If you believe you reached this page in error, please contact us!
+
\ No newline at end of file
diff --git a/_includes/card.html b/_includes/card.html
index dbc353c4..4585cb52 100644
--- a/_includes/card.html
+++ b/_includes/card.html
@@ -1,74 +1,74 @@
+ {% if include.extra_button %}
+ {{include.extra_button}}
+ {% endif %}
+
+ {% if include.footer %}
+
{{include.footer}}
+ {% endif %}
+
+
+
+
\ No newline at end of file
diff --git a/_includes/cardv2.html b/_includes/cardv2.html
index 45906aed..e5673d6d 100644
--- a/_includes/cardv2.html
+++ b/_includes/cardv2.html
@@ -1,49 +1,49 @@
-
-
{{include.title}}
-
-
-
-
- {{include.description}}
-
- Website
- {% if include.forum %}
- Forum
- {% endif %}
- {% if include.tor %}
-
- {% endif %}
+
+
{{include.title}}
+
+
+
+
+ {{include.description}}
+
+ Website
+ {% if include.forum %}
+ Forum
+ {% endif %}
+ {% if include.tor %}
+
+ {% endif %}
-
- {% if include.windows %}{% endif %}
- {% if include.mac %}{% endif %}
- {% if include.linux %}{% endif %}
- {% if include.bsd %}{% endif %}
+
+ {% if include.windows %}{% endif %}
+ {% if include.mac %}{% endif %}
+ {% if include.linux %}{% endif %}
+ {% if include.bsd %}{% endif %}
- {% if include.firefox %}{% endif %}
- {% if include.chrome %}{% endif %}
- {% if include.safari %}{% endif %}
- {% if include.opera %}{% endif %}
- {% if include.edge %}{% endif %}
+ {% if include.firefox %}{% endif %}
+ {% if include.chrome %}{% endif %}
+ {% if include.safari %}{% endif %}
+ {% if include.opera %}{% endif %}
+ {% if include.edge %}{% endif %}
- {% if include.android %}{% endif %}
- {% if include.ios %}{% endif %}
- {% if include.fire %}{% endif %}
+ {% if include.android %}{% endif %}
+ {% if include.ios %}{% endif %}
+ {% if include.fire %}{% endif %}
- {% if include.web %}{% endif %}
+ {% if include.web %}{% endif %}
- {{include.icon1}}
- {{include.icon2}}
- {{include.icon3}}
+ {{include.icon1}}
+ {{include.icon2}}
+ {{include.icon3}}
- {% if include.github %}{% endif %}
- {% if include.gitlab %}{% endif %}
- {% if include.git %}{% endif %}
- {% if include.source %}{% endif %}
+ {% if include.github %}{% endif %}
+ {% if include.gitlab %}{% endif %}
+ {% if include.git %}{% endif %}
+ {% if include.source %}{% endif %}
-
+
-
+
-
+
\ No newline at end of file
diff --git a/_includes/footer.html b/_includes/footer.html
index 0acbfa82..4c5b4aaf 100644
--- a/_includes/footer.html
+++ b/_includes/footer.html
@@ -1,78 +1,78 @@
+
\ No newline at end of file
diff --git a/_includes/head.html b/_includes/head.html
index d2fb0f51..dadf278a 100644
--- a/_includes/head.html
+++ b/_includes/head.html
@@ -1,47 +1,47 @@
-
-
-
-
-
-
-
-
-
-
+
+
+
+
+
+
+
+
+
+
-
- {% if page.title %}
- {{ page.title }} | privacytools.io
-
- {% else %}
- {{ site.title }}
-
- {% endif %}
-
-
-
-
-
-
+
+ {% if page.title %}
+ {{ page.title }} | privacytools.io
+
+ {% else %}
+ {{ site.title }}
+
+ {% endif %}
+
+
+
+
+
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
-
-
-
+
+
+
\ No newline at end of file
diff --git a/_includes/nav.html b/_includes/nav.html
index 18e6c3d4..ac9b5f89 100644
--- a/_includes/nav.html
+++ b/_includes/nav.html
@@ -1,110 +1,110 @@
\ No newline at end of file
diff --git a/_includes/panel.html b/_includes/panel.html
index f9e77415..68286919 100644
--- a/_includes/panel.html
+++ b/_includes/panel.html
@@ -1,14 +1,14 @@
-
- {% if include.color == "warning" %}
-
- {% else %}
-
- {% endif %}
-
{{include.title}}
-
-
- {{include.body}}
-
-
-
\ No newline at end of file
+
+ {% if include.color == "warning" %}
+
+ {% else %}
+
+ {% endif %}
+
{{include.title}}
+
+
+ {{include.body}}
+
+
+
\ No newline at end of file
diff --git a/_includes/scripts.html b/_includes/scripts.html
index cdc7e515..7ed92d0c 100644
--- a/_includes/scripts.html
+++ b/_includes/scripts.html
@@ -3,15 +3,15 @@
-
+
\ No newline at end of file
diff --git a/_includes/sections/android-addons.html b/_includes/sections/android-addons.html
index 9d040b05..b8831807 100644
--- a/_includes/sections/android-addons.html
+++ b/_includes/sections/android-addons.html
@@ -1,56 +1,56 @@
Android Privacy Add-ons
- Improve your privacy with these add-ons for Android.
