_and_cloud_services._All_content_is_endtoend_encrypted._It_is_fre_KEY: |
+ CryptPad is a private-by-design alternative to popular office tools and cloud services. All content is end-to-end encrypted. It is free and open-source, enabling anyone to verify its security by auditing the code. The development team is supported by donations and grants. No registration is required, and it can be used anonymously via Tor Browser.
+
+Etherpad_KEY: |
+ Etherpad
+
+strongEtherpadstrong_is_a_highly_customizable_opensource_online_editor_providing_collaborative_editing_in_real_time._a_hrefhttpsgithub.come_KEY: |
+ Etherpad is a highly customizable open-source online editor providing collaborative editing in real time. Here are a list of sites that run Etherpad.
+
+httpsetherpad.org_KEY: |
+ https://etherpad.org/
+
+httpsgithub.cometheretherpadlitewindows_KEY: |
+ https://github.com/ether/etherpad-lite#windows
+
+httpsgithub.cometheretherpadlitegnulinuxandotherunixlikesystems_KEY: |
+ https://github.com/ether/etherpad-lite#gnulinux-and-other-unix-like-systems
+
+httpsgithub.cometheretherpadliteinstallation_KEY: |
+ https://github.com/ether/etherpad-lite#installation
+
+httpsgithub.cometheretherpadlitewikiSitesthatrunEtherpad_KEY: |
+ https://github.com/ether/etherpad-lite/wiki/Sites-that-run-Etherpad
+
+httpsgithub.cometheretherpadlite_KEY: |
+ https://github.com/ether/etherpad-lite
+
+Write.as_KEY: |
+ Write.as
+
+strongWrite.asstrong_is_a_crossplatform_privacyoriented_blogging_platform._Its_anonymous_by_default_letting_you_publish_without_signing_up._I_KEY: |
+ Write.as is a cross-platform, privacy-oriented blogging platform. It's anonymous by default, letting you publish without signing up. If you create an account, it doesn't require any personal information. No ads, distraction-free, and built on a sustainable business model.
+
+httpswrite.as_KEY: |
+ https://write.as/
+
+httpsgithub.comwriteaswriteascli_KEY: |
+ https://github.com/writeas/writeas-cli
+
+httpswrite.asapps_KEY: |
+ https://write.as/apps
+
+httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas_KEY: |
+ https://play.google.com/store/apps/details?id=com.abunchtell.writeas
+
+httpsitunes.apple.comappapplestoreid1000755153_KEY: |
+ https://itunes.apple.com/app/apple-store/id1000755153
+
+httpswrite.aspad_KEY: |
+ https://write.as/pad
+
+httpscode.aswriteas_KEY: |
+ https://code.as/writeas
+
+MAT2_KEY: |
+ MAT2
+
+strongMAT2strong_is_free_software_which_allows_the_removal_of_metadata_of_image_audio_torrent_and_document_file_types._It_provides_both_a_comm_KEY: |
+ MAT2 is free software, which allows the removal of metadata of image, audio, torrent, and document file types. It provides both a command line tool and a graphical user interface via an extension for Nautilus, the default file manager of GNOME.
+
+https0xacab.orgjvoisinmat2_KEY: |
+ https://0xacab.org/jvoisin/mat2
+
+httpspypi.orgprojectmat2_KEY: |
+ https://pypi.org/project/mat2/
+
+Qubes_OS_KEY: |
+ Qubes OS
+
+Xen_KEY: |
+ Xen
+
+Qubes_is_an_opensource_operating_system_designed_to_provide_strong_security_for_desktop_computing._Qubes_is_based_on_Xen_the_X_Window_System_and_Lin_KEY: |
+ Qubes is an open-source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, the X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers.
+
+This_software_may_depend_on_or_recommend_nonfree_software._KEY: |
+ This software may depend on or recommend non-free software.
+
+contrib_KEY: |
+ contrib
+
+httpswww.qubesos.org_KEY: |
+ https://www.qubes-os.org/
+
+httpsgithub.comQubesOS_KEY: |
+ https://github.com/QubesOS
+
+Fedora_Workstation_KEY: |
+ Fedora Workstation
+
+GNULinux_KEY: |
+ GNU/Linux
+
+Fedora_is_a_Linux_distribution_developed_by_the_Fedora_Project_and_sponsored_by_Red_Hat._Fedora_Workstation_is_a_secure_reliable_and_userfriendly_ed_KEY: |
+ Fedora is a Linux distribution developed by the Fedora Project and sponsored by Red Hat. Fedora Workstation is a secure, reliable, and user-friendly edition developed for desktops and laptops, using GNOME as the default desktop environment.
+
+httpsgetfedora.org_KEY: |
+ https://getfedora.org/
+
+httpssrc.fedoraproject.org_KEY: |
+ https://src.fedoraproject.org/
+
+Debian_KEY: |
+ Debian
+
+Debian_is_a_Unixlike_computer_operating_system_and_a_Linux_distribution_that_is_composed_entirely_of_free_and_opensource_software_most_of_which_is_u_KEY: |
+ Debian is a Unix-like computer operating system and a Linux distribution that is composed entirely of free and open-source software, most of which is under the GNU General Public License, and packaged by a group of individuals known as the Debian project.
+
+httpswww.debian.org_KEY: |
+ https://www.debian.org/
+
+httpssalsa.debian.orgqadebsources_KEY: |
+ https://salsa.debian.org/qa/debsources
+
+Tails_KEY: |
+ Tails
+
+Tails_is_a_live_operating_system_that_starts_on_almost_any_computer_from_a_DVD_USB_stick_or_SD_card._It_aims_at_preserving_privacy_and_anonymity_and_KEY: |
+ Tails is a live operating system that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and circumventing censorship by forcing Internet connections through the Tor network; leaving no trace on the computer; and using state-of-the-art cryptographic tools to encrypt files, emails, and instant messages.
+
+httpstails.boum.org_KEY: |
+ https://tails.boum.org/
+
+httpsgittails.immerda.chtails_KEY: |
+ https://git-tails.immerda.ch/tails/
+
+KNOPPIX_KEY: |
+ KNOPPIX
+
+Knoppix_is_an_operating_system_based_on_Debian_designed_to_be_run_directly_from_a_CD__DVD_Live_CD_or_a_USB_flash_drive_Live_USB_one_of_the_first__KEY: |
+ Knoppix is an operating system based on Debian designed to be run directly from a CD / DVD (Live CD) or a USB flash drive (Live USB), one of the first of its kind for any operating system. When starting a program, it is loaded from the removable medium and decompressed into a RAM drive. The decompression is transparent and on-the-fly.
+
+httpswww.knopper.netknoppixindexen.html_KEY: |
+ https://www.knopper.net/knoppix/index-en.html
+
+httpswww.knopper.netknoppixinfoindexen.htmllicense_KEY: |
+ https://www.knopper.net/knoppix-info/index-en.html#license
+
+Puppy_Linux_KEY: |
+ Puppy Linux
+
+Puppy_Linux_operating_system_is_a_lightweight_Linux_distribution_that_focuses_on_ease_of_use_and_minimal_memory_footprint._The_entire_system_can_be_run_KEY: |
+ Puppy Linux operating system is a lightweight Linux distribution that focuses on ease of use and minimal memory footprint. The entire system can be run from RAM with current versions generally taking up about 210 MB, allowing the boot medium to be removed after the operating system has started.
+
+httppuppylinux.org_KEY: |
+ http://puppylinux.org/
+
+httpdistro.ibiblio.orgpuppylinux_KEY: |
+ http://distro.ibiblio.org/puppylinux/
+
+GrapheneOS_KEY: |
+ GrapheneOS
+
+AOSP_KEY: |
+ AOSP
+
+GrapheneOS_formerly_known_as_CopperheadOS_is_a_free_and_opensource_security_and_privacyfocused_mobile_operating_system_built_on_top_of_the_Android_KEY: |
+ GrapheneOS (formerly known as CopperheadOS) is a free and open-source security- and privacy-focused mobile operating system built on top of the Android Open Source Project. It currently specifically targets devices offering strong hardware security.
+
+httpsgrapheneos.org_KEY: |
+ https://grapheneos.org/
+
+httpsgithub.comGrapheneOS_KEY: |
+ https://github.com/GrapheneOS/
+
+LineageOS_KEY: |
+ LineageOS
+
+LineageOS_is_a_free_and_opensource_operating_system_for_smartphones_and_tablets_based_on_the_official_releases_of_the_Android_Open_Source_Project._It_KEY: |
+ LineageOS is a free and open-source operating system for smartphones and tablets, based on the official releases of the Android Open Source Project. It is the continuation of the CyanogenMod project.
+
+httpswww.lineageos.org_KEY: |
+ https://www.lineageos.org/
+
+httpsgithub.comLineageOS_KEY: |
+ https://github.com/LineageOS
+
+Ubuntu_Touch_KEY: |
+ Ubuntu Touch
+
+Ubuntu_Touch_is_a_free_and_opensource_operating_system_for_smartphones_and_tablets._Its_an_alternative_to_the_current_popular_mobile_operating_system_KEY: |
+ Ubuntu Touch is a free and open-source operating system for smartphones and tablets. It's an alternative to the current popular mobile operating systems on the market. Only a few devices are supported.
+
+httpsubuntutouch.io_KEY: |
+ https://ubuntu-touch.io/
+
+httpsgithub.comubports_KEY: |
+ https://github.com/ubports
+
+OpenWrt_KEY: |
+ OpenWrt
+
+Linux_KEY: |
+ Linux
+
+OpenWrt_is_an_operating_system_in_particular_an_embedded_operating_system_based_on_the_Linux_kernel_primarily_used_on_embedded_devices_to_route_net_KEY: |
+ OpenWrt is an operating system (in particular, an embedded operating system) based on the Linux kernel, primarily used on embedded devices to route network traffic. The main components are the Linux kernel, util-linux, uClibc and BusyBox. All components have been optimized for size, to be small enough for fitting into the limited storage and memory available in home routers.
+
+httpsopenwrt.org_KEY: |
+ https://openwrt.org/
+
+httpsgit.openwrt.org_KEY: |
+ https://git.openwrt.org/
+
+pfSense_KEY: |
+ pfSense
+
+BSD_KEY: |
+ BSD
+
+pfSense_is_an_open_source_firewallrouter_computer_software_distribution_based_on_FreeBSD._It_is_installed_on_a_computer_to_make_a_dedicated_firewallr_KEY: |
+ pfSense is an open source firewall/router computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for a network and is noted for its reliability and offering features often only found in expensive commercial firewalls. pfSense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and as a VPN endpoint.
+
+httpswww.pfsense.org_KEY: |
+ https://www.pfsense.org/
+
+httpsgithub.compfsense_KEY: |
+ https://github.com/pfsense/
+
+LibreCMC_KEY: |
+ LibreCMC
+
+LibreCMC_is_a_GNULinuxlibre_distribution_for_computers_with_minimal_resources_such_as_the_Ben_Nanonote_ath9kbased_WiFi_routers_and_other_hardwar_KEY: |
+ LibreCMC is a GNU/Linux-libre distribution for computers with minimal resources, such as the Ben Nanonote, ath9k-based Wi-Fi routers, and other hardware with emphasis on free software. The project's current goal is to aim for compliance with the GNU Free System Distribution Guidelines (GNU FSDG) and ensure that the project continues to meet these requirements set forth by the Free Software Foundation (FSF).
+
+httpslibrecmc.org_KEY: |
+ https://librecmc.org
+
+httpsgogs.librecmc.orglibreCMClibreCMC_KEY: |
+ https://gogs.librecmc.org/libreCMC/libreCMC
+
+What_does_the_US_government_know_about_you?_KEY: |
+ What does the US government know about you?
+
+httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6_KEY: |
+ https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6
+
+httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden_KEY: |
+ https://play.google.com/store/apps/details?id=com.x8bit.bitwarden
+
+httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8_KEY: |
+ https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8
+
+httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free_KEY: |
+ https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
+
+httpsplay.google.comstoreappsdetails?idcom.lesspass.android_KEY: |
+ https://play.google.com/store/apps/details?id=com.lesspass.android
+
+httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas_KEY: |
+ https://play.google.com/store/apps/details?id=com.abunchtell.writeas
+
+Click_on_whatever_service_you_need_to_view_our_recommendations._KEY: |
+ Click on whatever service you need to view our recommendations.
+
+Who_is_required_to_hand_over_the_encryption_keys_to_authorities?_KEY: |
+ Who is required to hand over the encryption keys to authorities?
+
+Why_is_it_not_recommended_to_choose_a_USbased_service?_KEY: |
+ Why is it not recommended to choose a US-based service?
+
+What_is_a_warrant_canary?_KEY: |
+ What is a warrant canary?
+
+httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms_KEY: |
+ https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
+
+httpsplay.google.comstoreappsdetails?idcom.wire_KEY: |
+ https://play.google.com/store/apps/details?id=com.wire
+
+httpsitunes.apple.comappwireid930944768?mt8_KEY: |
+ https://itunes.apple.com/app/wire/id930944768?mt=8
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpsplay.google.comstoreappsdetails?idorg.linphone_KEY: |
+ https://play.google.com/store/apps/details?id=org.linphone
+
+httpsitunes.apple.comusapplinphoneid360065638?mt8_KEY: |
+ https://itunes.apple.com/us/app/linphone/id360065638?mt=8
+
+httpsapps.apple.comusappmumbleid443472808?ls1_KEY: |
+ https://apps.apple.com/us/app/mumble/id443472808?ls=1
+
+httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha_KEY: |
+ https://f-droid.org/repository/browse/?fdid=im.vector.alpha
+
+httpsplay.google.comstoreappsdetails?idim.vector.app_KEY: |
+ https://play.google.com/store/apps/details?id=im.vector.app
+
+httpsplay.google.comstoreappsdetails?idchat.rocket.android_KEY: |
+ https://play.google.com/store/apps/details?id=chat.rocket.android
+
+httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US_KEY: |
+ https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US
+
+We_currently_have_the_following_freetouse_services_online_now._KEY: |
+ We currently have the following free-to-use services online now.
+
+Searx__Privacy_Friendly_Search_at_search.privacytools.io_KEY: |
+ Searx - Privacy Friendly Search at search.privacytools.io
+
+Mastodon__Tracker_Free_Social_Networking_at_social.privacytools.io_KEY: |
+ Mastodon - Tracker Free Social Networking at social.privacytools.io
+
+Matrix__Federated_private_chat_at_chat.privacytools.io_KEY: |
+ Matrix - Federated private chat at chat.privacytools.io
+
+Discourse__Forum_at_forum.privacytools.io_KEY: |
+ Discourse - Forum at forum.privacytools.io
+
+Gitea__GitRepository_Manager_at_git.privacytools.io_KEY: |
+ Gitea - Git-Repository Manager at git.privacytools.io
+
+Write_Freely__Federated_minimalist_blog_at_write.privacytools.io_KEY: |
+ Write Freely - Federated minimalist blog at write.privacytools.io
+
+PrivateBin__Encrypted_Pastebin_at_bin.privacytools.io_KEY: |
+ PrivateBin - Encrypted Pastebin at bin.privacytools.io
+
+More_services_are_on_the_way._If_theres_something_that_would_be_super_beneficial_for_us_to_run_dont_hesitate_to_reach_out_and_ask._And_of_course_if_KEY: |
+ More services are on the way. If there's something that would be super beneficial for us to run, don't hesitate to reach out and ask. And of course, if you like our services, please consider donating to support our server costs, any donation helps!
+
+Sponsors_of__site.name__KEY: |
+ Sponsors of {{ site.name }}
+
+The__site.name__website_and_services_are_a_community_project._There_is_no_advertising_affiliate_links_or_other_forms_of_monetization.brstrong_KEY: |
+ The {{ site.name }} website and services are a community project. There is no advertising, affiliate links, or other forms of monetization.
Your donations here directly support hosting this website and compensating contributors to this project.
+
+Become_a_Sponsor_KEY: |
+ Become a Sponsor
+
+Donate_Directly_KEY: |
+ Donate Directly
+
+Why_sponsor__site.name_?_KEY: |
+ Why sponsor {{ site.name }}?
+
+This_sponsorship_program_is_designed_to_allow_companies_organizations_and_individuals_partner_with_the__site.name__team_to_support_our_vision_of__KEY: |
+ This sponsorship program is designed to allow companies, organizations, and individuals partner with the {{ site.name }} team to support our vision of a more privacy-respecting internet and the greater online community.
+
+With_this_exposure_and_sponsorship_your_customers_will_recognize_your_intrinsic_understanding_and_commitment_to_user_privacy._Moreover_youll_directl_KEY: |
+ With this exposure and sponsorship, your customers will recognize your intrinsic understanding and commitment to user privacy. Moreover, you'll directly contribute to our mission of spreading privacy-respecting tools and knowledge worldwide!
+
+As_a_sponsor_of__site.name__your_company_will_be_widely_recognized_in_a_variety_of_ways_some_of_which_weve_detailed_below._KEY: |
+ As a sponsor of {{ site.name }}, your company will be widely recognized in a variety of ways, some of which we've detailed below.
+
+General_Information_KEY: |
+ General Information
+
+This_website_receives_well_over_250000_pageviews_on_a_monthly_basis_and_is_highly_ranked_for_privacyrelated_keywords._In_addition_to_the_benefits_bel_KEY: |
+ This website receives well over 250,000 pageviews on a monthly basis and is highly ranked for privacy-related keywords. In addition to the benefits below your contribution will be featured on our OpenCollective page and we will thank you via social media for your contribution.
+
+Bronze_Sponsorship_KEY: |
+ Bronze Sponsorship
+
+Info_KEY: |
+ Info
+
+Your_name_and_link_along_with_a_small_logo_or_avatar_on_the_sponsors_page_of_this_website._KEY: |
+ Your name and link along with a small logo or avatar on the sponsors page of this website.
+
+Silver_Sponsorship_KEY: |
+ Silver Sponsorship
+
+Your_mediumsized_logo_as_a_link_at_the_top_of_our_sponsors_page._KEY: |
+ Your medium-sized logo as a link at the top of our sponsors page.
+
+Gold_Sponsorship_KEY: |
+ Gold Sponsorship
+
+Your_mediumsized_logo_as_a_link_on_the__site.name__homepage_and_at_the_very_top_of_our_sponsors_page._KEY: |
+ Your medium-sized logo as a link on the {{ site.name }} homepage and at the very top of our sponsors page.
+
+We_will_not_provide..._KEY: |
+ We will not provide...
+
+We_pride_ourselves_on_our_integrity_and_commitment_to_spreading_unbiased_and_factbased_information_regarding_privacy_and_privacyrespecting_tools._All_KEY: |
+ We pride ourselves on our integrity and commitment to spreading unbiased and fact-based information regarding privacy and privacy-respecting tools. All tools we recommend throughout our website are subject to strict criteria as judged by our team and the community across our various platforms. Your sponsorship will not grant your organization any special consideration when choosing our recommendations throughout the website, a process which we make clear via our transparent ledger on OpenCollective and our public discussions on GitHub. Your sponsorship benefits are limited to those outlined above.
+
+Tax_and_Financial_Information_KEY: |
+ Tax and Financial Information
+
+Your_contribution_to__site.name__will_be_handled_by_the_Open_Collective_Foundation_501c3._For_US_companies_and_taxpayers_this_means_your_contr_KEY: |
+ Your contribution to {{ site.name }} will be handled by the Open Collective Foundation 501(c)(3). For US companies and taxpayers, this means your contribution is tax deductible. As a non-profit, your sponsorship contribution will not be used for private profit and will only be used to cover expenses incurred by the project. All of our transactions (donations and expenses) are published transparently on OpenCollective. For the benefit of our readership, anonymous contributions will not be eligible for the sponsorship opportunities outlined above.
+
+More_Information_KEY: |
+ More Information
+
+If_you_are_interested_and_have_further_questions_you_are_welcome_to_reach_out_to_us_directly_at_a_hrefmailtosponsorsprivacytools.iosponsorspri_KEY: |
+ If you are interested and have further questions, you are welcome to reach out to us directly at sponsors@privacytools.io.
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+Warning_KEY: |
+ Warning
+
+Using_a_VPN_will_strongnotstrong_keep_your_browsing_habits_anonymous_nor_will_it_add_additional_security_to_nonsecure_HTTP_traffic._KEY: |
+ Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
+
+If_you_are_looking_for_stronganonymitystrong_you_should_use_the_Tor_Browser_stronginsteadstrong_of_a_VPN._KEY: |
+ If you are looking for anonymity, you should use the Tor Browser instead of a VPN.
+
+If_youre_looking_for_added_strongsecuritystrong_you_should_always_ensure_youre_connecting_to_websites_using_a_href_providersdnsicanndn_KEY: |
+ If you're looking for added security, you should always ensure you're connecting to websites using encrypted DNS and HTTPS. A VPN is not a replacement for good security practices.
+
+If_youre_looking_for_additional_strongprivacystrong_from_your_ISP_on_a_public_WiFi_network_or_while_torrenting_files_a_VPN_may_be_the_solutio_KEY: |
+ If you're looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved.
+
+Download_Tor_KEY: |
+ Download Tor
+
+Tor_Myths_KEY: |
+ Tor Myths
+
+FAQ_KEY: |
+ FAQ
+
+More_Info_KEY: |
+ More Info
+
+Our_VPN_Provider_Criteria_KEY: |
+ Our VPN Provider Criteria
+
+Please_note_we_are_not_affiliated_with_any_of_the_providers_we_recommend._This_allows_us_to_provide_completely_objective_recommendations._KEY: |
+ Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations.
+
+We_have_developed_a_clear_set_of_requirements_for_any_VPN_provider_wishing_to_be_recommended_including_strong_encryption_independent_security_audits_KEY: |
+ We have developed a clear set of requirements for any VPN provider wishing to be recommended, including strong encryption, independent security audits, modern technology, and more. We suggest you familiarize yourself with this list before choosing a VPN provider, and conduct your own research to ensure the VPN provider you choose is as trustworthy as possible.
+
+Operating_outside_the_fiveninefourteeneyes_countries_is_not_a_guarantee_of_privacy_necessarily_and_there_are_other_factors_to_consider._However_we_KEY: |
+ Operating outside the five/nine/fourteen-eyes countries is not a guarantee of privacy necessarily, and there are other factors to consider. However, we believe that avoiding these countries is important if you wish to avoid mass government dragnet surveillance, especially from the United States. Read our page on global mass surveillance and avoiding the US and UK to learn more about why we feel this is important.
+
+Minimum_to_Qualify_KEY: |
+ Minimum to Qualify:
+
+Operating_outside_the_USA_or_other_Five_Eyes_countries._KEY: |
+ Operating outside the USA or other Five Eyes countries.
+
+Best_Case_KEY: |
+ Best Case:
+
+Operating_outside_the_USA_or_other_Fourteen_Eyes_countries._KEY: |
+ Operating outside the USA or other Fourteen Eyes countries.
+
+Operating_inside_a_country_with_strong_consumer_protection_laws._KEY: |
+ Operating inside a country with strong consumer protection laws.
+
+Technology_KEY: |
+ Technology
+
+We_require_all_our_recommended_VPN_providers_to_provide_OpenVPN_configuration_files_to_be_used_in_any_client._strongIfstrong_a_VPN_provides_their__KEY: |
+ We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. If a VPN provides their own custom client, we require a killswitch to block network data leaks when disconnected.
+
+OpenVPN_support._KEY: |
+ OpenVPN support.
+
+Killswitch_built_in_to_clients._KEY: |
+ Killswitch built in to clients.
+
+OpenVPN_and_WireGuard_support._KEY: |
+ OpenVPN and WireGuard support.
+
+Killswitch_with_highly_configurable_options_enabledisable_on_certain_networks_on_boot_etc._KEY: |
+ Killswitch with highly configurable options (enable/disable on certain networks, on boot, etc.)
+
+Easytouse_mobile_clients_especially_opensource._KEY: |
+ Easy-to-use mobile clients, especially open-source.
+
+Privacy_KEY: |
+ Privacy
+
+We_prefer_our_recommended_providers_to_collect_as_little_data_as_possible._Not_collecting_personal_information_on_registration_and_accepting_anonymous_KEY: |
+ We prefer our recommended providers to collect as little data as possible. Not collecting personal information on registration, and accepting anonymous forms of payment are required.
+
+Bitcoin_or_cash_payment_option._KEY: |
+ Bitcoin or cash payment option.
+
+No_personal_information_required_to_register_Only_username_password_and_email_at_most._KEY: |
+ No personal information required to register: Only username, password, and email at most.
+
+Accepts_Bitcoin_cash_and_other_forms_of_cryptocurrency_andor_anonymous_payment_options_gift_cards_etc._KEY: |
+ Accepts Bitcoin, cash, and other forms of cryptocurrency and/or anonymous payment options (gift cards, etc.)
+
+No_personal_information_accepted_autogenerated_username_no_email_required_etc._KEY: |
+ No personal information accepted (autogenerated username, no email required, etc.)
+
+Security_KEY: |
+ Security
+
+A_VPN_is_pointless_if_it_cant_even_provide_adequate_security._We_require_all_our_recommended_providers_to_abide_by_current_security_standards_for_thei_KEY: |
+ A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards for their OpenVPN connections. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security, ideally in a very comprehensive manner and on a repeated (yearly) basis.
+
+Strong_Encryption_Schemes_OpenVPN_with_SHA256_authentication_RSA2048_or_better_handshake_AES256GCM_or_AES256CBC_data_encryption._KEY: |
+ Strong Encryption Schemes: OpenVPN with SHA-256 authentication; RSA-2048 or better handshake; AES-256-GCM or AES-256-CBC data encryption.
+
+Perfect_Forward_Secrecy_PFS._KEY: |
+ Perfect Forward Secrecy (PFS).
+
+Published_security_audits_from_a_reputable_thirdparty_firm._KEY: |
+ Published security audits from a reputable third-party firm.
+
+Strongest_Encryption_RSA4096._KEY: |
+ Strongest Encryption: RSA-4096.
+
+Comprehensive_published_security_audits_from_a_reputable_thirdparty_firm._KEY: |
+ Comprehensive published security audits from a reputable third-party firm.
+
+Bugbounty_programs_andor_a_coordinated_vulnerabilitydisclosure_process._KEY: |
+ Bug-bounty programs and/or a coordinated vulnerability-disclosure process.
+
+Trust_KEY: |
+ Trust
+
+You_wouldnt_trust_your_finances_to_someone_with_a_fake_identity_so_why_trust_them_with_your_internet_data?_We_require_our_recommended_providers_to_be_KEY: |
+ You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.
+
+Publicfacing_leadership_or_ownership._KEY: |
+ Public-facing leadership or ownership.
+
+Publicfacing_leadership._KEY: |
+ Public-facing leadership.
+
+Frequent_transparency_reports._KEY: |
+ Frequent transparency reports.
+
+Additional_Functionality_KEY: |
+ Additional Functionality
+
+While_not_strictly_requirements_there_are_some_factors_we_looked_into_when_determining_which_providers_to_recommend._These_include_adblockingtracker_KEY: |
+ While not strictly requirements, there are some factors we looked into when determining which providers to recommend. These include adblocking/tracker-blocking functionality, warrant canaries, multihop connections, excellent customer support, the number of allowed simultaneous connections, etc.
+
+Further_Information_and_Dangers_KEY: |
+ Further Information and Dangers
+
+Should_I_use_a_VPN?_KEY: |
+ Should I use a VPN?
+
+The_answer_to_this_question_is_not_a_particularly_helpful_one_strongIt_depends.strong_It_depends_on_what_youre_expecting_a_VPN_to_do_for_you_wh_KEY: |
+ The answer to this question is not a particularly helpful one: It depends. It depends on what you're expecting a VPN to do for you, who you're trying to hide your traffic from, and what applications you're using.
+
+strongIn_most_cases_VPNs_do_little_to_protect_your_privacy_or_enhance_your_securitystrong_unless_paired_with_other_changes._KEY: |
+ In most cases, VPNs do little to protect your privacy or enhance your security, unless paired with other changes.
+
+VPNs_cannot_encrypt_data_outside_of_the_connection_between_your_device_and_the_VPN_server._VPN_providers_can_see_and_modify_your_traffic_the_same_way_y_KEY: |
+ VPNs cannot encrypt data outside of the connection between your device and the VPN server. VPN providers can see and modify your traffic the same way your ISP could. And there is no way to verify a VPN provider's "no logging" policies in any way.
+
+What_if_I_need_encryption?_KEY: |
+ What if I need encryption?
+
+In_most_cases_most_of_your_traffic_is_already_encrypted!_Over_98_of_the_top_3000_websites_offer_strongHTTPSstrong_meaning_your_nonDNS_traffic__KEY: |
+ In most cases, most of your traffic is already encrypted! Over 98% of the top 3000 websites offer HTTPS, meaning your non-DNS traffic is safe regardless of using a VPN. It is incredibly rare for applications that handle personal data to not support HTTPS in 2019, especially with services like Let's Encrypt offering free HTTPS certificates to any website operator.
+
+Even_if_a_site_you_visit_doesnt_support_HTTPS_a_VPN_will_not_protect_you_because_a_VPN_cannot_magically_encrypt_the_traffic_between_the_VPNs_server_KEY: |
+ Even if a site you visit doesn't support HTTPS, a VPN will not protect you, because a VPN cannot magically encrypt the traffic between the VPN's servers and the website's servers. Installing an extension like HTTPS Everywhere and making sure every site you visit uses HTTPS is far more helpful than using a VPN.
+
+Should_I_use_encrypted_DNS_with_a_VPN?_KEY: |
+ Should I use encrypted DNS with a VPN?
+
+The_answer_to_this_question_is_also_not_very_helpful_strongit_dependsstrong._Your_VPN_provider_may_have_their_own_DNS_servers_but_if_they_dont_KEY: |
+ The answer to this question is also not very helpful: it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.
+
+However_strongyou_shouldnt_use_encrypted_DNS_with_Torstrong._This_would_direct_all_of_your_DNS_requests_through_a_single_circuit_and_would_allow_KEY: |
+ However you shouldn't use encrypted DNS with Tor. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.
+
+What_if_I_need_anonymity?_KEY: |
+ What if I need anonymity?
+
+VPNs_cannot_provide_strong_anonymity._Your_VPN_provider_will_still_see_your_real_IP_address_and_often_has_a_money_trail_that_can_be_linked_directly_ba_KEY: |
+ VPNs cannot provide strong anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data.
+
+Shouldnt_I_hide_my_IP_address?_KEY: |
+ Shouldn't I hide my IP address?
+
+The_idea_that_your_IP_address_is_sensitive_information_or_that_your_location_is_given_away_with_all_your_internet_traffic_is_strongfearmongeringst_KEY: |
+ The idea that your IP address is sensitive information, or that your location is given away with all your internet traffic is fearmongering on the part of VPN providers and their marketing. Your IP address is an insignificant amount of personal data tracking companies use to identify you, because many users' IP addresses change very frequently (Dynamic IP addresses, switching networks, switching devices, etc.). Your IP address also does not give away more than the very generalized location of your Internet Service Provider. It does not give away your home address, for example, despite common perception.
+
+Should_I_use_Tor_emandem_a_VPN?_KEY: |
+ Should I use Tor and a VPN?
+
+By_using_a_VPN_with_Tor_youre_creating_essentially_a_permanent_entry_node_often_with_a_money_trail_attached._This_provides_0_additional_benefit_to_y_KEY: |
+ By using a VPN with Tor, you're creating essentially a permanent entry node, often with a money trail attached. This provides 0 additional benefit to you, while increasing the attack surface of your connection dramatically. If you wish to hide your Tor usage from your ISP or your government, Tor has a built-in solution for that: Tor bridges. Read more about Tor bridges and why using a VPN is not necessary.
+
+Are_VPNs_ever_useful?_KEY: |
+ Are VPNs ever useful?
+
+A_VPN_may_still_be_useful_to_you_in_a_variety_of_scenarios_such_as_KEY: |
+ A VPN may still be useful to you in a variety of scenarios, such as:
+
+Hiding_your_traffic_from_strongonlystrong_your_Internet_Service_Provider._KEY: |
+ Hiding your traffic from only your Internet Service Provider.
+
+Hiding_your_downloads_such_as_torrents_from_your_ISP_and_antipiracy_organizations._KEY: |
+ Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations.
+
+For_use_cases_like_these_or_if_you_have_another_compelling_reason_the_VPN_providers_we_listed_above_are_who_we_think_are_the_most_trustworthy._Howeve_KEY: |
+ For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're trusting the provider. In pretty much any other scenario you should be using a secure-by-design tool such as Tor.
+
+Sources_and_Further_Reading_KEY: |
+ Sources and Further Reading
+
+a_href_httpsschub.ioblog20190408veryprecariousnarrative.html_VPN__a_Very_Precarious_Narrativea_by_Dennis_Schubert_KEY: |
+ VPN - a Very Precarious Narrative by Dennis Schubert
+
+a_hrefhttpsgist.github.comjoepie915a9909939e6ce7d09e29Dont_use_VPN_servicesa_by_Sven_Slootweg_KEY: |
+ Don't use VPN services by Sven Slootweg
+
+a_href_softwarenetworks__translate_page_The_selfcontained_networksa_recommended_by_PrivacyTools_are_able_to_replace_a_VPN_that_allow_KEY: |
+ The self-contained networks recommended by PrivacyTools are able to replace a VPN that allows access to services on local area network
+
+a_hrefhttpswrite.privacytools.iomythoughtsonsecurityslicingonionspart1mythbustingtorSlicing_Onions_Part_1__Mythbusting_Tora_by_KEY: |
+ Slicing Onions: Part 1 – Myth-busting Tor by blacklight447
+
+a_hrefhttpswrite.privacytools.iomythoughtsonsecurityslicingonionspart2onionrecipesvpnnotrequiredSlicing_Onions_Part_2__Onion_rec_KEY: |
+ Slicing Onions: Part 2 – Onion recipes; VPN not required by blacklight447
+
+More_VPN_Providers_KEY: |
+ More VPN Providers
+
+httpsthatoneprivacysite.netvpncomparisonchart_KEY: |
+ https://thatoneprivacysite.net/vpn-comparison-chart/
+
+Spreadsheet_with_unbiased_independently_verifiable_data_on_over_100_VPN_services._KEY: |
+ Spreadsheet with unbiased, independently verifiable data on over 100 VPN services.
+
+httpsthewirecutter.comreviewsbestvpnservice_KEY: |
+ https://thewirecutter.com/reviews/best-vpn-service/
+
+Indepth_research_on_53_popular_VPN_providers._KEY: |
+ In-depth research on 53 popular VPN providers.
+
+Related_VPN_information_KEY: |
+ Related VPN information
+
+httpsvikingvpn.comblogsofftopicbewareofvpnmarketingandaffiliateprograms_KEY: |
+ https://vikingvpn.com/blogs/off-topic/beware-of-vpn-marketing-and-affiliate-programs
+
+Beware_of_False_Reviews__VPN_Marketing_and_Affiliate_Programs_KEY: |
+ Beware of False Reviews - VPN Marketing and Affiliate Programs
+
+httpswww.goldenfrog.comtakebackyourinternetarticles7mythsaboutvpnloggingandanonymity_KEY: |
+ https://www.goldenfrog.com/take-back-your-internet/articles/7-myths-about-vpn-logging-and-anonymity
+
+I_am_Anonymous_When_I_Use_a_VPN__7_Myths_Debunked_KEY: |
+ I am Anonymous When I Use a VPN - 7 Myths Debunked
+
+Note_KEY: |
+ Note:
+
+While_this_is_a_good_read_they_also_use_the_article_for_selfpromotion_KEY: |
+ While this is a good read, they also use the article for self-promotion
+
+httpstorrentfreak.comproxyshvpnprovidermonitoredtraffictocatchhacker130930_KEY: |
+ https://torrentfreak.com/proxy-sh-vpn-provider-monitored-traffic-to-catch-hacker-130930/
+
+Proxy.sh_VPN_Provider_Sniffed_Server_Traffic_to_Catch_Hacker_KEY: |
+ Proxy.sh VPN Provider Sniffed Server Traffic to Catch Hacker
+
+httpsproxy.shpanelknowledgebase.php?actiondisplayarticleid5_KEY: |
+ https://proxy.sh/panel/knowledgebase.php?action=displayarticle&id=5
+
+Ethical_policy__All_of_the_reasons_why_Proxy.sh_might_enable_logging_KEY: |
+ Ethical policy - All of the reasons why Proxy.sh might enable logging
+
+httpswww.ivpn.netprivacy_KEY: |
+ https://www.ivpn.net/privacy
+
+IVPN.net_will_collect_your_email_and_IP_address_after_sign_up_KEY: |
+ IVPN.net will collect your email and IP address after sign up
+
+Read_the_a_datatoggletooltip_dataplacementtop_dataoriginaltitleThe_IP_collected_at_signup_is_only_used_for_a_few_seconds_by_our_fraud_modu_KEY: |
+ Read the Email statement from IVPN.
+
+httpsmedium.comblackVPNnologs6d65d95a3016_KEY: |
+ https://medium.com/@blackVPN/no-logs-6d65d95a3016
+
+blackVPN_announced_to_delete_connection_logs_after_disconnection_KEY: |
+ blackVPN announced to delete connection logs after disconnection
+
+httpsgist.github.comkennwhite1f3bc4d889b02b35d8aa_KEY: |
+ https://gist.github.com/kennwhite/1f3bc4d889b02b35d8aa
+
+Dont_use_LT2P_IPSec_use_other_protocols._KEY: |
+ Don't use LT2P IPSec, use other protocols.
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefox
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
diff --git a/index.html b/index.html
index 72dd65d4..0ccb5ff2 100644
--- a/index.html
+++ b/index.html
@@ -9,7 +9,7 @@ translate: true
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities.
-At PrivacyTools, we provide services, tools, and knowledge to protect your privacy against global mass surveillance, and moderate a thriving community of privacy-minded individuals like yourself to discuss and learn about new advances in protecting your online data. This website serves as the centerpiece of our organization, where we research and recommend various software solutions for our community.
-Transparency is our strongest value, and it's what sets us apart from the rest of the "privacy recommendations" community. Editorial changes to this website and the products we recommend are always discussed on our extensive issue tracker, drafted in a public pull request open for further discussion, and logged in a comprehensive commit log dating back to our original founding date in 2015. The core team members listed below are responsible for most of the edits and final decisions to changes on this website and across our services, but this website is truly the work of hundreds contributors and fact checkers working to make sure our recommendations are solid and trustworthy.
-Additionally, we are a not-for-profit organization. We do not utilize paid recommendations or affiliate programs to make the recommendations on this website. Unfortunately this practice is very common elsewhere online, which makes it difficult to trust other review sites. We are unique in this area, in that all of our research is conducted independently, and we will never accept payments to modify, add, or remove any of our reviews or recommendations. Our finances are provided entirely by our community donors and sponsors, and are handled by the Open Collective Foundation 501(c)(3). Because we are operating as a charity in the United States, we are legally obligated to only use our funding to further our mission of spreading privacy education and promoting online services like Mastodon, Matrix, and WriteFreely. This website is a public resource, not a profit generator. To that regard, all our financial transactions (incoming and outgoing) are logged and made available to the public via our page at opencollective.com/privacytoolsio.
-We take the operation of our various services very seriously, and require all participants to adhere to our Code of Conduct. For any questions or to report abuse, please see our CoC’s Enforcement section.
+{% t You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. %}
+{% t At PrivacyTools, we provide services, tools, and knowledge to protect your privacy against global mass surveillance, and moderate a thriving community of privacy-minded individuals like yourself to discuss and learn about new advances in protecting your online data. This website serves as the centerpiece of our organization, where we research and recommend various software solutions for our community. %}
+{% t Transparency is our strongest value, and it's what sets us apart from the rest of the "privacy recommendations" community. Editorial changes to this website and the products we recommend are always discussed on our extensive issue tracker, drafted in a public pull request open for further discussion, and logged in a comprehensive commit log dating back to our original founding date in 2015. The core team members listed below are responsible for most of the edits and final decisions to changes on this website and across our services, but this website is truly the work of hundreds contributors and fact checkers working to make sure our recommendations are solid and trustworthy.%}
+{% t Additionally, we are a not-for-profit organization. We do not utilize paid recommendations or affiliate programs to make the recommendations on this website. Unfortunately this practice is very common elsewhere online, which makes it difficult to trust other review sites. We are unique in this area, in that all of our research is conducted independently, and we will never accept payments to modify, add, or remove any of our reviews or recommendations. Our finances are provided entirely by our community donors and sponsors, and are handled by the Open Collective Foundation 501(c)(3). Because we are operating as a charity in the United States, we are legally obligated to only use our funding to further our mission of spreading privacy education and promoting online services like Mastodon, Matrix, and WriteFreely. This website is a public resource, not a profit generator. To that regard, all our financial transactions (incoming and outgoing) are logged and made available to the public via our page at opencollective.com/privacytoolsio.%}
+{% t We take the operation of our various services very seriously, and require all participants to adhere to our Code of Conduct. For any questions or to report abuse, please see our CoC’s Enforcement section.%}
Of course, we couldn't do any of this without our very generous financial contributors, website contributors, and the countless community members that help share new ideas and spread the word! Thank you.
- Get involved! - Donate +{% t Of course, we couldn't do any of this without our very generous financial contributors, website contributors, and the countless community members that help share new ideas and spread the word!%} {% t Thank you. %}
+ {% t Get involved! %} + {% t Donate %}It's very important to us to stay up-to-date on the latest changes in the privacy space. If you have a software recommendation for us, or want to request a change on this website, please don't hesitate to reach out in one of the following ways.
-Start a discussion in our Discourse forum
- -Suggest something new on our subreddit
-For complete transparency, software and providers will only be considered for this website after discussions take place on our GitHub issue tracker. We of course don't make any changes in secret.
-Join our Matrix room at #general:privacytools.io
or join the privacytools_io Keybase team to chat with us and other members about this site and privacy in general! If you need a Matrix account, you can sign up with our own homeserver (https://chat.privacytools.io
) using Riot.
{% t It's very important to us to stay up-to-date on the latest changes in the privacy space. If you have a software recommendation for us, or want to request a change on this website, please don't hesitate to reach out in one of the following ways. %}
+{% t Start a discussion in our Discourse forum %}
+{% t Open an issue on GitHub %}
+{% t Suggest something new on our subreddit %}
+{% t For complete transparency, software and providers will only be considered for this website after discussions take place on our GitHub issue tracker. We of course don't make any changes in secret. %}
+{% t Join our Matrix room at #general:privacytools.io
or join the privacytools_io Keybase team to chat with us and other members about this site and privacy in general! If you need a Matrix account, you can sign up with our own homeserver (https://chat.privacytools.io
) using Riot. %}
#general:privacytools.io
or join the privacytools_io Keybase team to chat with us and other members about this site and privacy in general! If you need a Matrix account, you can sign up with our own homeserver (https://chat.privacytools.io
) using Riot.
+
Spread_the_word_and_help_your_friends_KEY: |
Spread the word and help your friends
@@ -230,19 +287,19 @@ Diaspora_KEY: |
Copy_URL_and_Description_KEY: |
Copy URL and Description
-_site.name___Encryption_and_tools_to_protect_against_global_mass_surveillance___site.producti_KEY: |
+_site.name___Encryption_and_tools_to_protect_against_global_mass_surveillance___site.production_url__append_lang__uri_escape__KEY: |
{{ site.name }} - Encryption and tools to protect against global mass surveillance - {{ site.production_url | append_lang | uri_escape }}
For_easy_copy_and_paste._Share_this_text_snippet._KEY: |
For easy copy and paste. Share this text snippet.
-This_work_is_free._You_can_redistribute_it_andor_modify_it_under_the_terms_of_the_quotCreative_Com_KEY: |
+This_work_is_free._You_can_redistribute_it_andor_modify_it_under_the_terms_of_the_quotCreative_Commons_CC0_1.0_Universal_Public_Domain_Dedicationqu_KEY: |
This work is free. You can redistribute it and/or modify it under the terms of the "Creative Commons CC0 1.0 Universal Public Domain Dedication".