+ Improve your privacy with these add-ons for Android.
Blokada works across all of your apps, not only the browser. It doesn't require root, supports both wifi and mobile networks, and is perfectly safe and simple to use. Just turn it on, and it will do the job silently!
-
Blokada works across all of your apps, not only the browser. It doesn't require root, supports both wifi and mobile networks, and is perfectly safe and simple to use. Just turn it on, and it will do the job silently!
+
NetGuard provides simple and advanced ways to block certain apps' access to the internet without the help of root privileges. Applications and addresses can individually be allowed or denied access to your Wi-Fi and/or mobile connection, allowing you to control which apps are able to call home or not.
-
NetGuard provides simple and advanced ways to block certain apps' access to the internet without the help of root privileges. Applications and addresses can individually be allowed or denied access to your Wi-Fi and/or mobile connection, allowing you to control which apps are able to call home or not.
+
Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Root Mode: Orbot can be configured to transparently proxy all of your Internet traffic through Tor. You can also choose which specific apps you want to use through Tor.
-
Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Root Mode: Orbot can be configured to transparently proxy all of your Internet traffic through Tor. You can also choose which specific apps you want to use through Tor.
+
+
- The following add-ons require root access, which makes your device more vulnerable. Proceed with caution.
+ The following add-ons require root access, which makes your device more vulnerable. Proceed with caution.
\ No newline at end of file
diff --git a/_includes/sections/browser-addons.html b/_includes/sections/browser-addons.html
index d061eacb..352bd925 100644
--- a/_includes/sections/browser-addons.html
+++ b/_includes/sections/browser-addons.html
@@ -1,7 +1,7 @@
Excellent Firefox Privacy Add-ons
- Improve your privacy with these excellent Firefox add-ons.
+ Improve your privacy with these excellent Firefox add-ons.
@@ -97,7 +97,7 @@ chrome=""
For Experts Only
- These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons.
+ These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons.
{% include cardv2.html
@@ -121,4 +121,4 @@ forum="https://forum.privacytools.io/t/discussion-noscript-security-suite/272"
github="https://github.com/hackademix/noscript"
firefox=""
chrome=""
-%}
+%}
\ No newline at end of file
diff --git a/_includes/sections/browser-fingerprint.html b/_includes/sections/browser-fingerprint.html
index 139351e6..372e97bb 100644
--- a/_includes/sections/browser-fingerprint.html
+++ b/_includes/sections/browser-fingerprint.html
@@ -1,7 +1,7 @@
Browser Fingerprint - Is your browser configuration unique?
- Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.
+ Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.
@@ -9,9 +9,9 @@
When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.
You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.
BrowserLeaks.com - Web browser security testing tools, that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.
BrowserLeaks.com - Web browser security testing tools, that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet.
+
\ No newline at end of file
diff --git a/_includes/sections/browser-tweaks.html b/_includes/sections/browser-tweaks.html
index 2a3dcbcd..ee5ccad8 100644
--- a/_includes/sections/browser-tweaks.html
+++ b/_includes/sections/browser-tweaks.html
@@ -5,143 +5,143 @@
Preparation:
-
Enter "about:config" in the firefox address bar and press enter.
-
Press the button "I'll be careful, I promise!"
-
Follow the instructions below...
+
Enter "about:config" in the firefox address bar and press enter.
+
Press the button "I'll be careful, I promise!"
+
Follow the instructions below...