Contact_KEY: |
Contact
-Please_support_this_project_by_donating._We_are_adfree_and_not_affiliated_with_any_providers._Your_d_KEY: |
+Please_support_this_project_by_donating._We_are_adfree_and_not_affiliated_with_any_providers._Your_donation_will_cover_our_costs_for_servers_and_domai_KEY: |
Please support this project by donating. We are ad-free and not affiliated with any providers. Your donation will cover our costs for servers and domains.
Support_Us!_KEY: |
@@ -254,7 +311,7 @@ JavaScript_Licenses_KEY: |
No_Ads_No_Google_Analytics_No_Affiliates_No_CrossSite_Requests._KEY: |
No Ads, No Google Analytics, No Affiliates, No Cross-Site Requests.
-_site.name__is_a_socially_motivated_website_that_provides_information_for_protecting_your_data_se_KEY: |
+_site.name__is_a_socially_motivated_website_that_provides_information_for_protecting_your_data_security_and_privacy._Never_trust_any_company_with_y_KEY: |
{{ site.name }} is a socially motivated website that provides information for protecting your data security and privacy. Never trust any company with your privacy, always encrypt.
View_our_privacy_statement_KEY: |
@@ -266,7 +323,7 @@ Learn_More_KEY: |
Firefox_KEY: |
Firefox
-Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_setting_KEY: |
+Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_settings_according_to_our_recommendations_a_hrefwebr_KEY: |
Firefox is fast, reliable, open-source, and respects your privacy. Don't forget to adjust the settings according to our recommendations: WebRTC and about:config and get the privacy add-ons.
httpsfirefox.com_KEY: |
@@ -302,7 +359,7 @@ httpshg.mozilla.orgmozillacentral_KEY: |
Tor_Browser__Provides_Anonymity_KEY: |
Tor Browser - Provides Anonymity
-Tor_Browser_is_your_choice_if_you_need_an_extra_layer_of_anonymity._Its_a_modified_version_of_Firefo_KEY: |
+Tor_Browser_is_your_choice_if_you_need_an_extra_layer_of_anonymity._Its_a_modified_version_of_Firefox_ESR_which_comes_with_preinstalled_privacy_add_KEY: |
Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy. How does Tor work?
httpswww.torproject.org_KEY: |
@@ -317,6 +374,10 @@ httpswww.torproject.orgdownload_KEY: |
httpstrac.torproject.orgprojectstor_KEY: |
https://trac.torproject.org/projects/tor
+Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_settings_according_to_ourrecommendations_a_hrefwebr_KEY: |
+ Firefox is fast, reliable, open-source, and respects your privacy. Don't forget to adjust the settings according to our
+recommendations: WebRTC and about:config and get the privacy add-ons.
+
httpswww.mozilla.orgenUSfirefoxmobile_KEY: |
https://www.mozilla.org/en-US/firefox/mobile/
@@ -347,7 +408,7 @@ httpsgitweb.torproject.orgtorbrowser.git_KEY: |
Bromite_KEY: |
Bromite
-Bromite_is_a_Chromiumbased_browser_with_security_enhancement_patches_from_GrapheneOS_and_builtin_ad_KEY: |
+Bromite_is_a_Chromiumbased_browser_with_security_enhancement_patches_from_GrapheneOS_and_builtin_adblocking_and_DNS_over_HTTPS_support._More_info_can_KEY: |
Bromite is a Chromium-based browser with security enhancement patches from GrapheneOS and built-in adblocking and DNS over HTTPS support. More info can be found here.
httpswww.bromite.org_KEY: |
@@ -362,7 +423,7 @@ httpswww.bromite.orgdownloadbromite_KEY: |
httpsgithub.combromitebromite_KEY: |
https://github.com/bromite/bromite
-Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Note_Because_of_limitations_set_b_KEY: |
+Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Note_Because_of_limitations_set_by_Apple_in_iOS_our_recommended_tweaks_cannot_be_a_KEY: |
Firefox is fast, reliable, open-source, and respects your privacy. Note: Because of limitations set by Apple in iOS, our recommended tweaks cannot be applied. However, Firefox for iOS has an Enhanced Tracking Protection feature that uses a list provided by Disconnect to identify and block ad, social, and analytics trackers, as well as cryptominers and fingerprinters.
httpsapps.apple.comusappfirefoxprivatesafebrowserid989804926_KEY: |
@@ -374,7 +435,7 @@ httpsgithub.commozillamobilefirefoxios_KEY: |
Onion_Browser_KEY: |
Onion Browser
-Onion_Browser_is_an_opensource_browser_that_lets_you_browse_the_web_anonymously_over_the_Tor_network_KEY: |
+Onion_Browser_is_an_opensource_browser_that_lets_you_browse_the_web_anonymously_over_the_Tor_network_on_iOS_devices_and_is_endorsed_by_the_Tor_Project_KEY: |
Onion Browser is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the Tor Project. Warning: there are certain anonymity-related issues with Onion Browser due to iOS limitations.
httpsonionbrowser.com_KEY: |
@@ -389,7 +450,7 @@ httpsgithub.comOnionBrowserOnionBrowser_KEY: |
DuckDuckGo_Privacy_Browser_KEY: |
DuckDuckGo Privacy Browser
-DuckDuckGo_Privacy_Browser_is_an_opensource_web_browser_that_has_builtin_ad_and_tracker_blocking_an_KEY: |
+DuckDuckGo_Privacy_Browser_is_an_opensource_web_browser_that_has_builtin_ad_and_tracker_blocking_and_utilizes_a_hrefhttpstosdr.orgToSDRa_KEY: |
DuckDuckGo Privacy Browser is an open-source web browser that has built-in ad and tracker blocking and utilizes ToS;DR to rate the privacy policies of the sites you visit.
httpsduckduckgo.comapp_KEY: |
@@ -404,7 +465,7 @@ httpsgithub.comduckduckgoiOS_KEY: |
uBlock_Origin_Block_Ads_and_Trackers_KEY: |
uBlock Origin: Block Ads and Trackers
-stronguBlock_Originstrong_is_an_efficient_a_hrefhttpsgithub.comgorhilluBlockwikiBlockin_KEY: |
+stronguBlock_Originstrong_is_an_efficient_a_hrefhttpsgithub.comgorhilluBlockwikiBlockingmodewidespectrum_blockera_thats_easy_on_me_KEY: |
uBlock Origin is an efficient wide-spectrum blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source.
httpsaddons.mozilla.orgfirefoxaddonublockorigin_KEY: |
@@ -428,7 +489,7 @@ httpsgithub.comgorhilluBlock_KEY: |
Cookie_AutoDelete_Automatically_Delete_Cookies_KEY: |
Cookie AutoDelete: Automatically Delete Cookies
-strongCookie_AutoDeletestrong_automatically_removes_cookies_when_they_are_no_longer_used_by_open_KEY: |
+strongCookie_AutoDeletestrong_automatically_removes_cookies_when_they_are_no_longer_used_by_open_browser_tabs._With_the_cookies_lingering_session_KEY: |
Cookie AutoDelete automatically removes cookies when they are no longer used by open browser tabs. With the cookies, lingering sessions, as well as information used to spy on you, will be expunged.
httpsaddons.mozilla.orgfirefoxaddoncookieautodelete_KEY: |
@@ -446,7 +507,7 @@ httpsgithub.comCookieAutoDeleteCookieAutoDelete_KEY: |
HTTPS_Everywhere_Secure_Connections_KEY: |
HTTPS Everywhere: Secure Connections
-strongHTTPS_Everywherestrong_encrypts_your_communications_with_many_major_websites_making_your__KEY: |
+strongHTTPS_Everywherestrong_encrypts_your_communications_with_many_major_websites_making_your_browsing_more_secure._A_collaboration_between_The__KEY: |
HTTPS Everywhere encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation.
httpswww.eff.orghttpseverywhere_KEY: |
@@ -467,7 +528,7 @@ httpsgithub.comEFForghttpseverywhere_KEY: |
Decentraleyes_Block_Content_Delivery_Networks_KEY: |
Decentraleyes: Block Content Delivery Networks
-strongDecentraleyesstrong_emulates_Content_Delivery_Networks_locally_by_intercepting_requests_f_KEY: |
+strongDecentraleyesstrong_emulates_Content_Delivery_Networks_locally_by_intercepting_requests_finding_the_required_resource_and_injecting_it_int_KEY: |
Decentraleyes emulates Content Delivery Networks locally by intercepting requests, finding the required resource, and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required.
httpsdecentraleyes.org_KEY: |
@@ -488,7 +549,7 @@ httpsgit.synz.ioSynzvatodecentraleyes_KEY: |
Terms_of_Service_Didnt_Read_Be_Informed_KEY: |
Terms of Service; Didn’t Read: Be Informed
-strongTerms_of_Service_Didnt_Readstrong_is_an_addon_that_aims_to_fix_how_I_have_read_and_agre_KEY: |
+strongTerms_of_Service_Didnt_Readstrong_is_an_addon_that_aims_to_fix_how_I_have_read_and_agree_to_the_Terms_is_the_biggest_lie_on_the_web_by_g_KEY: |
Terms of Service; Didn’t Read is an addon that aims to fix how “I have read and agree to the Terms” is the biggest lie on the web by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are done transparently by a community of reviewers.
httpstosdr.org_KEY: |
@@ -497,7 +558,7 @@ httpstosdr.org_KEY: |
httpsaddons.mozilla.orgenUSfirefoxaddontermsofservicedidntread_KEY: |
https://addons.mozilla.org/en-US/firefox/addon/terms-of-service-didnt-read/
-httpschrome.google.comwebstoredetailtermsofservicedidnE28099trhjdoplcnndgiblooccencgcgg_KEY: |
+httpschrome.google.comwebstoredetailtermsofservicedidnE28099trhjdoplcnndgiblooccencgcggcoihigg_KEY: |
https://chrome.google.com/webstore/detail/terms-of-service-didn%E2%80%99t-r/hjdoplcnndgiblooccencgcggcoihigg
httpsaddons.opera.comenextensionsdetailstermsofservicedidntread_KEY: |
@@ -509,7 +570,7 @@ httpsgithub.comtosdr_KEY: |
Snowflake_KEY: |
Snowflake
-strongSnowflakestrong_is_a_new_a_hrefhttps2019.www.torproject.orgdocspluggabletransports_KEY: |
+strongSnowflakestrong_is_a_new_a_hrefhttps2019.www.torproject.orgdocspluggabletransports.html.enpluggable_transporta_from_the_Tor_Proj_KEY: |
Snowflake is a new pluggable transport from the Tor Project. If you have an uncensored connection, running this extension volunteers your connection to be used as a Snowflake proxy to help users unable to connect to the Tor network. Your IP will not be visible to the sites users visit using your proxy, as this extension will not make you an exit node. If your access to the Tor network is blocked, this extension will not assist you, and you should use the Tor Browser instead.
httpssnowflake.torproject.org_KEY: |
@@ -527,7 +588,7 @@ httpsgitweb.torproject.orgpluggabletransportssnowflake.git_KEY: |
Privacy_Badger_Stop_Tracking_KEY: |
Privacy Badger: Stop Tracking
-strongPrivacy_Badgerstrong_is_a_browser_addon_that_stops_advertisers_and_other_thirdparty_trac_KEY: |
+strongPrivacy_Badgerstrong_is_a_browser_addon_that_stops_advertisers_and_other_thirdparty_trackers_from_secretly_tracking_where_you_go_and_what__KEY: |
Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. Privacy Badger learns about trackers as you browse.
httpswww.eff.orgprivacybadger_KEY: |
@@ -548,7 +609,7 @@ httpsgithub.comEFForgprivacybadger_KEY: |
uMatrix_Stop_CrossSite_Requests_KEY: |
uMatrix: Stop Cross-Site Requests
-stronguMatrixstrong_gives_you_control_over_the_requests_that_websites_make_to_other_websites._Ma_KEY: |
+stronguMatrixstrong_gives_you_control_over_the_requests_that_websites_make_to_other_websites._Many_websites_integrate_features_which_let_other_web_KEY: |
uMatrix gives you control over the requests that websites make to other websites. Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics.
httpsaddons.mozilla.orgfirefoxaddonumatrix_KEY: |
@@ -569,7 +630,7 @@ httpsgithub.comgorhilluMatrix_KEY: |
NoScript_Security_Suite_Be_in_total_control_KEY: |
NoScript Security Suite: Be in total control
-strongNoScriptstrong_is_a_highly_customizable_plugin_to_selectively_allow_JavaScript_Java_and__KEY: |
+strongNoScriptstrong_is_a_highly_customizable_plugin_to_selectively_allow_JavaScript_Java_and_Flash_to_run_only_on_websites_you_trust._Not_for_c_KEY: |
NoScript is a highly customizable plugin to selectively allow JavaScript, Java, and Flash to run only on websites you trust. Not for casual users, it requires technical knowledge to configure.
httpsaddons.mozilla.orgfirefoxaddonnoscript_KEY: |
@@ -587,7 +648,7 @@ httpsgithub.comhackademixnoscript_KEY: |
Nextcloud_KEY: |
Nextcloud
-strongNextcloudstrong_is_a_suite_of_clientserver_software_for_creating_and_using_file_hosting_s_KEY: |
+strongNextcloudstrong_is_a_suite_of_clientserver_software_for_creating_and_using_file_hosting_services._This_includes_calendar_sync_via_CalDAV_an_KEY: |
Nextcloud is a suite of client-server software for creating and using file hosting services. This includes calendar sync via CalDAV and contacts sync via CardDAV. Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server.
httpsnextcloud.com_KEY: |
@@ -611,7 +672,7 @@ httpsgithub.comnextcloud_KEY: |
Email_Providers_KEY: |
Email Providers
-Many_email_providers_also_offer_calendar_and_or_contacts_sync_services._Refer_to_the_a_hrefprovid_KEY: |
+Many_email_providers_also_offer_calendar_and_or_contacts_sync_services._Refer_to_the_a_hrefprovidersemailEmail_Providers_sectiona_to_choose_a_KEY: |
Many email providers also offer calendar and or contacts sync services. Refer to the Email Providers section to choose an email provider and check if they also offer calendar and/or contacts sync.
providersemail_KEY: |
@@ -620,7 +681,7 @@ providersemail_KEY: |
EteSync_KEY: |
EteSync
-strongEteSyncstrong_is_a_secure_endtoend_encrypted_and_journaled_personal_information_e.g.__KEY: |
+strongEteSyncstrong_is_a_secure_endtoend_encrypted_and_journaled_personal_information_e.g._contacts_and_calendar_cloud_synchronization_and_b_KEY: |
EteSync is a secure, end-to-end encrypted, and journaled personal information (e.g. contacts and calendar) cloud synchronization and backup for Android and any OS that supports CalDAV/CardDAV. It costs $24 per year to use, or you can host the server yourself for free.
httpswww.etesync.com_KEY: |
@@ -641,7 +702,7 @@ httpsclient.etesync.com_KEY: |
httpsgithub.cometesync_KEY: |
https://github.com/etesync
-Nextcloud_is_similar_in_functionality_to_the_widely_used_Dropbox_with_the_difference_being_that_Next_KEY: |
+Nextcloud_is_similar_in_functionality_to_the_widely_used_Dropbox_with_the_difference_being_that_Nextcloud_is_free_and_opensource_thereby_allowing_an_KEY: |
Nextcloud is similar in functionality to the widely used Dropbox, with the difference being that Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server with no limits on storage space or the number of connected clients.
httpsnextcloud.cominstallinstallclients_KEY: |
@@ -662,7 +723,7 @@ httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
TahoeLAFS_KEY: |
Tahoe-LAFS
-TahoeLAFS_is_a_free_and_open_decentralized_cloud_storage_system._It_distributes_your_data_across_mul_KEY: |
+TahoeLAFS_is_a_free_and_open_decentralized_cloud_storage_system._It_distributes_your_data_across_multiple_servers._Even_if_some_of_the_servers_fail_or_KEY: |
Tahoe-LAFS is a free and open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security.
httpswww.tahoelafs.org_KEY: |
@@ -686,7 +747,7 @@ Domain_Name_System_DNS_KEY: |
Njalla__Domain_Registration_KEY: |
Njalla - Domain Registration
-Njalla_is_a_privacyaware_domain_registration_service_based_in_Nevis_that_only_needs_your_email_or_XM_KEY: |
+Njalla_is_a_privacyaware_domain_registration_service_based_in_Nevis_that_only_needs_your_email_or_XMPP_address_in_order_to_register_a_domain_name_for__KEY: |
Njalla is a privacy-aware domain registration service based in Nevis that only needs your email or XMPP address in order to register a domain name for you. It is created by people from The Pirate Bay and IPredator VPN. Accepted payments: Bitcoin, Litecoin, Monero, DASH, Bitcoin Cash and PayPal.
httpsnjal.la_KEY: |
@@ -695,7 +756,7 @@ httpsnjal.la_KEY: |
DNSCryptProxy__Tool_KEY: |
DNSCrypt-Proxy - Tool
-DNSCryptProxy_is_a_commandline_DNS_proxy_with_support_for_the_encrypted_DNS_protocols_DNS_over_HTT_KEY: |
+DNSCryptProxy_is_a_commandline_DNS_proxy_with_support_for_the_encrypted_DNS_protocols_DNS_over_HTTPS_and_DNSCrypt._Can_cache_results_to_improve_spee_KEY: |
DNSCrypt-Proxy is a command-line DNS proxy with support for the encrypted DNS protocols, DNS over HTTPS and DNSCrypt. Can cache results to improve speed, and allows filtering, forwarding, and cloaking.
httpsgithub.comjedisct1dnscryptproxy_KEY: |
@@ -716,7 +777,7 @@ httppkgsrc.senetdnscryptproxy2_KEY: |
Encrypted_ICANN_DNS_Providers_KEY: |
Encrypted ICANN DNS Providers
-Note_Using_an_encrypted_DNS_resolver_will_not_make_you_anonymous_nor_hide_your_internet_traffic_fro_KEY: |
+Note_Using_an_encrypted_DNS_resolver_will_not_make_you_anonymous_nor_hide_your_internet_traffic_from_your_Internet_Service_Provider._But_it_will_prev_KEY: |
Note: Using an encrypted DNS resolver will not make you anonymous, nor hide your internet traffic from your Internet Service Provider. But it will prevent DNS hijacking, and make your DNS requests harder for third parties to eavesdrop on and tamper with. If you are currently using Google's DNS resolver, you should pick an alternative here.
ICANN_DNS_Provider_KEY: |
@@ -758,7 +819,7 @@ AdGuard_KEY: |
httpsadguard.comenadguarddnsoverview.html_KEY: |
https://adguard.com/en/adguard-dns/overview.html
-Anycast_based_in_span_classnotextwrapspan_classflagicon_flagiconcyspan_Cyprussp_KEY: |
+Anycast_based_in_span_classnotextwrapspan_classflagicon_flagiconcyspan_Cyprusspan_KEY: |
Anycast (based in Cyprus)
httpsadguard.comenprivacydns.html_KEY: |
@@ -854,7 +915,7 @@ Cloudflare_KEY: |
httpsdevelopers.cloudflare.com1.1.1.1settingup1.1.1.1_KEY: |
https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/
-Cloudflare_is_one_of_the_worlds_largest_networks_and_a_problem_considering_anonymity_and_decentrali_KEY: |
+Cloudflare_is_one_of_the_worlds_largest_networks_and_a_problem_considering_anonymity_and_decentralization._KEY: |
Cloudflare is one of the world's largest networks, and a problem considering anonymity and decentralization.
httpscodeberg.orgcrimeflarecloudflaretor_KEY: |
@@ -866,7 +927,7 @@ Anycast_based_in_span_classnotextwrap_span_classflagicon_flagiconusspan_USspan_K
httpswww.cloudflare.comprivacypolicy_KEY: |
https://www.cloudflare.com/privacypolicy/
-We_will_collect_limited_DNS_query_data_that_is_sent_to_the_resolvers._This_data_does_not_contain_use_KEY: |
+We_will_collect_limited_DNS_query_data_that_is_sent_to_the_resolvers._This_data_does_not_contain_user_IP_addresses_or_any_other_personally_identifiabl_KEY: |
"We will collect limited DNS query data that is sent to the resolvers. This data does not contain user IP addresses or any other personally identifiable information, and the bulk of the data is only stored for 24 hours."
httpsdevelopers.cloudflare.com1.1.1.1commitmenttoprivacyprivacypolicyprivacypolicy_KEY: |
@@ -887,10 +948,10 @@ httpswww.nic.czodvr_KEY: |
Czech_Republic_KEY: |
Czech Republic
-CZ.NIC_resolvers_neither_collect_any_personal_data_nor_gather_information_on_pages_where_your_comput_KEY: |
+CZ.NIC_resolvers_neither_collect_any_personal_data_nor_gather_information_on_pages_where_your_computer_sends_personal_data._KEY: |
"CZ.NIC resolvers neither collect any personal data nor gather information on pages where your computer sends personal data."