Getting started:
-
privacy.firstparty.isolate = true
-
A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
+
privacy.firstparty.isolate = true
+
A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
-
privacy.resistFingerprinting = true
-
A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.
+
privacy.resistFingerprinting = true
+
A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.
This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.
+
privacy.trackingprotection.enabled = true
+
This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.
-
browser.cache.offline.enable = false
-
Disables offline cache.
+
browser.cache.offline.enable = false
+
Disables offline cache.
-
browser.safebrowsing.malware.enabled = false
-
Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.
+
browser.safebrowsing.malware.enabled = false
+
Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.
-
browser.safebrowsing.phishing.enabled = false
-
Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.
+
browser.safebrowsing.phishing.enabled = false
+
Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.
-
browser.send_pings = false
-
The attribute would be useful for letting websites track visitors' clicks.
+
browser.send_pings = false
+
The attribute would be useful for letting websites track visitors' clicks.
-
browser.sessionstore.max_tabs_undo = 0
-
Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.
+
browser.sessionstore.max_tabs_undo = 0
+
Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.
-
browser.urlbar.speculativeConnect.enabled = false
-
Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. Source
+
browser.urlbar.speculativeConnect.enabled = false
+
Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. Source
-
dom.battery.enabled = false
-
The battery status of your device could be tracked.
+
dom.battery.enabled = false
+
The battery status of your device could be tracked.
-
dom.event.clipboardevents.enabled = false
-
Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
+
dom.event.clipboardevents.enabled = false
+
Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
-
geo.enabled = false
-
Disables geolocation.
+
geo.enabled = false
+
Disables geolocation.
-
media.eme.enabled = false
-
-
Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. Details
-
DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.
-
+
media.eme.enabled = false
+
+
Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. Details
+
DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.
+
-
media.gmp-widevinecdm.enabled = false
-
Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. Details
+
media.gmp-widevinecdm.enabled = false
+
Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. Details
-
media.navigator.enabled = false
-
Websites can track the microphone and camera status of your device.
+
media.navigator.enabled = false
+
Websites can track the microphone and camera status of your device.
-
network.cookie.cookieBehavior = 1
-
- Disable cookies
-
-
0 = Accept all cookies by default
-
1 = Only accept from the originating site (block third-party cookies)
-
2 = Block all cookies by default
-
-
+
network.cookie.cookieBehavior = 1
+
+ Disable cookies
+
+
0 = Accept all cookies by default
+
1 = Only accept from the originating site (block third-party cookies)
+
2 = Block all cookies by default
+
+
-
network.cookie.lifetimePolicy = 2
-
- cookies are deleted at the end of the session
-
-
0 = Accept cookies normally
-
1 = Prompt for each cookie
-
2 = Accept for current session only
-
3 = Accept for N days
-
-
+
network.cookie.lifetimePolicy = 2
+
+ cookies are deleted at the end of the session
+
+
0 = Accept cookies normally
+
1 = Prompt for each cookie
+
2 = Accept for current session only
+
3 = Accept for N days
+
+
-
network.http.referer.trimmingPolicy = 2
-
- Send only the scheme, host, and port in the Referer header
-
-
0 = Send the full URL in the Referer header
-
1 = Send the URL without its query string in the Referer header
-
2 = Send only the scheme, host, and port in the Referer header
-
-
+
network.http.referer.trimmingPolicy = 2
+
+ Send only the scheme, host, and port in the Referer header
+
+
0 = Send the full URL in the Referer header
+
1 = Send the URL without its query string in the Referer header
+
2 = Send only the scheme, host, and port in the Referer header
+
+
-
network.http.referer.XOriginPolicy = 2
-
- Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.) Source
-
-
0 = Send Referer in all cases
-
1 = Send Referer to same eTLD sites
-
2 = Send Referer only when the full hostnames match
-
-
+
network.http.referer.XOriginPolicy = 2
+
+ Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.) Source
+
+
0 = Send Referer in all cases
+
1 = Send Referer to same eTLD sites
+
2 = Send Referer only when the full hostnames match
+
+
-
network.http.referer.XOriginTrimmingPolicy = 2
-
- When sending Referer across origins, only send scheme, host, and port in the Referer header of cross-origin requests. Source
-
-
0 = Send full url in Referer
-
1 = Send url without query string in Referer
-
2 = Only send scheme, host, and port in Referer
-
-
+
network.http.referer.XOriginTrimmingPolicy = 2
+
+ When sending Referer across origins, only send scheme, host, and port in the Referer header of cross-origin requests. Source
+
Limit the amount of identifiable information sent when requesting the Mozilla harmful extension blocklist.