-CZ.NIC_is_an_interest_association_of_legal_entities_founded_in_1998_by_leading_providers_of_Interne_KEY: |
+CZ.NIC_is_an_interest_association_of_legal_entities_founded_in_1998_by_leading_providers_of_Internet_services._KEY: |
"CZ.NIC is an interest association of legal entities, founded in 1998 by leading providers of Internet services."
httpswww.nic.czpage351aboutassociation_KEY: |
@@ -929,7 +990,7 @@ httpsappliedprivacy.netprivacypolicy_KEY: |
NonProfit_KEY: |
Non-Profit
-We_do_NOT_log_your_IP_address_or_DNS_queries_during_normal_operations._We_do_NOT_share_query_data_wi_KEY: |
+We_do_NOT_log_your_IP_address_or_DNS_queries_during_normal_operations._We_do_NOT_share_query_data_with_third_parties_that_are_not_directly_involved_wi_KEY: |
"We do NOT log your IP address or DNS queries during normal operations. We do NOT share query data with third parties that are not directly involved with resolving the query (i.e. sending queries to authoritative nameservers for resolution)."
httpswww.ipax.at_KEY: |
@@ -950,7 +1011,7 @@ Anycast_based_in_span_classnotextwrapspan_classflagicon_flagiconusspan_USspan_KE
httpswww.nextdns.ioprivacy_KEY: |
https://www.nextdns.io/privacy
-Some_of_the_features_require_some_sort_of_data_retention._In_that_case_we_give_our_users_the_choice_KEY: |
+Some_of_the_features_require_some_sort_of_data_retention._In_that_case_we_give_our_users_the_choice_to_granularly_or_completely_disable_those_feature_KEY: |
"Some of the features require some sort of data retention. In that case, we give our users the choice to granularly or completely disable those features (and associated data retention), and we follow up immediately on that promise"
Based_on_user_choice_KEY: |
@@ -974,7 +1035,7 @@ Luxembourg_KEY: |
httpsnixnet.xyzprivacy_KEY: |
https://nixnet.xyz/privacy/
-Part_of_LibreHosters_a_network_of_cooperation_and_solidarity_that_uses_free_software_to_encourage_d_KEY: |
+Part_of_LibreHosters_a_network_of_cooperation_and_solidarity_that_uses_free_software_to_encourage_decentralisation_through_federation_and_distributed_KEY: |
Part of LibreHosters, "a network of cooperation and solidarity that uses free software to encourage decentralisation through federation and distributed platforms."
httpslibreho.st_KEY: |
@@ -1019,13 +1080,13 @@ Quad9_KEY: |
httpsquad9.net_KEY: |
https://quad9.net/
-Founders_include_the_Global_Cyber_Alliance_composed_of_the_City_of_London_Police_and_Manhattan_Distr_KEY: |
+Founders_include_the_Global_Cyber_Alliance_composed_of_the_City_of_London_Police_and_Manhattan_District_Attorneys_Office_KEY: |
Founders include the Global Cyber Alliance, composed of the City of London Police and Manhattan District Attorney's Office
httpsquad9.netpolicy_KEY: |
https://quad9.net/policy/
-Our_normal_course_of_data_management_does_not_have_any_IP_address_information_or_other_PII_logged_to_KEY: |
+Our_normal_course_of_data_management_does_not_have_any_IP_address_information_or_other_PII_logged_to_disk_or_transmitted_out_of_the_location_in_which__KEY: |
"Our normal course of data management does not have any IP address information or other PII logged to disk or transmitted out of the location in which the query was received."
Malicious_domains_KEY: |
@@ -1073,7 +1134,7 @@ Anycast_based_in_span_classnotextwrapspan_classflagicon_flagicondkspan_Denmark_K
Denmark_KEY: |
Denmark
-Absolutely_nothing_is_being_logged_neither_about_the_users_nor_the_usage_of_this_service._I_do_keep_KEY: |
+Absolutely_nothing_is_being_logged_neither_about_the_users_nor_the_usage_of_this_service._I_do_keep_graphs_of_the_total_number_of_queries_but_no_per_KEY: |
"Absolutely nothing is being logged, neither about the users nor the usage of this service. I do keep graphs of the total number of queries, but no personally identifiable information is saved. The data that is saved will never be sold or used for anything except capacity planning of the service."
httpswww.teliacompany.com_KEY: |
@@ -1085,22 +1146,22 @@ Telia_Company_AB_KEY: |
Terms_KEY: |
Terms
-DNSoverTLS_DoT__A_security_protocol_for_encrypted_DNS_on_a_dedicated_port_853._Some_providers_su_KEY: |
+DNSoverTLS_DoT__A_security_protocol_for_encrypted_DNS_on_a_dedicated_port_853._Some_providers_support_port_443_which_generally_works_everywhere_wh_KEY: |
DNS-over-TLS (DoT) - A security protocol for encrypted DNS on a dedicated port 853. Some providers support port 443 which generally works everywhere while port 853 is often blocked by restrictive firewalls. DoT has two modes:
-Oppurtunistic_mode_the_client_attempts_to_form_a_DNSoverTLS_connection_to_the_server_on_port_853_w_KEY: |
+Oppurtunistic_mode_the_client_attempts_to_form_a_DNSoverTLS_connection_to_the_server_on_port_853_without_performing_certificate_validation._If_it_fa_KEY: |
Oppurtunistic mode: the client attempts to form a DNS-over-TLS connection to the server on port 853 without performing certificate validation. If it fails, it will use unencrypted DNS.
In_other_words_automatic_mode_leaves_your_DNS_traffic_vulnerable_to_SSL_strip_and_MITM_attacks_KEY: |
In other words automatic mode leaves your DNS traffic vulnerable to SSL strip and MITM attacks
-Strict_mode_the_client_connects_to_a_specific_hostname_and_performs_certificate_validation_for_it._I_KEY: |
+Strict_mode_the_client_connects_to_a_specific_hostname_and_performs_certificate_validation_for_it._If_it_fails_no_DNS_queries_are_made_until_it_succe_KEY: |
Strict mode: the client connects to a specific hostname and performs certificate validation for it. If it fails, no DNS queries are made until it succeeds.
-DNSoverHTTPS_DoH__Similar_to_DoT_but_uses_HTTPS_instead_being_indistinguishable_from_normal__KEY: |
+DNSoverHTTPS_DoH__Similar_to_DoT_but_uses_HTTPS_instead_being_indistinguishable_from_normal_HTTPS_traffic_on_port_443._KEY: |
DNS-over-HTTPS (DoH) - Similar to DoT, but uses HTTPS instead, being indistinguishable from "normal" HTTPS traffic on port 443.
-DoH_contains_metadata_such_as_useragent_which_may_include_system_information_that_is_sent_to_the_D_KEY: |
+DoH_contains_metadata_such_as_useragent_which_may_include_system_information_that_is_sent_to_the_DNS_server._KEY: |
DoH contains metadata such as user-agent (which may include system information) that is sent to the DNS server.
httpstools.ietf.orghtmlrfc8484section8.2_KEY: |
@@ -1118,25 +1179,25 @@ DoH__DoT_KEY: |
Check_a_hrefhttpswww.dnsleaktest.comDNSLeakTest.coma._KEY: |
Check DNSLeakTest.com.
-Your_DNS_provider_may_not_appear_with_their_own_name_so_compare_the_responses_to_what_you_know_or_ca_KEY: |
+Your_DNS_provider_may_not_appear_with_their_own_name_so_compare_the_responses_to_what_you_know_or_can_find_about_your_DNS_provider._Just_ensure_you_do_KEY: |
Your DNS provider may not appear with their own name, so compare the responses to what you know or can find about your DNS provider. Just ensure you don't see your ISP or old unencrypted DNS provider.
-Check_the_website_of_your_DNS_provider._They_may_have_a_page_for_telling_you_are_using_our_DNS._Exa_KEY: |
+Check_the_website_of_your_DNS_provider._They_may_have_a_page_for_telling_you_are_using_our_DNS._Examples_include_a_hrefhttpsadguard.comenadgu_KEY: |
Check the website of your DNS provider. They may have a page for telling "you are using our DNS." Examples include AdGuard and Cloudflare.
-If_using_Firefoxs_trusted_recursive_resolver_TRR_navigate_to_codeaboutnetworkingdnscode._I_KEY: |
+If_using_Firefoxs_trusted_recursive_resolver_TRR_navigate_to_codeaboutnetworkingdnscode._If_the_TRR_column_says_true_for_some_fields_you__KEY: |
If using Firefox's trusted recursive resolver (TRR), navigate to about:networking#dns
. If the TRR column says "true" for some fields, you are using DoH.
Some_fields_will_say_false_depending_on_the_the_value_of_network.trr.mode_in_aboutconfig_KEY: |
Some fields will say "false" depending on the the value of network.trr.mode in about:config
-dnscryptproxy__Check_a_hrefhttpsgithub.comjedisct1dnscryptproxywikiCheckingdnscryptpr_KEY: |
+dnscryptproxy__Check_a_hrefhttpsgithub.comjedisct1dnscryptproxywikiCheckingdnscryptproxys_wiki_on_how_to_verify_that_your_DNS_is_encry_KEY: |
dnscrypt-proxy - Check dnscrypt-proxy's wiki on how to verify that your DNS is encrypted.
DNSSEC__Check_a_hrefhttpsdnssec.vs.unidue.deDNSSEC_Resolver_Test_by_Matthus_Wandera._KEY: |
DNSSEC - Check DNSSEC Resolver Test by Matthäus Wander.
-QNAME_Minimization__Run_codedig_short_txt_qnamemintest.internet.nlcode_from_the_commandline__KEY: |
+QNAME_Minimization__Run_codedig_short_txt_qnamemintest.internet.nlcode_from_the_commandline_taken_from_a_hrefhttpsnlnetlabs.nldownloads_KEY: |
QNAME Minimization - Run dig +short txt qnamemintest.internet.nl
from the command-line (taken from this NLnet Labs presentation). If you are on Windows 10, run Resolve-DnsName -Type TXT -Name qnamemintest.internet.nl
from the PowerShell. You should see this display: "HOORAY - QNAME minimisation is enabled on your resolver :)!"
Worth_Mentioning_and_Additional_Information_KEY: |
@@ -1145,28 +1206,28 @@ Worth_Mentioning_and_Additional_Information_KEY: |
Encrypted_DNS_clients_for_desktop_KEY: |
Encrypted DNS clients for desktop:
-emFirefoxem_comes_with_builtin_DoH_support_with_Cloudflare_set_as_the_default_resolver_but_can_KEY: |
+emFirefoxem_comes_with_builtin_DoH_support_with_Cloudflare_set_as_the_default_resolver_but_can_be_configured_to_use_any_DoH_resolver._KEY: |
Firefox comes with built-in DoH support with Cloudflare set as the default resolver, but can be configured to use any DoH resolver.
-Cloudflare_has_agreed_to_collect_only_a_limited_amount_of_data_about_the_DNS_requests_that_are_sent__KEY: |
+Cloudflare_has_agreed_to_collect_only_a_limited_amount_of_data_about_the_DNS_requests_that_are_sent_to_the_Cloudflare_Resolver_for_Firefox_via_the_Fir_KEY: |
"Cloudflare has agreed to collect only a limited amount of data about the DNS requests that are sent to the Cloudflare Resolver for Firefox via the Firefox browser."
httpsdevelopers.cloudflare.com1.1.1.1commitmenttoprivacyprivacypolicyfirefox_KEY: |
https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/
-Currently_Mozilla_is_a_hrefhttpsblog.mozilla.orgfuturereleases20190731dnsoverhttpsdohu_KEY: |
+Currently_Mozilla_is_a_hrefhttpsblog.mozilla.orgfuturereleases20190731dnsoverhttpsdohupdatedetectingmanagednetworksanduserchoice_KEY: |
Currently Mozilla is conducting studies before enabling DoH by default for all US-based Firefox users.
-DNS_over_HTTPS_can_be_enabled_in_Menu__Preferences_codeaboutpreferencescode__Network_Sett_KEY: |
+DNS_over_HTTPS_can_be_enabled_in_Menu__Preferences_codeaboutpreferencescode__Network_Settings__Enable_DNS_over_HTTPS._Set_Use_Provider__KEY: |
DNS over HTTPS can be enabled in Menu -> Preferences (about:preferences
) -> Network Settings -> Enable DNS over HTTPS. Set "Use Provider" to "Custom", and enter your DoH provider's address.
-Advanced_users_may_enable_it_in_codeaboutconfigcode_by_setting_codenetwork.trr.custom_urico_KEY: |
+Advanced_users_may_enable_it_in_codeaboutconfigcode_by_setting_codenetwork.trr.custom_uricode_and_codenetwork.trr.uricode_as_the_addres_KEY: |
Advanced users may enable it in about:config
by setting network.trr.custom_uri
and network.trr.uri
as the address you find from the documentation of your DoH provider and network.trr.mode
as 2
. It may also be desirable to set network.security.esni.enabled
to True
in order to enable encrypted SNI and make sites supporting ESNI a bit more difficult to track.
Encrypted_DNS_clients_for_mobile_KEY: |
Encrypted DNS clients for mobile:
-emAndroid_9em_comes_with_a_DoT_client_by_a_hrefhttpssupport.google.comandroidanswer9089_KEY: |
+emAndroid_9em_comes_with_a_DoT_client_by_a_hrefhttpssupport.google.comandroidanswer9089903defaulta._KEY: |
Android 9 comes with a DoT client by default.
...but_with_some_caveats_KEY: |
@@ -1175,10 +1236,10 @@ emAndroid_9em_comes_with_a_DoT_client_by_a_hrefhttpssupport.google.comandroidans
httpswww.quad9.netprivatednsquad9android9_KEY: |
https://www.quad9.net/private-dns-quad9-android9/
-We_recommend_selecting_emPrivate_DNS_provider_hostnameem_and_entering_the_DoT_address_from_docum_KEY: |
+We_recommend_selecting_emPrivate_DNS_provider_hostnameem_and_entering_the_DoT_address_from_documentation_of_your_DoT_provider_to_enable_strict_mod_KEY: |
We recommend selecting Private DNS provider hostname and entering the DoT address from documentation of your DoT provider to enable strict mode (see Terms above).
-If_you_are_on_a_network_blocking_access_to_port_853_Android_will_error_about_the_network_not_having__KEY: |
+If_you_are_on_a_network_blocking_access_to_port_853_Android_will_error_about_the_network_not_having_internet_connectivity._KEY: |
If you are on a network blocking access to port 853, Android will error about the network not having internet connectivity.
httpsapps.apple.comappid1452162351_KEY: |
@@ -1187,7 +1248,7 @@ httpsapps.apple.comappid1452162351_KEY: |
DNSCloak_KEY: |
DNSCloak
-An_a_hrefhttpsgithub.comssdnscloakopensourcea_DNSCrypt_and_DoH_client_for_iOS_by_td_KEY: |
+An_a_hrefhttpsgithub.comssdnscloakopensourcea_DNSCrypt_and_DoH_client_for_iOS_by_tda_datatoggletooltip_dataplacementbottom_da_KEY: |
An open-source DNSCrypt and DoH client for iOS by #general:privacytools.io
.
Reddit_KEY: |
@@ -2123,10 +2181,10 @@ httpsgithub.comprivacytoolsIOprivacytools.io_KEY: |
GitHub_KEY: |
GitHub
-This_is_a_community_project_aiming_to_deliver_the_best_information_available_to_improve_privacy_onlin_KEY: |
+This_is_a_community_project_aiming_to_deliver_the_best_information_available_to_improve_privacy_online._Thank_you_for_participating._This_project_needs_KEY: |
This is a community project aiming to deliver the best information available to improve privacy online. Thank you for participating. This project needs you.
-The_Tor_network_is_a_group_of_volunteeroperated_servers_that_allows_people_to_improve_their_privacy__KEY: |
+The_Tor_network_is_a_group_of_volunteeroperated_servers_that_allows_people_to_improve_their_privacy_and_security_on_the_Internet._Tors_users_employ_t_KEY: |
The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Tor is an effective censorship circumvention tool.
httpswww.freshports.orgsecuritytor_KEY: |
@@ -2150,7 +2208,7 @@ httpsgitweb.torproject.orgtor.git_KEY: |
I2P_Anonymous_Network_KEY: |
I2P Anonymous Network
-The_Invisible_Internet_Project_I2P_is_a_computer_network_layer_that_allows_applications_to_send_mes_KEY: |
+The_Invisible_Internet_Project_I2P_is_a_computer_network_layer_that_allows_applications_to_send_messages_to_each_other_pseudonymously_and_securely._U_KEY: |
The Invisible Internet Project (I2P) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous Web surfing, chatting, blogging, and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. The software is free and open-source and is published under multiple licenses.
httpsgeti2p.net_KEY: |
@@ -2192,7 +2250,7 @@ httpsgeti2p.netengetinvolvedguidesnewdevelopersgettingthei2pcode_KEY: |
The_Freenet_Project_KEY: |
The Freenet Project
-Freenet_is_a_peertopeer_platform_for_censorshipresistant_communication._It_uses_a_decentralized_di_KEY: |
+Freenet_is_a_peertopeer_platform_for_censorshipresistant_communication._It_uses_a_decentralized_distributed_data_store_to_keep_and_deliver_informati_KEY: |
Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools were originally designed by Ian Clarke, who defined Freenet's goal as providing freedom of speech on the Internet with strong anonymity protection.
httpsfreenetproject.org_KEY: |
@@ -2213,7 +2271,7 @@ httpsgithub.comfreenet_KEY: |
Joplin_KEY: |
Joplin
-Joplin_is_a_free_opensource_and_fullyfeatured_notetaking_and_todo_application_which_can_handle__KEY: |
+Joplin_is_a_free_opensource_and_fullyfeatured_notetaking_and_todo_application_which_can_handle_a_large_number_of_markdown_notes_organized_into_no_KEY: |
Joplin is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers end-to-end encryption and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes.
httpsjoplinapp.org_KEY: |
@@ -2246,7 +2304,7 @@ httpsgithub.comlaurent22joplin_KEY: |
Standard_Notes_KEY: |
Standard Notes
-Standard_Notes_is_a_simple_and_private_notes_app_that_makes_your_notes_easy_and_available_everywhere__KEY: |
+Standard_Notes_is_a_simple_and_private_notes_app_that_makes_your_notes_easy_and_available_everywhere_you_are._Features_endtoend_encryption_on_every_p_KEY: |
Standard Notes is a simple and private notes app that makes your notes easy and available everywhere you are. Features end-to-end encryption on every platform, and a powerful desktop experience with themes and custom editors.
httpsstandardnotes.org_KEY: |
@@ -2273,7 +2331,7 @@ httpsgithub.comstandardnotes_KEY: |
Turtl_KEY: |
Turtl
-Turtl_lets_you_take_notes_bookmark_websites_and_store_documents_for_sensitive_projects._From_sharin_KEY: |
+Turtl_lets_you_take_notes_bookmark_websites_and_store_documents_for_sensitive_projects._From_sharing_passwords_with_your_coworkers_to_tracking_resear_KEY: |
Turtl lets you take notes, bookmark websites, and store documents for sensitive projects. From sharing passwords with your coworkers to tracking research on an article you're writing, Turtl keeps it all safe from everyone but you and those you share with.
httpsturtlapp.com_KEY: |
@@ -2309,7 +2367,7 @@ Global_Mass_Surveillance__The_Fourteen_Eyes_KEY: |
UKUSA_Agreement_KEY: |
UKUSA Agreement
-The_UKUSA_Agreement_is_an_agreement_between_the_United_Kingdom_United_States_Australia_Canada_and_KEY: |
+The_UKUSA_Agreement_is_an_agreement_between_the_United_Kingdom_United_States_Australia_Canada_and_New_Zealand_to_cooperatively_collect_analyze_an_KEY: |
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.
Australia_KEY: |
@@ -2354,7 +2412,7 @@ Key_Disclosure_Law_KEY: |
Who_is_required_to_hand_over_the_encryption_keys_to_authorities?_KEY: |
Who is required to hand over the encryption keys to authorities?
-Mandatory_a_hrefhttpsen.wikipedia.orgwikiKey_disclosure_lawkey_disclosure_lawsa_require__KEY: |
+Mandatory_a_hrefhttpsen.wikipedia.orgwikiKey_disclosure_lawkey_disclosure_lawsa_require_individuals_to_turn_over_encryption_keys_to_law_en_KEY: |
Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability. Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
httpsen.wikipedia.orgwikiKey_disclosure_lawAntigua_and_Barbuda_KEY: |
@@ -2387,7 +2445,7 @@ Ireland_KEY: |
httpsedri.orgnorwayintroducesforcedbiometricauthentication_KEY: |
https://edri.org/norway-introduces-forced-biometric-authentication/
-httpswww.bloomberg.comnewsarticles20180320telegramlosesbidtostoprussiafromgettingenc_KEY: |
+httpswww.bloomberg.comnewsarticles20180320telegramlosesbidtostoprussiafromgettingencryptionkeys_KEY: |
https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys
Russia_KEY: |
@@ -2480,7 +2538,7 @@ httpswww.wikipedia.orgwikiKey_disclosure_lawSwitzerland_KEY: |
Key_disclosure_laws_dont_apply_KEY: |
Key disclosure laws don't apply
-_people_who_know_how_to_access_a_system_may_be_ordered_to_share_their_knowledge_stronghowever_t_KEY: |
+_people_who_know_how_to_access_a_system_may_be_ordered_to_share_their_knowledge_stronghowever_this_doesnt_apply_to_the_suspect_itself_or_family__KEY: |
* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)
httpsen.wikipedia.orgwikiKey_disclosure_law_KEY: |
@@ -2489,7 +2547,7 @@ httpsen.wikipedia.orgwikiKey_disclosure_law_KEY: |
Wikipedia_page_on_key_disclosure_law_KEY: |
Wikipedia page on key disclosure law
-httpslaw.stackexchange.comquestions1523canauscitizenberequiredtoprovidetheauthenticati_KEY: |
+httpslaw.stackexchange.comquestions1523canauscitizenberequiredtoprovidetheauthenticationkeyforencrypteddat_KEY: |
https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat
law.stackexchange.com_question_about_key_disclosure_law_in_US_KEY: |
@@ -2507,13 +2565,13 @@ Why_is_it_not_recommended_to_choose_a_USbased_service?_KEY: |
USA_KEY: |
USA
-Services_based_in_the_United_States_are_not_recommended_because_of_the_countrys_surveillance_program_KEY: |
+Services_based_in_the_United_States_are_not_recommended_because_of_the_countrys_surveillance_programs_and_use_of_a_hrefhttpswww.eff.orgissuesn_KEY: |
Services based in the United States are not recommended because of the country's surveillance programs and use of National Security Letters (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
-An_example_of_this_is_a_hrefhttpsen.wikipedia.orgwikiLavabitSuspension_and_gag_orderLavabi_KEY: |
+An_example_of_this_is_a_hrefhttpsen.wikipedia.orgwikiLavabitSuspension_and_gag_orderLavabita__a_secure_email_service_created_by_Ladar_Le_KEY: |
An example of this is Lavabit – a secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
-Ultimately_Levison_turned_over_the_SSL_keys_and_a_hrefhttpswww.theguardian.comcommentisfree2_KEY: |
+Ultimately_Levison_turned_over_the_SSL_keys_and_a_hrefhttpswww.theguardian.comcommentisfree2014may20whydidlavabitshutdownsnowdenemail_KEY: |
Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order.
httpswww.bestvpn.comtheultimateprivacyguideavoidus_KEY: |
@@ -2552,7 +2610,7 @@ Wikipedia_Portal_Mass_surveillance_KEY: |
Recommended_VPN_Service_KEY: |
Recommended VPN Service
-Our_recommended_provider_is_outside_the_US_uses_encryption_accepts_Bitcoin_supports_OpenVPN_and_h_KEY: |
+Our_recommended_provider_is_outside_the_US_uses_encryption_accepts_Bitcoin_supports_OpenVPN_and_has_a_no_logging_policy._a_hrefcriteriaRead_o_KEY: |
Our recommended provider is outside the US, uses encryption, accepts Bitcoin, supports OpenVPN, and has a no logging policy. Read our full list of criteria for more information.
Mullvad_KEY: |
@@ -2564,52 +2622,52 @@ EUR_KEY: |
60Year_KEY: |
€60/Year
-strongMullvadstrong_is_a_fast_and_inexpensive_VPN_with_a_serious_focus_on_transparency_and_secur_KEY: |
+strongMullvadstrong_is_a_fast_and_inexpensive_VPN_with_a_serious_focus_on_transparency_and_security._They_have_been_in_operation_since_strong200_KEY: |
Mullvad is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since 2009. It is the only VPN provider that currently meets our criteria for recommendation. Mullvad is based in Sweden and does not have a free trial. Visit mullvad.net to create an account.
406_Servers_KEY: |
406+ Servers
-Mullvad_has_409_servers_in_39_countries_at_the_time_of_writing_this_page._Typically_the_more_servers__KEY: |
+Mullvad_has_409_servers_in_39_countries_at_the_time_of_writing_this_page._Typically_the_more_servers_a_provider_offers_the_better_With_hundreds_of_se_KEY: |
Mullvad has 409 servers in 39 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.
WireGuard_Support_KEY: |
WireGuard Support
-In_addition_to_standard_OpenVPN_connections_Mullvad_supports_WireGuard._WireGuard_is_an_experimental_KEY: |
+In_addition_to_standard_OpenVPN_connections_Mullvad_supports_WireGuard._WireGuard_is_an_experimental_protocol_with_theoretically_better_security_and_h_KEY: |
In addition to standard OpenVPN connections, Mullvad supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
Independently_Audited_KEY: |
Independently Audited
-Mullvads_VPN_clients_have_been_audited_by_Cure53_and_Assured_AB_in_a_pentest_report_a_hrefhttps_KEY: |
+Mullvads_VPN_clients_have_been_audited_by_Cure53_and_Assured_AB_in_a_pentest_report_a_hrefhttpscure53.depentestreport_mullvad_v2.pdfpublishe_KEY: |
Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest report published at cure53.de.
The_security_researchers_concluded_KEY: |
The security researchers concluded:
-...Cure53_and_Assured_AB_are_happy_with_the_results_of_the_audit_and_the_software_leaves_an_overall_p_KEY: |
+...Cure53_and_Assured_AB_are_happy_with_the_results_of_the_audit_and_the_software_leaves_an_overall_positive_impression._With_security_dedication_of_th_KEY: |
...Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint.
Accepts_Bitcoin_KEY: |
Accepts Bitcoin
-Mullvad_in_addition_to_accepting_creditdebit_cards_and_PayPal_accepts_strongBitcoinstrong_st_KEY: |
+Mullvad_in_addition_to_accepting_creditdebit_cards_and_PayPal_accepts_strongBitcoinstrong_strongBitcoin_Cashstrong_and_strongcashlocal_KEY: |
Mullvad in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, and cash/local currency as anonymous forms of payment. They also accept Swish and bank wire transfers.
No_Mobile_Clients_KEY: |
No Mobile Clients
-While_iOS_and_Android_clients_are_reportedly_in_the_works_mobile_users_will_need_to_use_a_traditiona_KEY: |
+While_iOS_and_Android_clients_are_reportedly_in_the_works_mobile_users_will_need_to_use_a_traditional_OpenVPN_client_and_configuration_files_which_ar_KEY: |
While iOS and Android clients are reportedly in the works, mobile users will need to use a traditional OpenVPN client and configuration files, which are a bit more difficult to configure.
Extra_Functionality_KEY: |
Extra Functionality
-The_Mullvad_VPN_clients_have_a_builtin_killswitch_to_block_internet_connections_outside_of_the_VPN.__KEY: |
+The_Mullvad_VPN_clients_have_a_builtin_killswitch_to_block_internet_connections_outside_of_the_VPN._They_also_are_able_to_automatically_start_on_boot._KEY: |
The Mullvad VPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. The Mullvad website is also accessible via Tor at xcln5hkbriyklr6n.onion.
-Note_Using_a_VPN_provider_will_not_make_you_anonymous_but_it_will_give_you_better_privacy_in_certai_KEY: |
+Note_Using_a_VPN_provider_will_not_make_you_anonymous_but_it_will_give_you_better_privacy_in_certain_situations._A_VPN_is_not_a_tool_for_illegal_acti_KEY: |
Note: Using a VPN provider will not make you anonymous, but it will give you better privacy in certain situations. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.
Other_Providers_Worth_Mentioning_KEY: |
@@ -2624,40 +2682,40 @@ USD_KEY: |
96year_KEY: |
$96/year
-strongProtonVPNstrong_is_a_strong_contender_in_the_VPN_space_and_they_have_been_in_operation_si_KEY: |
+strongProtonVPNstrong_is_a_strong_contender_in_the_VPN_space_and_they_have_been_in_operation_since_strong2016strong._ProtonVPN_is_based_in__KEY: |
ProtonVPN is a strong contender in the VPN space, and they have been in operation since 2016. ProtonVPN is based in Switzerland and offers a limited free pricing tier, as well as premium options. Unfortunately due to its lack of an independent security audit it does not meet the complete criteria for recommendation, see our notes below.
Not_Audited_KEY: |
Not Audited
-ProtonVPN_has_not_undergone_a_security_audit_by_an_independent_third_party_and_therefore_cannot_be_s_KEY: |
+ProtonVPN_has_not_undergone_a_security_audit_by_an_independent_third_party_and_therefore_cannot_be_strongly_recommended_at_this_time._We_have_still_ch_KEY: |
ProtonVPN has not undergone a security audit by an independent third party, and therefore cannot be strongly recommended at this time. We have still chosen to list it on this page with the assumption that an audit will be published soon
-We_are_currently_undergoing_a_complete_security_audit_of_our_VPN_applications_by_a_reputable_Swiss_se_KEY: |
+We_are_currently_undergoing_a_complete_security_audit_of_our_VPN_applications_by_a_reputable_Swiss_security_company._The_results_of_the_audit_will_be_s_KEY: |
We are currently undergoing a complete security audit of our VPN applications by a reputable Swiss security company. The results of the audit will be summarized in a public report for cases like this.
Marc_Loebekken_ProtonVPN_AG_Legal_counsel_KEY: |
Marc Loebekken, ProtonVPN AG Legal counsel
-We_will_reevaluate_this_listing_at_the_end_of_2019_or_when_the_aforementioned_report_has_been_publish_KEY: |
+We_will_reevaluate_this_listing_at_the_end_of_2019_or_when_the_aforementioned_report_has_been_published_whichever_is_sooner._KEY: |
We will reevaluate this listing at the end of 2019 or when the aforementioned report has been published, whichever is sooner.
526_Servers_KEY: |
526+ Servers
-ProtonVPN_has_526_servers_in_42_countries_at_the_time_of_writing_this_page._Typically_the_more_server_KEY: |
+ProtonVPN_has_526_servers_in_42_countries_at_the_time_of_writing_this_page._Typically_the_more_servers_a_provider_offers_the_better_With_hundreds_of__KEY: |
ProtonVPN has 526 servers in 42 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.
-ProtonVPN_does_technically_accept_Bitcoin_payments_however_you_either_need_to_have_an_existing_acco_KEY: |
+ProtonVPN_does_technically_accept_Bitcoin_payments_however_you_either_need_to_have_an_existing_account_or_contact_their_support_team_in_advance_to_r_KEY: |
ProtonVPN does technically accept Bitcoin payments; however, you either need to have an existing account, or contact their support team in advance to register with Bitcoin.
Mobile_Clients_KEY: |
Mobile Clients
-In_addition_to_providing_standard_OpenVPN_configuration_files_ProtonVPN_has_mobile_clients_for_iOS_o_KEY: |
+In_addition_to_providing_standard_OpenVPN_configuration_files_ProtonVPN_has_mobile_clients_for_iOS_or_Android_allowing_for_easy_connections_to_their_s_KEY: |
In addition to providing standard OpenVPN configuration files, ProtonVPN has mobile clients for iOS or Android allowing for easy connections to their servers.
-The_ProtonVPN_clients_have_a_builtin_killswitch_to_block_internet_connections_outside_of_the_VPN._Th_KEY: |
+The_ProtonVPN_clients_have_a_builtin_killswitch_to_block_internet_connections_outside_of_the_VPN._They_also_are_able_to_automatically_start_on_boot._P_KEY: |
The ProtonVPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. ProtonVPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using the official Tor Browser for this purpose.
IVPN_KEY: |
@@ -2666,28 +2724,28 @@ IVPN_KEY: |
100Year_KEY: |
$100/Year
-strongIVPNstrong_is_another_strong_premium_VPN_provider_and_they_have_been_in_operation_since__KEY: |
+strongIVPNstrong_is_another_strong_premium_VPN_provider_and_they_have_been_in_operation_since_strong2009strong._IVPN_is_based_in_span_class_KEY: |
IVPN is another strong premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar and offers a 3 day free trial. Unfortunately, due to its lack of an independent security audit, it does not meet the complete criteria for recommendation, see our notes below.
No_Security_Audit_KEY: |
No Security Audit
-IVPN_has_undergone_a_a_hrefhttpscure53.deauditreport_ivpn.pdfnologging_audit_from_Cure53_KEY: |
+IVPN_has_undergone_a_a_hrefhttpscure53.deauditreport_ivpn.pdfnologging_audit_from_Cure53a_which_concluded_in_agreement_with_IVPNs_nolog_KEY: |
IVPN has undergone a no-logging audit from Cure53 which concluded in agreement with IVPN's no-logging claim. However, IVPN has not undergone a more comprehensive security audit by an independent third party, and therefore cannot be strongly recommended at this time. We have still chosen to list it on this page with the assumption that an audit will be published soon: The IVPN team reportedly plans to begin the process in September.
77_Servers_KEY: |
77+ Servers
-IVPN_has_77_servers_in_31_countries_at_the_time_of_writing_this_page._Typically_the_more_servers_a_pr_KEY: |
+IVPN_has_77_servers_in_31_countries_at_the_time_of_writing_this_page._Typically_the_more_servers_a_provider_offers_the_better._IVPN_has_a_decent_but__KEY: |
IVPN has 77 servers in 31 countries at the time of writing this page. Typically the more servers a provider offers, the better. IVPN has a decent (but not exceptional) server count that will most likely provide adequate coverage to most users.
-In_addition_to_accepting_creditdebit_cards_and_PayPal_IVPN_accepts_strongBitcoinstrong_and_st_KEY: |
+In_addition_to_accepting_creditdebit_cards_and_PayPal_IVPN_accepts_strongBitcoinstrong_and_strongcashlocal_currencystrong_on_annual_plans_KEY: |
In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin and cash/local currency (on annual plans) as anonymous forms of payment.
-In_addition_to_providing_standard_OpenVPN_configuration_files_IVPN_has_mobile_clients_for_iOS_or_And_KEY: |
+In_addition_to_providing_standard_OpenVPN_configuration_files_IVPN_has_mobile_clients_for_iOS_or_Android_allowing_for_easy_connections_to_their_server_KEY: |
In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for iOS or Android allowing for easy connections to their servers.
-The_IVPN_clients_have_a_builtin_killswitch_to_block_internet_connections_outside_of_the_VPN._They_al_KEY: |
+The_IVPN_clients_have_a_builtin_killswitch_to_block_internet_connections_outside_of_the_VPN._They_also_are_able_to_automatically_start_on_boot._IVPN_a_KEY: |
The IVPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. IVPN also provides "AntiTracker" functionality, which blocks advertising networks and trackers from the network level.
What_is_a_warrant_canary?_KEY: |
@@ -2696,7 +2754,7 @@ What_is_a_warrant_canary?_KEY: |
Warrant_Canary_Example_KEY: |
Warrant Canary Example
-A_warrant_canary_is_a_posted_document_stating_that_an_organization_has_not_received_any_secret_subpoe_KEY: |
+A_warrant_canary_is_a_posted_document_stating_that_an_organization_has_not_received_any_secret_subpoenas_during_a_specific_period_of_time._If_this_docu_KEY: |
A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.
Warrant_Canary_Examples_KEY: |
@@ -2747,13 +2805,13 @@ httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: |
PrivacyRespecting_Search_Engines_KEY: |
Privacy-Respecting Search Engines
-If_you_are_currently_using_search_engines_like_Google_Bing_or_Yahoo_you_should_pick_an_alternative_KEY: |
+If_you_are_currently_using_search_engines_like_Google_Bing_or_Yahoo_you_should_pick_an_alternative_here._KEY: |
If you are currently using search engines like Google, Bing, or Yahoo, you should pick an alternative here.
searx__Decentral_KEY: |
searx - Decentral
-searx_is_an_a_hrefhttpsgithub.comasciimoosearxopensourcea_metasearch_engine_aggregatin_KEY: |
+searx_is_an_a_hrefhttpsgithub.comasciimoosearxopensourcea_metasearch_engine_aggregating_the_results_of_other_search_engines_while_not_st_KEY: |
searx is an open-source metasearch engine, aggregating the results of other search engines while not storing information about its users. No logs, no ads and no tracking. There is a list of public instances, or you can try the PrivacyTools Search
httpssearx.me_KEY: |
@@ -2765,7 +2823,7 @@ httpsgithub.comasciimoosearx_KEY: |
DuckDuckGo__USA_KEY: |
DuckDuckGo - USA
-DuckDuckGo_is_a_search_engine_that_doesnt_track_you._Some_of_DuckDuckGos_code_is_free_software_ho_KEY: |
+DuckDuckGo_is_a_search_engine_that_doesnt_track_you._Some_of_DuckDuckGos_code_is_free_software_hosted_at_GitHub_but_the_core_is_proprietary._span_KEY: |
DuckDuckGo is a "search engine that doesn't track you." Some of DuckDuckGo's code is free software hosted at GitHub, but the core is proprietary. The company is based in the USA.
httpsduckduckgo.com_KEY: |
@@ -2777,7 +2835,7 @@ httpsgithub.comduckduckgo_KEY: |
Qwant__France_KEY: |
Qwant - France
-Qwant_is_a_search_engine_with_its_philosophy_based_on_two_principles_no_user_tracking_and_no_filter__KEY: |
+Qwant_is_a_search_engine_with_its_philosophy_based_on_two_principles_no_user_tracking_and_no_filter_bubble._Qwant_was_launched_in_France_in_February_2_KEY: |
Qwant is a search engine with its philosophy based on two principles: no user tracking and no filter bubble. Qwant was launched in France in February 2013.
httpswww.qwant.com_KEY: |
@@ -2795,7 +2853,7 @@ httpsaddons.mozilla.orgfirefoxaddongooglesearchlinkfix_KEY: |
Google_search_link_fix_KEY: |
Google search link fix
-Firefox_extension_that_prevents_Google_and_Yandex_search_pages_from_modifying_search_result_links_whe_KEY: |
+Firefox_extension_that_prevents_Google_and_Yandex_search_pages_from_modifying_search_result_links_when_you_click_them._This_is_useful_when_copying_link_KEY: |
Firefox extension that prevents Google and Yandex search pages from modifying search result links when you click them. This is useful when copying links but it also helps privacy by preventing the search engines from recording your clicks.
Open_Source_KEY: |
@@ -2828,7 +2886,7 @@ httpsmetager.deen_KEY: |
MetaGer_KEY: |
MetaGer
-An_opensource_metasearch_engine_which_is_based_in_Germany._It_focuses_on_protecting_the_users_priv_KEY: |
+An_opensource_metasearch_engine_which_is_based_in_Germany._It_focuses_on_protecting_the_users_privacy._KEY: |
An open-source metasearch engine, which is based in Germany. It focuses on protecting the user's privacy.
httpswww.mojeek.com_KEY: |
@@ -2843,7 +2901,7 @@ Independent_and_unbiased_search_results_with_no_user_tracking._KEY: |
Signal_KEY: |
Signal
-Signal_is_a_mobile_app_developed_by_Open_Whisper_Systems._The_app_provides_instant_messaging_as_well_KEY: |
+Signal_is_a_mobile_app_developed_by_Open_Whisper_Systems._The_app_provides_instant_messaging_as_well_as_voice_and_video_calling._All_communications_ar_KEY: |
Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging, as well as voice and video calling. All communications are end-to-end encrypted. Signal is free and open source.
VoIP_KEY: |
@@ -2870,13 +2928,13 @@ httpsgithub.comsignalapp_KEY: |
Wire_KEY: |
Wire
-Wire_is_a_free_and_endtoend_encrypted_chatting_application_that_supports_instant_messaging_voice__KEY: |
+Wire_is_a_free_and_endtoend_encrypted_chatting_application_that_supports_instant_messaging_voice_and_video_calls._Full_source_code_is_available._KEY: |
Wire is a free and end-to-end encrypted chatting application that supports instant messaging, voice, and video calls. Full source code is available.
-Wire_stores_some_plaintext_metadata_about_its_users_on_their_servers._This_data_includes_profile_name_KEY: |
+Wire_stores_some_plaintext_metadata_about_its_users_on_their_servers._This_data_includes_profile_names_profile_pictures_usernames_and_users_lists_o_KEY: |
Wire stores some plaintext metadata about its users on their servers. This data includes profile names, profile pictures, usernames, and users' lists of connections and conversations.
-a_hrefwww.vice.comen_usarticlegvzw5xsecuremessagingappwirestoreseveryoneyouveevercont_KEY: |
+a_hrefwww.vice.comen_usarticlegvzw5xsecuremessagingappwirestoreseveryoneyouveevercontactedinplaintextWarninga_KEY: |
Warning
httpswire.com_KEY: |
@@ -2900,7 +2958,7 @@ httpsgithub.comwireapp_KEY: |
Linphone_KEY: |
Linphone
-Linphone_is_an_opensource_SIP_Phone_and_a_free_voice_over_IP_service_available_on_mobile_and_deskto_KEY: |
+Linphone_is_an_opensource_SIP_Phone_and_a_free_voice_over_IP_service_available_on_mobile_and_desktop_environments_and_on_web_browsers._It_supports_ZR_KEY: |
Linphone is an open-source SIP Phone and a free voice over IP service, available on mobile and desktop environments and on web browsers. It supports ZRTP for end-to-end encrypted voice and video communication.
httpswww.linphone.org_KEY: |
@@ -2930,7 +2988,7 @@ httpsgithub.comBelledonneCommunications_KEY: |
Mumble_KEY: |
Mumble
-Mumble_is_an_opensource_lowlatency_and_high_quality_voice_chat_application_primarily_intended_for_KEY: |
+Mumble_is_an_opensource_lowlatency_and_high_quality_voice_chat_application_primarily_intended_for_use_while_gaming._Note_that_while_Mumble_doesnt__KEY: |
Mumble is an open-source, low-latency, and high quality voice chat application primarily intended for use while gaming. Note that while Mumble doesn't log messages or record by default, it's missing end-to-end encryption, so self-hosting is recommended.
httpsmumble.info_KEY: |
@@ -2951,10 +3009,10 @@ httpsgithub.commumblevoip_KEY: |
Riot.im_Matrix_KEY: |
Riot.im (Matrix)
-Riot.im_is_a_federated_freesoftware_messaging_application_based_on_the_a_hrefhttpsmatrix.org_KEY: |
+Riot.im_is_a_federated_freesoftware_messaging_application_based_on_the_a_hrefhttpsmatrix.orgMatrixa_protocol_a_recent_open_protocol_for_re_KEY: |
Riot.im is a federated free-software messaging application based on the Matrix protocol, a recent open protocol for real-time communication offering optional E2E encryption. It also has bridging functionality, allowing you to connect to other chat protocols such as IRC or Telegram.
-The_endtoend_encryption_is_currently_in_beta_and_the_mobile_client_states_Endtoend_encryption_i_KEY: |
+The_endtoend_encryption_is_currently_in_beta_and_the_mobile_client_states_Endtoend_encryption_is_in_beta_and_may_not_be_reliable._You_should_not__KEY: |
The end-to-end encryption is currently in beta, and the mobile client states 'End-to-end encryption is in beta and may not be reliable. You should not yet trust it to secure data.'
a_hrefgithub.comvectorimriotwebissues6779Experimental_E2EEa_KEY: |
@@ -2984,10 +3042,10 @@ httpsgithub.comvectorimriotweb_KEY: |
Rocket.chat_KEY: |
Rocket.chat
-Rocket.chat_is_an_selfhostable_open_source_platform_for_team_communication._It_has_optional_federati_KEY: |
+Rocket.chat_is_an_selfhostable_open_source_platform_for_team_communication._It_has_optional_federation_and_experimental_E2EE._KEY: |
Rocket.chat is an self-hostable open source platform for team communication. It has optional federation and experimental E2EE.
-Regarding_E2EE_their_documentation_states_This_feature_is_currently_in_alpha._Its_also_not_yet_supp_KEY: |
+Regarding_E2EE_their_documentation_states_This_feature_is_currently_in_alpha._Its_also_not_yet_supported_on_mobile._There_is_no_forward_secrecy_so_c_KEY: |
Regarding E2EE their documentation states 'This feature is currently in alpha. It's also not yet supported on mobile'. There is no forward secrecy so compromised decryption password would leak all messages. Federation was also added afterwards, potentially causing room for mistakes.
a_hrefrocket.chatdocsuserguidesendtoendencryptionExperimental_E2EEa_KEY: |
@@ -3017,7 +3075,7 @@ httpsgithub.comrocketchat_KEY: |
Keybase_KEY: |
Keybase
-Keybase_provides_a_hosted_team_chat_with_endtoend_encryption._It_has_also_been_a_hrefhttpskey_KEY: |
+Keybase_provides_a_hosted_team_chat_with_endtoend_encryption._It_has_also_been_a_hrefhttpskeybase.iodocsassetsblogNCC_Group_Keybase_KB2018__KEY: |
Keybase provides a hosted team chat with end-to-end encryption. It has also been indepedently audited (PDF).
The_server_side_of_Keybase_runs_on_proprietary_code_and_is_centralized._KEY: |
@@ -3062,13 +3120,13 @@ httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend_KEY: |
Encrypted_Cloud_Storage_Services_KEY: |
Encrypted Cloud Storage Services
-If_you_are_currently_using_Dropbox_Google_Drive_Microsoft_OneDrive_or_Apple_iCloud_you_should_pick_KEY: |
+If_you_are_currently_using_Dropbox_Google_Drive_Microsoft_OneDrive_or_Apple_iCloud_you_should_pick_an_alternative_here._KEY: |
If you are currently using Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should pick an alternative here.
Nextcloud__Choose_your_hoster_KEY: |
Nextcloud - Choose your hoster
-Nextcloud_is_similar_in_functionality_to_the_widelyused_Dropbox_with_the_difference_being_that_Next_KEY: |
+Nextcloud_is_similar_in_functionality_to_the_widelyused_Dropbox_with_the_difference_being_that_Nextcloud_is_free_and_opensource_thereby_allowing_an_KEY: |
Nextcloud is similar in functionality to the widely-used Dropbox, with the difference being that Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server, with no limits on storage space or the number of connected clients.
httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
@@ -3083,7 +3141,7 @@ httpscryptomator.org_KEY: |
Cryptomator_KEY: |
Cryptomator
-Free_clientside_AES_encryption_for_your_cloud_files._Open_source_software_No_backdoors_no_registra_KEY: |
+Free_clientside_AES_encryption_for_your_cloud_files._Open_source_software_No_backdoors_no_registration._KEY: |
Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
Cryptomators_mobile_apps_are_not_opensource._KEY: |
@@ -3113,7 +3171,7 @@ httpsgithub.comsyncthing?typesource_KEY: |
Bitwarden__CloudSelfhost_KEY: |
Bitwarden - Cloud/Self-host
-strongBitwardenstrong_is_a_free_and_opensource_password_manager._It_aims_to_solve_password_mana_KEY: |
+strongBitwardenstrong_is_a_free_and_opensource_password_manager._It_aims_to_solve_password_management_problems_for_individuals_teams_and_busine_KEY: |
Bitwarden is a free and open-source password manager. It aims to solve password management problems for individuals, teams, and business organizations. Bitwarden is among the easiest and safest solutions to store all of your logins and passwords while conveniently keeping them synced between all of your devices. If you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden server.
httpsbitwarden.com_KEY: |
@@ -3158,7 +3216,7 @@ httpsgithub.combitwarden_KEY: |
KeePassXC__Local_KEY: |
KeePassXC - Local
-strongKeePassXCstrong_is_a_community_fork_of_KeePassX_a_native_crossplatform_port_of_KeePass_P_KEY: |
+strongKeePassXCstrong_is_a_community_fork_of_KeePassX_a_native_crossplatform_port_of_KeePass_Password_Safe_with_the_goal_to_extend_and_improve__KEY: |
KeePassXC is a community fork of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal to extend and improve it with new features and bugfixes to provide a feature-rich, fully cross-platform and modern open-source password manager.
httpskeepassxc.org_KEY: |
@@ -3200,7 +3258,7 @@ httpsgithub.comkeepassxrebootkeepassxc_KEY: |
LessPass__Browser_KEY: |
LessPass - Browser
-strongLessPassstrong_is_a_free_and_opensource_password_manager_that_generates_unique_passwords__KEY: |
+strongLessPassstrong_is_a_free_and_opensource_password_manager_that_generates_unique_passwords_for_websites_email_accounts_or_anything_else_bas_KEY: |
LessPass is a free and open-source password manager that generates unique passwords for websites, email accounts, or anything else based on a master password and information you know. No sync needed. Uses PBKDF2 and SHA-256. It's advised to use the browser addons for more security.
httpslesspass.com_KEY: |
@@ -3242,13 +3300,13 @@ httpsplay.google.comstoreappsdetails?idnet.i2p.android_KEY: |
Decentralized_Social_Networks_KEY: |
Decentralized Social Networks
-If_you_are_currently_using_Social_Networks_like_Facebook_or_Twitter_you_should_pick_an_alternative_h_KEY: |
+If_you_are_currently_using_Social_Networks_like_Facebook_or_Twitter_you_should_pick_an_alternative_here._KEY: |
If you are currently using Social Networks like Facebook or Twitter, you should pick an alternative here.
Mastodon__Twitter_Alternative_KEY: |
Mastodon - Twitter Alternative
-Mastodon_is_a_social_network_based_on_open_web_protocols_and_free_opensource_software._It_is_decent_KEY: |
+Mastodon_is_a_social_network_based_on_open_web_protocols_and_free_opensource_software._It_is_decentralized_like_email._It_also_has_the_most_users_an_KEY: |
Mastodon is a social network based on open web protocols and free, open-source software. It is decentralized like email. It also has the most users, and the most diverse (in terms of interests) users; looks good; and is easy to setup. Feel welcome to join our hosted instance: social.privacytools.io
httpsjoinmastodon.org_KEY: |
@@ -3266,7 +3324,7 @@ httpsgithub.comtootsuitemastodon_KEY: |
diaspora__Google_Alternative_KEY: |
diaspora* - Google+ Alternative
-diaspora_is_based_on_three_key_philosophies_Decentralization_freedom_and_privacy._It_is_intended_t_KEY: |
+diaspora_is_based_on_three_key_philosophies_Decentralization_freedom_and_privacy._It_is_intended_to_address_privacy_concerns_related_to_centralized__KEY: |
diaspora* is based on three key philosophies: Decentralization, freedom and privacy. It is intended to address privacy concerns related to centralized social networks by allowing users set up their own server (or "pod") to host content; pods can then interact to share status updates, photographs, and other social data.
httpsdiasporafoundation.org_KEY: |
@@ -3281,7 +3339,7 @@ httpsgithub.comdiasporadiaspora_KEY: |
Friendica__Facebook_Alternative_KEY: |
Friendica - Facebook Alternative
-Friendica_has_an_emphasis_on_extensive_privacy_settings_and_easy_server_installation._It_aims_to_fede_KEY: |
+Friendica_has_an_emphasis_on_extensive_privacy_settings_and_easy_server_installation._It_aims_to_federate_with_as_many_other_social_networks_as_possibl_KEY: |
Friendica has an emphasis on extensive privacy settings and easy server installation. It aims to federate with as many other social networks as possible. Currently, Friendica users can integrate contacts from Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io and other services in their social streams.
httpsfriendi.ca_KEY: |
@@ -3296,7 +3354,7 @@ httpsgithub.comfriendicafriendica_KEY: |
PixelFed__Instagram_Alternative_KEY: |
PixelFed - Instagram Alternative
-PixelFed_is_a_free_and_ethical_photo_sharing_platform_powered_by_ActivityPub_federation._Pixelfed_is_KEY: |
+PixelFed_is_a_free_and_ethical_photo_sharing_platform_powered_by_ActivityPub_federation._Pixelfed_is_an_opensource_federated_platform._You_can_run_y_KEY: |
PixelFed is a free and ethical photo sharing platform, powered by ActivityPub federation. Pixelfed is an open-source, federated platform. You can run your own instance or join one.
httpspixelfed.org_KEY: |
@@ -3308,7 +3366,7 @@ httpsgithub.compixelfed_KEY: |
GNU_social__Twitter_Alternative_KEY: |
GNU social - Twitter Alternative
-GNU_social_is_socialcommunication_software_for_both_public_and_private_communications._It_is_widely__KEY: |
+GNU_social_is_socialcommunication_software_for_both_public_and_private_communications._It_is_widely_supported_and_has_a_large_userbase._It_is_already__KEY: |
GNU social is social-communication software for both public and private communications. It is widely supported and has a large userbase. It is already used by the Free Software Foundation.
httpsgnu.iosocial_KEY: |
@@ -3323,7 +3381,7 @@ httpswww.minds.com_KEY: |
Minds_KEY: |
Minds
-An_a_hrefhttpsgitlab.commindsopensourcea_and_distributed_social_networking_service_inte_KEY: |
+An_a_hrefhttpsgitlab.commindsopensourcea_and_distributed_social_networking_service_integrating_the_blockchain_to_reward_the_community._KEY: |
An open-source and distributed social networking service, integrating the blockchain to reward the community.
httpsmovim.eu_KEY: |
@@ -3332,7 +3390,7 @@ httpsmovim.eu_KEY: |
Movim_KEY: |
Movim
-A_federated_social_platform_that_relies_on_the_XMPP_standard_and_therefore_allows_you_to_exchange_wit_KEY: |
+A_federated_social_platform_that_relies_on_the_XMPP_standard_and_therefore_allows_you_to_exchange_with_many_other_clients_on_all_devices._KEY: |
A federated social platform that relies on the XMPP standard and therefore allows you to exchange with many other clients on all devices.
httpsaddons.mozilla.orgfirefoxaddonmastodonsimplifiedfederation_KEY: |
@@ -3359,7 +3417,7 @@ httpsforget.codl.fr_KEY: |
Forget_KEY: |
Forget
-A_service_that_automatically_deletes_your_old_posts_on_Twitter_and_Mastodon_that_everyone_has_forgott_KEY: |
+A_service_that_automatically_deletes_your_old_posts_on_Twitter_and_Mastodon_that_everyone_has_forgotten_about._KEY: |
A service that automatically deletes your old posts on Twitter and Mastodon that everyone has forgotten about.
Facebook_Related_KEY: |
@@ -3407,7 +3465,7 @@ If_you_are_currently_using_a_online_bulletin_board_like_Reddit_you_should_pick_a
Aether_KEY: |
Aether
-a_hrefhttpsgithub.comnehbitaetherblobmasterLICENSE.mdAether_is_a_free_and_opensourcea_KEY: |
+a_hrefhttpsgithub.comnehbitaetherblobmasterLICENSE.mdAether_is_a_free_and_opensourcea_decentralized_social_news_aggregator_with_a_buil_KEY: |
Aether is a free and open-source decentralized social news aggregator with a built-in voting system.
httpsgetaether.net_KEY: |
@@ -3422,7 +3480,7 @@ httpsgithub.comnehbitaether_KEY: |
Tildes_KEY: |
Tildes
-Tildes_is_a_webbased_selfhostable_online_bulletin_board._It_is_licensed_under_a_hrefhttpsgitl_KEY: |
+Tildes_is_a_webbased_selfhostable_online_bulletin_board._It_is_licensed_under_a_hrefhttpsgitlab.comtildestildesblobmasterLICENSEGPL_3.0_KEY: |
Tildes is a web-based self-hostable online bulletin board. It is licensed under GPL 3.0.
httpstildes.net_KEY: |
@@ -3449,7 +3507,7 @@ httpsbeta.akasha.world_KEY: |
Akasha_KEY: |
Akasha
-A_decentralized_online_bulletin_board_using_a_hrefhttpswww.wikipedia.orgwikiInterPlanetary_Fi_KEY: |
+A_decentralized_online_bulletin_board_using_a_hrefhttpswww.wikipedia.orgwikiInterPlanetary_File_SystemIPFSa_and_a_hrefhttpswww.wikip_KEY: |
A decentralized online bulletin board using IPFS and Ethereum.
httpsdev.lemmy.ml_KEY: |
@@ -3458,7 +3516,7 @@ httpsdev.lemmy.ml_KEY: |
Lemmy_KEY: |
Lemmy
-An_a_hrefhttpsgithub.comdessalineslemmyblobmasterLICENSEAGPLalicensed_selfhostable__KEY: |
+An_a_hrefhttpsgithub.comdessalineslemmyblobmasterLICENSEAGPLalicensed_selfhostable_link_aggregator_intended_to_work_in_the_a_hrefh_KEY: |
An AGPL-licensed self-hostable link aggregator intended to work in the Fediverse.
httpsnotabug.io_KEY: |
@@ -3467,7 +3525,7 @@ httpsnotabug.io_KEY: |
notabug.io_KEY: |
notabug.io
-A_a_hrefhttpsgithub.comnotabugionotabugblobmasterLICENSE.mdfree_and_opensourcea_P2P__KEY: |
+A_a_hrefhttpsgithub.comnotabugionotabugblobmasterLICENSE.mdfree_and_opensourcea_P2P_link_aggregator_with_a_strong_resemblance_to_old.r_KEY: |
A free and open-source P2P link aggregator with a strong resemblance to old.reddit.com (not to be confused with NotABug.org).
httpsbugzilla.mozilla.orgshow_bug.cgi?id1500289_KEY: |
@@ -3488,7 +3546,7 @@ Pastebin_Services_KEY: |
PrivateBin_KEY: |
PrivateBin
-PrivateBin_is_a_minimalist_opensource_online_pastebin_where_the_server_has_zero_knowledge_of_pasted_KEY: |
+PrivateBin_is_a_minimalist_opensource_online_pastebin_where_the_server_has_zero_knowledge_of_pasted_data._Data_is_encrypteddecrypted_in_the_browser__KEY: |
PrivateBin is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin.
httpsprivatebin.info_KEY: |
@@ -3497,7 +3555,7 @@ httpsprivatebin.info_KEY: |
httpsgithub.comPrivateBinPrivateBin_KEY: |
https://github.com/PrivateBin/PrivateBin
-CryptPad_is_an_opensource_zero_knowledge_and_realtime_collaborative_editor._Data_is_encrypteddec_KEY: |
+CryptPad_is_an_opensource_zero_knowledge_and_realtime_collaborative_editor._Data_is_encrypteddecrypted_in_the_browser_using_Salsa20_with_Poly1305_KEY: |
CryptPad is an open-source, zero knowledge, and real-time collaborative editor. Data is encrypted/decrypted in the browser, using Salsa20 with Poly1305 to encrypt pads.
httpscryptpad.frpad_KEY: |
@@ -3506,13 +3564,13 @@ httpscryptpad.frpad_KEY: |
httpsgithub.comxwikilabscryptpad_KEY: |
https://github.com/xwiki-labs/cryptpad
-strongCryptPadstrong_is_a_privatebydesign_alternative_to_popular_office_tools_and_cloud_servic_KEY: |
+strongCryptPadstrong_is_a_privatebydesign_alternative_to_popular_office_tools_and_cloud_services._All_content_is_endtoend_encrypted._It_is_fre_KEY: |
CryptPad is a private-by-design alternative to popular office tools and cloud services. All content is end-to-end encrypted. It is free and open-source, enabling anyone to verify its security by auditing the code. The development team is supported by donations and grants. No registration is required, and it can be used anonymously via Tor Browser.
Etherpad_KEY: |
Etherpad
-strongEtherpadstrong_is_a_highly_customizable_opensource_online_editor_providing_collaborative__KEY: |
+strongEtherpadstrong_is_a_highly_customizable_opensource_online_editor_providing_collaborative_editing_in_real_time._a_hrefhttpsgithub.come_KEY: |
Etherpad is a highly customizable open-source online editor providing collaborative editing in real time. Here are a list of sites that run Etherpad.
httpsetherpad.org_KEY: |
@@ -3536,7 +3594,7 @@ httpsgithub.cometheretherpadlite_KEY: |
Write.as_KEY: |
Write.as
-strongWrite.asstrong_is_a_crossplatform_privacyoriented_blogging_platform._Its_anonymous_by__KEY: |
+strongWrite.asstrong_is_a_crossplatform_privacyoriented_blogging_platform._Its_anonymous_by_default_letting_you_publish_without_signing_up._I_KEY: |
Write.as is a cross-platform, privacy-oriented blogging platform. It's anonymous by default, letting you publish without signing up. If you create an account, it doesn't require any personal information. No ads, distraction-free, and built on a sustainable business model.
httpswrite.as_KEY: |
@@ -3563,7 +3621,7 @@ httpscode.aswriteas_KEY: |
MAT2_KEY: |
MAT2
-strongMAT2strong_is_free_software_which_allows_the_removal_of_metadata_of_image_audio_torrent_KEY: |
+strongMAT2strong_is_free_software_which_allows_the_removal_of_metadata_of_image_audio_torrent_and_document_file_types._It_provides_both_a_comm_KEY: |
MAT2 is free software, which allows the removal of metadata of image, audio, torrent, and document file types. It provides both a command line tool and a graphical user interface via an extension for Nautilus, the default file manager of GNOME.
https0xacab.orgjvoisinmat2_KEY: |
@@ -3578,7 +3636,7 @@ Qubes_OS_KEY: |
Xen_KEY: |
Xen
-Qubes_is_an_opensource_operating_system_designed_to_provide_strong_security_for_desktop_computing._Q_KEY: |
+Qubes_is_an_opensource_operating_system_designed_to_provide_strong_security_for_desktop_computing._Qubes_is_based_on_Xen_the_X_Window_System_and_Lin_KEY: |
Qubes is an open-source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, the X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers.
This_software_may_depend_on_or_recommend_nonfree_software._KEY: |
@@ -3599,7 +3657,7 @@ Fedora_Workstation_KEY: |
GNULinux_KEY: |
GNU/Linux
-Fedora_is_a_Linux_distribution_developed_by_the_Fedora_Project_and_sponsored_by_Red_Hat._Fedora_Works_KEY: |
+Fedora_is_a_Linux_distribution_developed_by_the_Fedora_Project_and_sponsored_by_Red_Hat._Fedora_Workstation_is_a_secure_reliable_and_userfriendly_ed_KEY: |
Fedora is a Linux distribution developed by the Fedora Project and sponsored by Red Hat. Fedora Workstation is a secure, reliable, and user-friendly edition developed for desktops and laptops, using GNOME as the default desktop environment.
httpsgetfedora.org_KEY: |
@@ -3611,7 +3669,7 @@ httpssrc.fedoraproject.org_KEY: |
Debian_KEY: |
Debian
-Debian_is_a_Unixlike_computer_operating_system_and_a_Linux_distribution_that_is_composed_entirely_of_KEY: |
+Debian_is_a_Unixlike_computer_operating_system_and_a_Linux_distribution_that_is_composed_entirely_of_free_and_opensource_software_most_of_which_is_u_KEY: |
Debian is a Unix-like computer operating system and a Linux distribution that is composed entirely of free and open-source software, most of which is under the GNU General Public License, and packaged by a group of individuals known as the Debian project.
httpswww.debian.org_KEY: |
@@ -3623,7 +3681,7 @@ httpssalsa.debian.orgqadebsources_KEY: |
Tails_KEY: |
Tails
-Tails_is_a_live_operating_system_that_starts_on_almost_any_computer_from_a_DVD_USB_stick_or_SD_card_KEY: |
+Tails_is_a_live_operating_system_that_starts_on_almost_any_computer_from_a_DVD_USB_stick_or_SD_card._It_aims_at_preserving_privacy_and_anonymity_and_KEY: |
Tails is a live operating system that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and circumventing censorship by forcing Internet connections through the Tor network; leaving no trace on the computer; and using state-of-the-art cryptographic tools to encrypt files, emails, and instant messages.
httpstails.boum.org_KEY: |
@@ -3635,7 +3693,7 @@ httpsgittails.immerda.chtails_KEY: |
KNOPPIX_KEY: |
KNOPPIX
-Knoppix_is_an_operating_system_based_on_Debian_designed_to_be_run_directly_from_a_CD__DVD_Live_CD__KEY: |
+Knoppix_is_an_operating_system_based_on_Debian_designed_to_be_run_directly_from_a_CD__DVD_Live_CD_or_a_USB_flash_drive_Live_USB_one_of_the_first__KEY: |
Knoppix is an operating system based on Debian designed to be run directly from a CD / DVD (Live CD) or a USB flash drive (Live USB), one of the first of its kind for any operating system. When starting a program, it is loaded from the removable medium and decompressed into a RAM drive. The decompression is transparent and on-the-fly.
httpswww.knopper.netknoppixindexen.html_KEY: |
@@ -3647,7 +3705,7 @@ httpswww.knopper.netknoppixinfoindexen.htmllicense_KEY: |
Puppy_Linux_KEY: |
Puppy Linux
-Puppy_Linux_operating_system_is_a_lightweight_Linux_distribution_that_focuses_on_ease_of_use_and_mini_KEY: |
+Puppy_Linux_operating_system_is_a_lightweight_Linux_distribution_that_focuses_on_ease_of_use_and_minimal_memory_footprint._The_entire_system_can_be_run_KEY: |
Puppy Linux operating system is a lightweight Linux distribution that focuses on ease of use and minimal memory footprint. The entire system can be run from RAM with current versions generally taking up about 210 MB, allowing the boot medium to be removed after the operating system has started.
httppuppylinux.org_KEY: |
@@ -3662,7 +3720,7 @@ GrapheneOS_KEY: |
AOSP_KEY: |
AOSP
-GrapheneOS_formerly_known_as_CopperheadOS_is_a_free_and_opensource_security_and_privacyfocused_m_KEY: |
+GrapheneOS_formerly_known_as_CopperheadOS_is_a_free_and_opensource_security_and_privacyfocused_mobile_operating_system_built_on_top_of_the_Android_KEY: |
GrapheneOS (formerly known as CopperheadOS) is a free and open-source security- and privacy-focused mobile operating system built on top of the Android Open Source Project. It currently specifically targets devices offering strong hardware security.
httpsgrapheneos.org_KEY: |
@@ -3674,7 +3732,7 @@ httpsgithub.comGrapheneOS_KEY: |
LineageOS_KEY: |
LineageOS
-LineageOS_is_a_free_and_opensource_operating_system_for_smartphones_and_tablets_based_on_the_offici_KEY: |
+LineageOS_is_a_free_and_opensource_operating_system_for_smartphones_and_tablets_based_on_the_official_releases_of_the_Android_Open_Source_Project._It_KEY: |
LineageOS is a free and open-source operating system for smartphones and tablets, based on the official releases of the Android Open Source Project. It is the continuation of the CyanogenMod project.
httpswww.lineageos.org_KEY: |
@@ -3686,7 +3744,7 @@ httpsgithub.comLineageOS_KEY: |
Ubuntu_Touch_KEY: |
Ubuntu Touch
-Ubuntu_Touch_is_a_free_and_opensource_operating_system_for_smartphones_and_tablets._Its_an_alternat_KEY: |
+Ubuntu_Touch_is_a_free_and_opensource_operating_system_for_smartphones_and_tablets._Its_an_alternative_to_the_current_popular_mobile_operating_system_KEY: |
Ubuntu Touch is a free and open-source operating system for smartphones and tablets. It's an alternative to the current popular mobile operating systems on the market. Only a few devices are supported.
httpsubuntutouch.io_KEY: |
@@ -3701,7 +3759,7 @@ OpenWrt_KEY: |
Linux_KEY: |
Linux
-OpenWrt_is_an_operating_system_in_particular_an_embedded_operating_system_based_on_the_Linux_kerne_KEY: |
+OpenWrt_is_an_operating_system_in_particular_an_embedded_operating_system_based_on_the_Linux_kernel_primarily_used_on_embedded_devices_to_route_net_KEY: |
OpenWrt is an operating system (in particular, an embedded operating system) based on the Linux kernel, primarily used on embedded devices to route network traffic. The main components are the Linux kernel, util-linux, uClibc and BusyBox. All components have been optimized for size, to be small enough for fitting into the limited storage and memory available in home routers.
httpsopenwrt.org_KEY: |
@@ -3716,7 +3774,7 @@ pfSense_KEY: |
BSD_KEY: |
BSD
-pfSense_is_an_open_source_firewallrouter_computer_software_distribution_based_on_FreeBSD._It_is_inst_KEY: |
+pfSense_is_an_open_source_firewallrouter_computer_software_distribution_based_on_FreeBSD._It_is_installed_on_a_computer_to_make_a_dedicated_firewallr_KEY: |
pfSense is an open source firewall/router computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for a network and is noted for its reliability and offering features often only found in expensive commercial firewalls. pfSense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and as a VPN endpoint.
httpswww.pfsense.org_KEY: |
@@ -3728,7 +3786,7 @@ httpsgithub.compfsense_KEY: |
LibreCMC_KEY: |
LibreCMC
-LibreCMC_is_a_GNULinuxlibre_distribution_for_computers_with_minimal_resources_such_as_the_Ben_Nano_KEY: |
+LibreCMC_is_a_GNULinuxlibre_distribution_for_computers_with_minimal_resources_such_as_the_Ben_Nanonote_ath9kbased_WiFi_routers_and_other_hardwar_KEY: |
LibreCMC is a GNU/Linux-libre distribution for computers with minimal resources, such as the Ben Nanonote, ath9k-based Wi-Fi routers, and other hardware with emphasis on free software. The project's current goal is to aim for compliance with the GNU Free System Distribution Guidelines (GNU FSDG) and ensure that the project continues to meet these requirements set forth by the Free Software Foundation (FSF).
httpslibrecmc.org_KEY: |
@@ -3833,13 +3891,13 @@ Write_Freely__Federated_minimalist_blog_at_write.privacytools.io_KEY: |
PrivateBin__Encrypted_Pastebin_at_bin.privacytools.io_KEY: |
PrivateBin - Encrypted Pastebin at bin.privacytools.io
-More_services_are_on_the_way._If_theres_something_that_would_be_super_beneficial_for_us_to_run_don_KEY: |
+More_services_are_on_the_way._If_theres_something_that_would_be_super_beneficial_for_us_to_run_dont_hesitate_to_reach_out_and_ask._And_of_course_if_KEY: |
More services are on the way. If there's something that would be super beneficial for us to run, don't hesitate to reach out and ask. And of course, if you like our services, please consider donating to support our server costs, any donation helps!
Sponsors_of__site.name__KEY: |
Sponsors of {{ site.name }}
-The__site.name__website_and_services_are_a_community_project._There_is_no_advertising_affiliate__KEY: |
+The__site.name__website_and_services_are_a_community_project._There_is_no_advertising_affiliate_links_or_other_forms_of_monetization.brstrong_KEY: |
The {{ site.name }} website and services are a community project. There is no advertising, affiliate links, or other forms of monetization.
Your donations here directly support hosting this website and compensating contributors to this project.
Become_a_Sponsor_KEY: |
@@ -3851,19 +3909,19 @@ Donate_Directly_KEY: |
Why_sponsor__site.name_?_KEY: |
Why sponsor {{ site.name }}?
-This_sponsorship_program_is_designed_to_allow_companies_organizations_and_individuals_partner_with__KEY: |
+This_sponsorship_program_is_designed_to_allow_companies_organizations_and_individuals_partner_with_the__site.name__team_to_support_our_vision_of__KEY: |
This sponsorship program is designed to allow companies, organizations, and individuals partner with the {{ site.name }} team to support our vision of a more privacy-respecting internet and the greater online community.
-With_this_exposure_and_sponsorship_your_customers_will_recognize_your_intrinsic_understanding_and_co_KEY: |
+With_this_exposure_and_sponsorship_your_customers_will_recognize_your_intrinsic_understanding_and_commitment_to_user_privacy._Moreover_youll_directl_KEY: |
With this exposure and sponsorship, your customers will recognize your intrinsic understanding and commitment to user privacy. Moreover, you'll directly contribute to our mission of spreading privacy-respecting tools and knowledge worldwide!
-As_a_sponsor_of__site.name__your_company_will_be_widely_recognized_in_a_variety_of_ways_some_of_KEY: |
+As_a_sponsor_of__site.name__your_company_will_be_widely_recognized_in_a_variety_of_ways_some_of_which_weve_detailed_below._KEY: |
As a sponsor of {{ site.name }}, your company will be widely recognized in a variety of ways, some of which we've detailed below.
General_Information_KEY: |
General Information
-This_website_receives_well_over_250000_pageviews_on_a_monthly_basis_and_is_highly_ranked_for_privacy_KEY: |
+This_website_receives_well_over_250000_pageviews_on_a_monthly_basis_and_is_highly_ranked_for_privacyrelated_keywords._In_addition_to_the_benefits_bel_KEY: |
This website receives well over 250,000 pageviews on a monthly basis and is highly ranked for privacy-related keywords. In addition to the benefits below your contribution will be featured on our OpenCollective page and we will thank you via social media for your contribution.
Bronze_Sponsorship_KEY: |
@@ -3884,25 +3942,25 @@ Your_mediumsized_logo_as_a_link_at_the_top_of_our_sponsors_page._KEY: |
Gold_Sponsorship_KEY: |
Gold Sponsorship
-Your_mediumsized_logo_as_a_link_on_the__site.name__homepage_and_at_the_very_top_of_our_sponsors__KEY: |
+Your_mediumsized_logo_as_a_link_on_the__site.name__homepage_and_at_the_very_top_of_our_sponsors_page._KEY: |
Your medium-sized logo as a link on the {{ site.name }} homepage and at the very top of our sponsors page.
We_will_not_provide..._KEY: |
We will not provide...
-We_pride_ourselves_on_our_integrity_and_commitment_to_spreading_unbiased_and_factbased_information_r_KEY: |
+We_pride_ourselves_on_our_integrity_and_commitment_to_spreading_unbiased_and_factbased_information_regarding_privacy_and_privacyrespecting_tools._All_KEY: |
We pride ourselves on our integrity and commitment to spreading unbiased and fact-based information regarding privacy and privacy-respecting tools. All tools we recommend throughout our website are subject to strict criteria as judged by our team and the community across our various platforms. Your sponsorship will not grant your organization any special consideration when choosing our recommendations throughout the website, a process which we make clear via our transparent ledger on OpenCollective and our public discussions on GitHub. Your sponsorship benefits are limited to those outlined above.
Tax_and_Financial_Information_KEY: |
Tax and Financial Information
-Your_contribution_to__site.name__will_be_handled_by_the_Open_Collective_Foundation_501c3._For_KEY: |
+Your_contribution_to__site.name__will_be_handled_by_the_Open_Collective_Foundation_501c3._For_US_companies_and_taxpayers_this_means_your_contr_KEY: |
Your contribution to {{ site.name }} will be handled by the Open Collective Foundation 501(c)(3). For US companies and taxpayers, this means your contribution is tax deductible. As a non-profit, your sponsorship contribution will not be used for private profit and will only be used to cover expenses incurred by the project. All of our transactions (donations and expenses) are published transparently on OpenCollective. For the benefit of our readership, anonymous contributions will not be eligible for the sponsorship opportunities outlined above.
More_Information_KEY: |
More Information
-If_you_are_interested_and_have_further_questions_you_are_welcome_to_reach_out_to_us_directly_at_a_h_KEY: |
+If_you_are_interested_and_have_further_questions_you_are_welcome_to_reach_out_to_us_directly_at_a_hrefmailtosponsorsprivacytools.iosponsorspri_KEY: |
If you are interested and have further questions, you are welcome to reach out to us directly at sponsors@privacytools.io.
httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
@@ -3914,16 +3972,16 @@ httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
Warning_KEY: |
Warning
-Using_a_VPN_will_strongnotstrong_keep_your_browsing_habits_anonymous_nor_will_it_add_additional_KEY: |
+Using_a_VPN_will_strongnotstrong_keep_your_browsing_habits_anonymous_nor_will_it_add_additional_security_to_nonsecure_HTTP_traffic._KEY: |
Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
-If_you_are_looking_for_stronganonymitystrong_you_should_use_the_Tor_Browser_stronginsteadst_KEY: |
+If_you_are_looking_for_stronganonymitystrong_you_should_use_the_Tor_Browser_stronginsteadstrong_of_a_VPN._KEY: |
If you are looking for anonymity, you should use the Tor Browser instead of a VPN.
-If_youre_looking_for_added_strongsecuritystrong_you_should_always_ensure_youre_connecting_to__KEY: |
+If_youre_looking_for_added_strongsecuritystrong_you_should_always_ensure_youre_connecting_to_websites_using_a_href_providersdnsicanndn_KEY: |
If you're looking for added security, you should always ensure you're connecting to websites using encrypted DNS and HTTPS. A VPN is not a replacement for good security practices.
-If_youre_looking_for_additional_strongprivacystrong_from_your_ISP_on_a_public_WiFi_network_o_KEY: |
+If_youre_looking_for_additional_strongprivacystrong_from_your_ISP_on_a_public_WiFi_network_or_while_torrenting_files_a_VPN_may_be_the_solutio_KEY: |
If you're looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved.
Download_Tor_KEY: |
@@ -3941,13 +3999,13 @@ More_Info_KEY: |
Our_VPN_Provider_Criteria_KEY: |
Our VPN Provider Criteria
-Please_note_we_are_not_affiliated_with_any_of_the_providers_we_recommend._This_allows_us_to_provide_c_KEY: |
+Please_note_we_are_not_affiliated_with_any_of_the_providers_we_recommend._This_allows_us_to_provide_completely_objective_recommendations._KEY: |
Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations.
-We_have_developed_a_clear_set_of_requirements_for_any_VPN_provider_wishing_to_be_recommended_includi_KEY: |
+We_have_developed_a_clear_set_of_requirements_for_any_VPN_provider_wishing_to_be_recommended_including_strong_encryption_independent_security_audits_KEY: |
We have developed a clear set of requirements for any VPN provider wishing to be recommended, including strong encryption, independent security audits, modern technology, and more. We suggest you familiarize yourself with this list before choosing a VPN provider, and conduct your own research to ensure the VPN provider you choose is as trustworthy as possible.
-Operating_outside_the_fiveninefourteeneyes_countries_is_not_a_guarantee_of_privacy_necessarily_an_KEY: |
+Operating_outside_the_fiveninefourteeneyes_countries_is_not_a_guarantee_of_privacy_necessarily_and_there_are_other_factors_to_consider._However_we_KEY: |
Operating outside the five/nine/fourteen-eyes countries is not a guarantee of privacy necessarily, and there are other factors to consider. However, we believe that avoiding these countries is important if you wish to avoid mass government dragnet surveillance, especially from the United States. Read our page on global mass surveillance and avoiding the US and UK to learn more about why we feel this is important.
Minimum_to_Qualify_KEY: |
@@ -3968,7 +4026,7 @@ Operating_inside_a_country_with_strong_consumer_protection_laws._KEY: |
Technology_KEY: |
Technology
-We_require_all_our_recommended_VPN_providers_to_provide_OpenVPN_configuration_files_to_be_used_in_any_KEY: |
+We_require_all_our_recommended_VPN_providers_to_provide_OpenVPN_configuration_files_to_be_used_in_any_client._strongIfstrong_a_VPN_provides_their__KEY: |
We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. If a VPN provides their own custom client, we require a killswitch to block network data leaks when disconnected.
OpenVPN_support._KEY: |
@@ -3989,7 +4047,7 @@ Easytouse_mobile_clients_especially_opensource._KEY: |
Privacy_KEY: |
Privacy
-We_prefer_our_recommended_providers_to_collect_as_little_data_as_possible._Not_collecting_personal_in_KEY: |
+We_prefer_our_recommended_providers_to_collect_as_little_data_as_possible._Not_collecting_personal_information_on_registration_and_accepting_anonymous_KEY: |
We prefer our recommended providers to collect as little data as possible. Not collecting personal information on registration, and accepting anonymous forms of payment are required.
Bitcoin_or_cash_payment_option._KEY: |
@@ -3998,7 +4056,7 @@ Bitcoin_or_cash_payment_option._KEY: |
No_personal_information_required_to_register_Only_username_password_and_email_at_most._KEY: |
No personal information required to register: Only username, password, and email at most.
-Accepts_Bitcoin_cash_and_other_forms_of_cryptocurrency_andor_anonymous_payment_options_gift_cards_KEY: |
+Accepts_Bitcoin_cash_and_other_forms_of_cryptocurrency_andor_anonymous_payment_options_gift_cards_etc._KEY: |
Accepts Bitcoin, cash, and other forms of cryptocurrency and/or anonymous payment options (gift cards, etc.)
No_personal_information_accepted_autogenerated_username_no_email_required_etc._KEY: |
@@ -4007,10 +4065,10 @@ No_personal_information_accepted_autogenerated_username_no_email_required_etc._K
Security_KEY: |
Security
-A_VPN_is_pointless_if_it_cant_even_provide_adequate_security._We_require_all_our_recommended_provide_KEY: |
+A_VPN_is_pointless_if_it_cant_even_provide_adequate_security._We_require_all_our_recommended_providers_to_abide_by_current_security_standards_for_thei_KEY: |
A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards for their OpenVPN connections. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security, ideally in a very comprehensive manner and on a repeated (yearly) basis.
-Strong_Encryption_Schemes_OpenVPN_with_SHA256_authentication_RSA2048_or_better_handshake_AES256_KEY: |
+Strong_Encryption_Schemes_OpenVPN_with_SHA256_authentication_RSA2048_or_better_handshake_AES256GCM_or_AES256CBC_data_encryption._KEY: |
Strong Encryption Schemes: OpenVPN with SHA-256 authentication; RSA-2048 or better handshake; AES-256-GCM or AES-256-CBC data encryption.
Perfect_Forward_Secrecy_PFS._KEY: |
@@ -4031,7 +4089,7 @@ Bugbounty_programs_andor_a_coordinated_vulnerabilitydisclosure_process._KEY: |
Trust_KEY: |
Trust
-You_wouldnt_trust_your_finances_to_someone_with_a_fake_identity_so_why_trust_them_with_your_interne_KEY: |
+You_wouldnt_trust_your_finances_to_someone_with_a_fake_identity_so_why_trust_them_with_your_internet_data?_We_require_our_recommended_providers_to_be_KEY: |
You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.
Publicfacing_leadership_or_ownership._KEY: |
@@ -4046,7 +4104,7 @@ Frequent_transparency_reports._KEY: |
Additional_Functionality_KEY: |
Additional Functionality
-While_not_strictly_requirements_there_are_some_factors_we_looked_into_when_determining_which_provide_KEY: |
+While_not_strictly_requirements_there_are_some_factors_we_looked_into_when_determining_which_providers_to_recommend._These_include_adblockingtracker_KEY: |
While not strictly requirements, there are some factors we looked into when determining which providers to recommend. These include adblocking/tracker-blocking functionality, warrant canaries, multihop connections, excellent customer support, the number of allowed simultaneous connections, etc.
Further_Information_and_Dangers_KEY: |
@@ -4055,49 +4113,49 @@ Further_Information_and_Dangers_KEY: |
Should_I_use_a_VPN?_KEY: |
Should I use a VPN?
-The_answer_to_this_question_is_not_a_particularly_helpful_one_strongIt_depends.strong_It_depend_KEY: |
+The_answer_to_this_question_is_not_a_particularly_helpful_one_strongIt_depends.strong_It_depends_on_what_youre_expecting_a_VPN_to_do_for_you_wh_KEY: |
The answer to this question is not a particularly helpful one: It depends. It depends on what you're expecting a VPN to do for you, who you're trying to hide your traffic from, and what applications you're using.
-strongIn_most_cases_VPNs_do_little_to_protect_your_privacy_or_enhance_your_securitystrong_unle_KEY: |
+strongIn_most_cases_VPNs_do_little_to_protect_your_privacy_or_enhance_your_securitystrong_unless_paired_with_other_changes._KEY: |
In most cases, VPNs do little to protect your privacy or enhance your security, unless paired with other changes.
-VPNs_cannot_encrypt_data_outside_of_the_connection_between_your_device_and_the_VPN_server._VPN_provid_KEY: |
+VPNs_cannot_encrypt_data_outside_of_the_connection_between_your_device_and_the_VPN_server._VPN_providers_can_see_and_modify_your_traffic_the_same_way_y_KEY: |
VPNs cannot encrypt data outside of the connection between your device and the VPN server. VPN providers can see and modify your traffic the same way your ISP could. And there is no way to verify a VPN provider's "no logging" policies in any way.
What_if_I_need_encryption?_KEY: |
What if I need encryption?
-In_most_cases_most_of_your_traffic_is_already_encrypted!_Over_98_of_the_top_3000_websites_offer_st_KEY: |
+In_most_cases_most_of_your_traffic_is_already_encrypted!_Over_98_of_the_top_3000_websites_offer_strongHTTPSstrong_meaning_your_nonDNS_traffic__KEY: |
In most cases, most of your traffic is already encrypted! Over 98% of the top 3000 websites offer HTTPS, meaning your non-DNS traffic is safe regardless of using a VPN. It is incredibly rare for applications that handle personal data to not support HTTPS in 2019, especially with services like Let's Encrypt offering free HTTPS certificates to any website operator.
-Even_if_a_site_you_visit_doesnt_support_HTTPS_a_VPN_will_not_protect_you_because_a_VPN_cannot_magi_KEY: |
+Even_if_a_site_you_visit_doesnt_support_HTTPS_a_VPN_will_not_protect_you_because_a_VPN_cannot_magically_encrypt_the_traffic_between_the_VPNs_server_KEY: |
Even if a site you visit doesn't support HTTPS, a VPN will not protect you, because a VPN cannot magically encrypt the traffic between the VPN's servers and the website's servers. Installing an extension like HTTPS Everywhere and making sure every site you visit uses HTTPS is far more helpful than using a VPN.
Should_I_use_encrypted_DNS_with_a_VPN?_KEY: |
Should I use encrypted DNS with a VPN?
-The_answer_to_this_question_is_also_not_very_helpful_strongit_dependsstrong._Your_VPN_provider__KEY: |
+The_answer_to_this_question_is_also_not_very_helpful_strongit_dependsstrong._Your_VPN_provider_may_have_their_own_DNS_servers_but_if_they_dont_KEY: |
The answer to this question is also not very helpful: it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.
-However_strongyou_shouldnt_use_encrypted_DNS_with_Torstrong._This_would_direct_all_of_your_DNS__KEY: |
+However_strongyou_shouldnt_use_encrypted_DNS_with_Torstrong._This_would_direct_all_of_your_DNS_requests_through_a_single_circuit_and_would_allow_KEY: |
However you shouldn't use encrypted DNS with Tor. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.
What_if_I_need_anonymity?_KEY: |
What if I need anonymity?
-VPNs_cannot_provide_strong_anonymity._Your_VPN_provider_will_still_see_your_real_IP_address_and_ofte_KEY: |
+VPNs_cannot_provide_strong_anonymity._Your_VPN_provider_will_still_see_your_real_IP_address_and_often_has_a_money_trail_that_can_be_linked_directly_ba_KEY: |
VPNs cannot provide strong anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data.
Shouldnt_I_hide_my_IP_address?_KEY: |
Shouldn't I hide my IP address?
-The_idea_that_your_IP_address_is_sensitive_information_or_that_your_location_is_given_away_with_all__KEY: |
+The_idea_that_your_IP_address_is_sensitive_information_or_that_your_location_is_given_away_with_all_your_internet_traffic_is_strongfearmongeringst_KEY: |
The idea that your IP address is sensitive information, or that your location is given away with all your internet traffic is fearmongering on the part of VPN providers and their marketing. Your IP address is an insignificant amount of personal data tracking companies use to identify you, because many users' IP addresses change very frequently (Dynamic IP addresses, switching networks, switching devices, etc.). Your IP address also does not give away more than the very generalized location of your Internet Service Provider. It does not give away your home address, for example, despite common perception.
Should_I_use_Tor_emandem_a_VPN?_KEY: |
Should I use Tor and a VPN?
-By_using_a_VPN_with_Tor_youre_creating_essentially_a_permanent_entry_node_often_with_a_money_trail_KEY: |
+By_using_a_VPN_with_Tor_youre_creating_essentially_a_permanent_entry_node_often_with_a_money_trail_attached._This_provides_0_additional_benefit_to_y_KEY: |
By using a VPN with Tor, you're creating essentially a permanent entry node, often with a money trail attached. This provides 0 additional benefit to you, while increasing the attack surface of your connection dramatically. If you wish to hide your Tor usage from your ISP or your government, Tor has a built-in solution for that: Tor bridges. Read more about Tor bridges and why using a VPN is not necessary.
Are_VPNs_ever_useful?_KEY: |
@@ -4112,25 +4170,25 @@ Hiding_your_traffic_from_strongonlystrong_your_Internet_Service_Provider._KEY: |
Hiding_your_downloads_such_as_torrents_from_your_ISP_and_antipiracy_organizations._KEY: |
Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations.
-For_use_cases_like_these_or_if_you_have_another_compelling_reason_the_VPN_providers_we_listed_above_KEY: |
+For_use_cases_like_these_or_if_you_have_another_compelling_reason_the_VPN_providers_we_listed_above_are_who_we_think_are_the_most_trustworthy._Howeve_KEY: |
For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're trusting the provider. In pretty much any other scenario you should be using a secure-by-design tool such as Tor.
Sources_and_Further_Reading_KEY: |
Sources and Further Reading
-a_href_httpsschub.ioblog20190408veryprecariousnarrative.html_VPN__a_Very_Precarious_N_KEY: |
+a_href_httpsschub.ioblog20190408veryprecariousnarrative.html_VPN__a_Very_Precarious_Narrativea_by_Dennis_Schubert_KEY: |
VPN - a Very Precarious Narrative by Dennis Schubert
-a_hrefhttpsgist.github.comjoepie915a9909939e6ce7d09e29Dont_use_VPN_servicesa_by_Sven_Sl_KEY: |
+a_hrefhttpsgist.github.comjoepie915a9909939e6ce7d09e29Dont_use_VPN_servicesa_by_Sven_Slootweg_KEY: |
Don't use VPN services by Sven Slootweg
-a_href_softwarenetworks__translate_page_The_selfcontained_networksa_recommended_by_KEY: |
+a_href_softwarenetworks__translate_page_The_selfcontained_networksa_recommended_by_PrivacyTools_are_able_to_replace_a_VPN_that_allow_KEY: |
The self-contained networks recommended by PrivacyTools are able to replace a VPN that allows access to services on local area network
-a_hrefhttpswrite.privacytools.iomythoughtsonsecurityslicingonionspart1mythbustingtor_KEY: |
+a_hrefhttpswrite.privacytools.iomythoughtsonsecurityslicingonionspart1mythbustingtorSlicing_Onions_Part_1__Mythbusting_Tora_by_KEY: |
Slicing Onions: Part 1 – Myth-busting Tor by blacklight447
-a_hrefhttpswrite.privacytools.iomythoughtsonsecurityslicingonionspart2onionrecipesvp_KEY: |
+a_hrefhttpswrite.privacytools.iomythoughtsonsecurityslicingonionspart2onionrecipesvpnnotrequiredSlicing_Onions_Part_2__Onion_rec_KEY: |
Slicing Onions: Part 2 – Onion recipes; VPN not required by blacklight447
More_VPN_Providers_KEY: |
@@ -4187,7 +4245,7 @@ httpswww.ivpn.netprivacy_KEY: |
IVPN.net_will_collect_your_email_and_IP_address_after_sign_up_KEY: |
IVPN.net will collect your email and IP address after sign up
-Read_the_a_datatoggletooltip_dataplacementtop_dataoriginaltitleThe_IP_collected_at_signu_KEY: |
+Read_the_a_datatoggletooltip_dataplacementtop_dataoriginaltitleThe_IP_collected_at_signup_is_only_used_for_a_few_seconds_by_our_fraud_modu_KEY: |
Read the Email statement from IVPN.
httpsmedium.comblackVPNnologs6d65d95a3016_KEY: |
@@ -4202,3 +4260,609 @@ httpsgist.github.comkennwhite1f3bc4d889b02b35d8aa_KEY: |
Dont_use_LT2P_IPSec_use_other_protocols._KEY: |
Don't use LT2P IPSec, use other protocols.
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefox
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter_KEY: |
+ https://play.google.com/store/apps/details?id=com.etesync.syncadapter
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+httpsbugzilla.mozilla.orgshow_bug.cgi?id1500289_KEY: |
+ https://bugzilla.mozilla.org/show_bug.cgi?id=1500289
+
+httpsbugzilla.mozilla.orgshow_bug.cgi?id1542754_KEY: |
+ https://bugzilla.mozilla.org/show_bug.cgi?id=1542754
+
+httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: |
+ https://www.claws-mail.org/downloads.php?section=downloads
+
+httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain_KEY: |
+ https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain
+
+httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git_KEY: |
+ https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend
+
+httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid_KEY: |
+ https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid
+
+httpsgithub.comsyncthing?typesource_KEY: |
+ https://github.com/syncthing?type=source
+
+Prefer_the_classic_site?_View_a_singlepage_layout._KEY: |
+ Prefer the classic site? View a single-page layout.
+
+Privacy?_I_dont_have_anything_to_hide._KEY: |
+ Privacy? I don't have anything to hide.
+
+How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com_KEY: |
+ How do you counter the "I have nothing to hide?" argument? (reddit.com)
+
+httpspapers.ssrn.comsol3papers.cfm?abstract_id998565_KEY: |
+ https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
+
+What_does_the_US_government_know_about_you?_KEY: |
+ What does the US government know about you?
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpsplay.google.comstoreappsdetails?idnet.i2p.android_KEY: |
+ https://play.google.com/store/apps/details?id=net.i2p.android
+
+httpsplay.google.comstoreappsdetails?idcom.standardnotes_KEY: |
+ https://play.google.com/store/apps/details?id=com.standardnotes
+
+httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl_KEY: |
+ https://play.google.com/store/apps/details?id=com.lyonbros.turtl
+
+Privacy?_I_dont_have_anything_to_hide._KEY: |
+ Privacy? I don't have anything to hide.
+
+How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com_KEY: |
+ How do you counter the "I have nothing to hide?" argument? (reddit.com)
+
+httpspapers.ssrn.comsol3papers.cfm?abstract_id998565_KEY: |
+ https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
+
+Who_is_required_to_hand_over_the_encryption_keys_to_authorities?_KEY: |
+ Who is required to hand over the encryption keys to authorities?
+
+Why_is_it_not_recommended_to_choose_a_USbased_service?_KEY: |
+ Why is it not recommended to choose a US-based service?
+
+What_is_a_warrant_canary?_KEY: |
+ What is a warrant canary?
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefox
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: |
+ https://www.claws-mail.org/downloads.php?section=downloads
+
+httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms_KEY: |
+ https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
+
+httpsplay.google.comstoreappsdetails?idcom.wire_KEY: |
+ https://play.google.com/store/apps/details?id=com.wire
+
+httpsitunes.apple.comappwireid930944768?mt8_KEY: |
+ https://itunes.apple.com/app/wire/id930944768?mt=8
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpsplay.google.comstoreappsdetails?idorg.linphone_KEY: |
+ https://play.google.com/store/apps/details?id=org.linphone
+
+httpsitunes.apple.comusapplinphoneid360065638?mt8_KEY: |
+ https://itunes.apple.com/us/app/linphone/id360065638?mt=8
+
+httpsapps.apple.comusappmumbleid443472808?ls1_KEY: |
+ https://apps.apple.com/us/app/mumble/id443472808?ls=1
+
+httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha_KEY: |
+ https://f-droid.org/repository/browse/?fdid=im.vector.alpha
+
+httpsplay.google.comstoreappsdetails?idim.vector.app_KEY: |
+ https://play.google.com/store/apps/details?id=im.vector.app
+
+httpsplay.google.comstoreappsdetails?idchat.rocket.android_KEY: |
+ https://play.google.com/store/apps/details?id=chat.rocket.android
+
+httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US_KEY: |
+ https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid_KEY: |
+ https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid
+
+httpsgithub.comsyncthing?typesource_KEY: |
+ https://github.com/syncthing?type=source
+
+httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6_KEY: |
+ https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6
+
+httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden_KEY: |
+ https://play.google.com/store/apps/details?id=com.x8bit.bitwarden
+
+httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8_KEY: |
+ https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8
+
+httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free_KEY: |
+ https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
+
+httpsplay.google.comstoreappsdetails?idcom.lesspass.android_KEY: |
+ https://play.google.com/store/apps/details?id=com.lesspass.android
+
+httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter_KEY: |
+ https://play.google.com/store/apps/details?id=com.etesync.syncadapter
+
+httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain_KEY: |
+ https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain
+
+httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git_KEY: |
+ https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpsplay.google.comstoreappsdetails?idnet.i2p.android_KEY: |
+ https://play.google.com/store/apps/details?id=net.i2p.android
+
+httpsbugzilla.mozilla.orgshow_bug.cgi?id1500289_KEY: |
+ https://bugzilla.mozilla.org/show_bug.cgi?id=1500289
+
+httpsbugzilla.mozilla.orgshow_bug.cgi?id1542754_KEY: |
+ https://bugzilla.mozilla.org/show_bug.cgi?id=1542754
+
+httpsplay.google.comstoreappsdetails?idcom.standardnotes_KEY: |
+ https://play.google.com/store/apps/details?id=com.standardnotes
+
+httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl_KEY: |
+ https://play.google.com/store/apps/details?id=com.lyonbros.turtl
+
+httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas_KEY: |
+ https://play.google.com/store/apps/details?id=com.abunchtell.writeas
+
+What_does_the_US_government_know_about_you?_KEY: |
+ What does the US government know about you?
+
+httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6_KEY: |
+ https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6
+
+httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden_KEY: |
+ https://play.google.com/store/apps/details?id=com.x8bit.bitwarden
+
+httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8_KEY: |
+ https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8
+
+httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free_KEY: |
+ https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
+
+httpsplay.google.comstoreappsdetails?idcom.lesspass.android_KEY: |
+ https://play.google.com/store/apps/details?id=com.lesspass.android
+
+httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas_KEY: |
+ https://play.google.com/store/apps/details?id=com.abunchtell.writeas
+
+Who_is_required_to_hand_over_the_encryption_keys_to_authorities?_KEY: |
+ Who is required to hand over the encryption keys to authorities?
+
+Why_is_it_not_recommended_to_choose_a_USbased_service?_KEY: |
+ Why is it not recommended to choose a US-based service?
+
+What_is_a_warrant_canary?_KEY: |
+ What is a warrant canary?
+
+httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms_KEY: |
+ https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
+
+httpsplay.google.comstoreappsdetails?idcom.wire_KEY: |
+ https://play.google.com/store/apps/details?id=com.wire
+
+httpsitunes.apple.comappwireid930944768?mt8_KEY: |
+ https://itunes.apple.com/app/wire/id930944768?mt=8
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpsplay.google.comstoreappsdetails?idorg.linphone_KEY: |
+ https://play.google.com/store/apps/details?id=org.linphone
+
+httpsitunes.apple.comusapplinphoneid360065638?mt8_KEY: |
+ https://itunes.apple.com/us/app/linphone/id360065638?mt=8
+
+httpsapps.apple.comusappmumbleid443472808?ls1_KEY: |
+ https://apps.apple.com/us/app/mumble/id443472808?ls=1
+
+httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha_KEY: |
+ https://f-droid.org/repository/browse/?fdid=im.vector.alpha
+
+httpsplay.google.comstoreappsdetails?idim.vector.app_KEY: |
+ https://play.google.com/store/apps/details?id=im.vector.app
+
+httpsplay.google.comstoreappsdetails?idchat.rocket.android_KEY: |
+ https://play.google.com/store/apps/details?id=chat.rocket.android
+
+httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US_KEY: |
+ https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US
+
+Why_sponsor__site.name_?_KEY: |
+ Why sponsor {{ site.name }}?
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+You_wouldnt_trust_your_finances_to_someone_with_a_fake_identity_so_why_trust_them_with_your_internet_data?_We_require_our_recommended_providers_to_be_KEY: |
+ You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.
+
+Should_I_use_a_VPN?_KEY: |
+ Should I use a VPN?
+
+What_if_I_need_encryption?_KEY: |
+ What if I need encryption?
+
+Should_I_use_encrypted_DNS_with_a_VPN?_KEY: |
+ Should I use encrypted DNS with a VPN?
+
+What_if_I_need_anonymity?_KEY: |
+ What if I need anonymity?
+
+Shouldnt_I_hide_my_IP_address?_KEY: |
+ Shouldn't I hide my IP address?
+
+Should_I_use_Tor_emandem_a_VPN?_KEY: |
+ Should I use Tor and a VPN?
+
+Are_VPNs_ever_useful?_KEY: |
+ Are VPNs ever useful?
+
+httpsproxy.shpanelknowledgebase.php?actiondisplayarticleid5_KEY: |
+ https://proxy.sh/panel/knowledgebase.php?action=displayarticle&id=5
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefox
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter_KEY: |
+ https://play.google.com/store/apps/details?id=com.etesync.syncadapter
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+httpsbugzilla.mozilla.orgshow_bug.cgi?id1500289_KEY: |
+ https://bugzilla.mozilla.org/show_bug.cgi?id=1500289
+
+httpsbugzilla.mozilla.orgshow_bug.cgi?id1542754_KEY: |
+ https://bugzilla.mozilla.org/show_bug.cgi?id=1542754
+
+httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: |
+ https://www.claws-mail.org/downloads.php?section=downloads
+
+httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain_KEY: |
+ https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain
+
+httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git_KEY: |
+ https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend
+
+httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid_KEY: |
+ https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid
+
+httpsgithub.comsyncthing?typesource_KEY: |
+ https://github.com/syncthing?type=source
+
+Prefer_the_classic_site?_View_a_singlepage_layout._KEY: |
+ Prefer the classic site? View a single-page layout.
+
+Privacy?_I_dont_have_anything_to_hide._KEY: |
+ Privacy? I don't have anything to hide.
+
+How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com_KEY: |
+ How do you counter the "I have nothing to hide?" argument? (reddit.com)
+
+httpspapers.ssrn.comsol3papers.cfm?abstract_id998565_KEY: |
+ https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
+
+What_does_the_US_government_know_about_you?_KEY: |
+ What does the US government know about you?
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpsplay.google.comstoreappsdetails?idnet.i2p.android_KEY: |
+ https://play.google.com/store/apps/details?id=net.i2p.android
+
+httpsplay.google.comstoreappsdetails?idcom.standardnotes_KEY: |
+ https://play.google.com/store/apps/details?id=com.standardnotes
+
+httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl_KEY: |
+ https://play.google.com/store/apps/details?id=com.lyonbros.turtl
+
+Privacy?_I_dont_have_anything_to_hide._KEY: |
+ Privacy? I don't have anything to hide.
+
+How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com_KEY: |
+ How do you counter the "I have nothing to hide?" argument? (reddit.com)
+
+httpspapers.ssrn.comsol3papers.cfm?abstract_id998565_KEY: |
+ https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
+
+Who_is_required_to_hand_over_the_encryption_keys_to_authorities?_KEY: |
+ Who is required to hand over the encryption keys to authorities?
+
+Why_is_it_not_recommended_to_choose_a_USbased_service?_KEY: |
+ Why is it not recommended to choose a US-based service?
+
+What_is_a_warrant_canary?_KEY: |
+ What is a warrant canary?
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefox
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: |
+ https://www.claws-mail.org/downloads.php?section=downloads
+
+httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms_KEY: |
+ https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
+
+httpsplay.google.comstoreappsdetails?idcom.wire_KEY: |
+ https://play.google.com/store/apps/details?id=com.wire
+
+httpsitunes.apple.comappwireid930944768?mt8_KEY: |
+ https://itunes.apple.com/app/wire/id930944768?mt=8
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpsplay.google.comstoreappsdetails?idorg.linphone_KEY: |
+ https://play.google.com/store/apps/details?id=org.linphone
+
+httpsitunes.apple.comusapplinphoneid360065638?mt8_KEY: |
+ https://itunes.apple.com/us/app/linphone/id360065638?mt=8
+
+httpsapps.apple.comusappmumbleid443472808?ls1_KEY: |
+ https://apps.apple.com/us/app/mumble/id443472808?ls=1
+
+httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha_KEY: |
+ https://f-droid.org/repository/browse/?fdid=im.vector.alpha
+
+httpsplay.google.comstoreappsdetails?idim.vector.app_KEY: |
+ https://play.google.com/store/apps/details?id=im.vector.app
+
+httpsplay.google.comstoreappsdetails?idchat.rocket.android_KEY: |
+ https://play.google.com/store/apps/details?id=chat.rocket.android
+
+httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US_KEY: |
+ https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US
+
+httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend_KEY: |
+ https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid_KEY: |
+ https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid
+
+httpsgithub.comsyncthing?typesource_KEY: |
+ https://github.com/syncthing?type=source
+
+httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6_KEY: |
+ https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6
+
+httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden_KEY: |
+ https://play.google.com/store/apps/details?id=com.x8bit.bitwarden
+
+httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8_KEY: |
+ https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8
+
+httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free_KEY: |
+ https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
+
+httpsplay.google.comstoreappsdetails?idcom.lesspass.android_KEY: |
+ https://play.google.com/store/apps/details?id=com.lesspass.android
+
+httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter_KEY: |
+ https://play.google.com/store/apps/details?id=com.etesync.syncadapter
+
+httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain_KEY: |
+ https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain
+
+httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git_KEY: |
+ https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git
+
+httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: |
+ https://play.google.com/store/apps/details?id=org.torproject.torbrowser
+
+httpsplay.google.comstoreappsdetails?idnet.i2p.android_KEY: |
+ https://play.google.com/store/apps/details?id=net.i2p.android
+
+httpsbugzilla.mozilla.orgshow_bug.cgi?id1500289_KEY: |
+ https://bugzilla.mozilla.org/show_bug.cgi?id=1500289
+
+httpsbugzilla.mozilla.orgshow_bug.cgi?id1542754_KEY: |
+ https://bugzilla.mozilla.org/show_bug.cgi?id=1542754
+
+httpsplay.google.comstoreappsdetails?idcom.standardnotes_KEY: |
+ https://play.google.com/store/apps/details?id=com.standardnotes
+
+httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl_KEY: |
+ https://play.google.com/store/apps/details?id=com.lyonbros.turtl
+
+httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas_KEY: |
+ https://play.google.com/store/apps/details?id=com.abunchtell.writeas
+
+What_does_the_US_government_know_about_you?_KEY: |
+ What does the US government know about you?
+
+httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6_KEY: |
+ https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6
+
+httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden_KEY: |
+ https://play.google.com/store/apps/details?id=com.x8bit.bitwarden
+
+httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8_KEY: |
+ https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8
+
+httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free_KEY: |
+ https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
+
+httpsplay.google.comstoreappsdetails?idcom.lesspass.android_KEY: |
+ https://play.google.com/store/apps/details?id=com.lesspass.android
+
+httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas_KEY: |
+ https://play.google.com/store/apps/details?id=com.abunchtell.writeas
+
+Who_is_required_to_hand_over_the_encryption_keys_to_authorities?_KEY: |
+ Who is required to hand over the encryption keys to authorities?
+
+Why_is_it_not_recommended_to_choose_a_USbased_service?_KEY: |
+ Why is it not recommended to choose a US-based service?
+
+What_is_a_warrant_canary?_KEY: |
+ What is a warrant canary?
+
+httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms_KEY: |
+ https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
+
+httpsplay.google.comstoreappsdetails?idcom.wire_KEY: |
+ https://play.google.com/store/apps/details?id=com.wire
+
+httpsitunes.apple.comappwireid930944768?mt8_KEY: |
+ https://itunes.apple.com/app/wire/id930944768?mt=8
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner_KEY: |
+ https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
+
+httpsplay.google.comstoreappsdetails?idorg.linphone_KEY: |
+ https://play.google.com/store/apps/details?id=org.linphone
+
+httpsitunes.apple.comusapplinphoneid360065638?mt8_KEY: |
+ https://itunes.apple.com/us/app/linphone/id360065638?mt=8
+
+httpsapps.apple.comusappmumbleid443472808?ls1_KEY: |
+ https://apps.apple.com/us/app/mumble/id443472808?ls=1
+
+httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha_KEY: |
+ https://f-droid.org/repository/browse/?fdid=im.vector.alpha
+
+httpsplay.google.comstoreappsdetails?idim.vector.app_KEY: |
+ https://play.google.com/store/apps/details?id=im.vector.app
+
+httpsplay.google.comstoreappsdetails?idchat.rocket.android_KEY: |
+ https://play.google.com/store/apps/details?id=chat.rocket.android
+
+httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US_KEY: |
+ https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US
+
+Why_sponsor__site.name_?_KEY: |
+ Why sponsor {{ site.name }}?
+
+httpsplay.google.comstoreappsdetails?idcom.nextcloud.client_KEY: |
+ https://play.google.com/store/apps/details?id=com.nextcloud.client
+
+httpsitunes.apple.comusappnextcloudid1125420102?mt8_KEY: |
+ https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
+
+You_wouldnt_trust_your_finances_to_someone_with_a_fake_identity_so_why_trust_them_with_your_internet_data?_We_require_our_recommended_providers_to_be_KEY: |
+ You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.
+
+Should_I_use_a_VPN?_KEY: |
+ Should I use a VPN?
+
+What_if_I_need_encryption?_KEY: |
+ What if I need encryption?
+
+Should_I_use_encrypted_DNS_with_a_VPN?_KEY: |
+ Should I use encrypted DNS with a VPN?
+
+What_if_I_need_anonymity?_KEY: |
+ What if I need anonymity?
+
+Shouldnt_I_hide_my_IP_address?_KEY: |
+ Shouldn't I hide my IP address?
+
+Should_I_use_Tor_emandem_a_VPN?_KEY: |
+ Should I use Tor and a VPN?
+
+Are_VPNs_ever_useful?_KEY: |
+ Are VPNs ever useful?
+
+httpsproxy.shpanelknowledgebase.php?actiondisplayarticleid5_KEY: |
+ https://proxy.sh/panel/knowledgebase.php?action=displayarticle&id=5
+