-
Optionally, the blocklist can be disabled entirely by setting extensions.blocklist.enabled to false for increased privacy, but decreased security. Source
Limit the amount of identifiable information sent when requesting the Mozilla harmful extension blocklist.
+
Optionally, the blocklist can be disabled entirely by setting extensions.blocklist.enabled to false for increased privacy, but decreased security. Source
+
Firefox user.js Templates
@@ -154,8 +154,8 @@
Related Information
-
ffprofile.com - Helps you to create a Firefox profile with the defaults you like.
+
\ No newline at end of file
diff --git a/_includes/sections/browser-webrtc.html b/_includes/sections/browser-webrtc.html
index 19fd4dc2..e0b0062e 100644
--- a/_includes/sections/browser-webrtc.html
+++ b/_includes/sections/browser-webrtc.html
@@ -1,13 +1,13 @@
WebRTC IP Leak Test - Is your IP address leaking?
- WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.
+ WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.
While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.
\ No newline at end of file
diff --git a/_includes/sections/calendar-contacts-sync.html b/_includes/sections/calendar-contacts-sync.html
index 6a4ff713..83370ee1 100644
--- a/_includes/sections/calendar-contacts-sync.html
+++ b/_includes/sections/calendar-contacts-sync.html
@@ -1,12 +1,12 @@
Calendar and Contacts Sync
- If you are currently using a calendar and or contacts synchronization service like Google Sync or iCloud, you should pick an alternative here.
+ If you are currently using a calendar and or contacts synchronization service like Google Sync or iCloud, you should pick an alternative here.
- {% include card.html color="success"
+ {% include card.html color="success"
title="Nextcloud"
image="/assets/img/provider/Nextcloud.png"
url="https://nextcloud.com/"
@@ -14,7 +14,7 @@
description="NextCloud is a suite of client-server software for creating and using file hosting services. This includes calendar sync via CalDAV and contacts sync via CardDAV. Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server."
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="Email Providers"
image="/assets/img/misc/email.png"
url="../email"
@@ -23,7 +23,7 @@
description="Many email providers also offer calendar and or contacts sync services. Refer to the Email Providers section to choose an email provider and check if they also offer calendar and or contacts sync."
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="EteSync"
image="/assets/img/provider/etesync.png"
url="https://www.etesync.com/"
@@ -36,15 +36,15 @@
Worth Mentioning
-
- fruux - a unified contacts/calendaring system that works across platforms and devices.
-
+
+ fruux - a unified contacts/calendaring system that works across platforms and devices.
+
-
- Flock - a discontinued calendar and contacts sync service by Open Whisper Systems. Despite being shut down the source code is still available on GitHub.
-
+
+ Flock - a discontinued calendar and contacts sync service by Open Whisper Systems. Despite being shut down the source code is still available on GitHub.
+
-
- cloud backups - consider regularly exporting your calendar and or contacts and backing them up on a separate storage drive or uploading them to cloud storage (ideally after encrypting them).
-
-
+
+ cloud backups - consider regularly exporting your calendar and or contacts and backing them up on a separate storage drive or uploading them to cloud storage (ideally after encrypting them).
+
+
\ No newline at end of file
diff --git a/_includes/sections/cloud-storage.html b/_includes/sections/cloud-storage.html
index 90cbd5ff..15a89bf4 100644
--- a/_includes/sections/cloud-storage.html
+++ b/_includes/sections/cloud-storage.html
@@ -1,7 +1,7 @@
Encrypted Cloud Storage Services
- If you are currently using Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should pick an alternative here.
+ If you are currently using Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should pick an alternative here.
{% include cardv2.html
@@ -37,6 +37,6 @@ bsd=""
Worth Mentioning
-
Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
-
CryptPad - Free and end-to-end encrypted real time collaboration sharing folders, media, and documents.
-
+
Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
+
CryptPad - Free and end-to-end encrypted real time collaboration sharing folders, media, and documents.
+
\ No newline at end of file
diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html
index 6ce9a3c3..213a5547 100644
--- a/_includes/sections/dns.html
+++ b/_includes/sections/dns.html
@@ -30,13 +30,13 @@ github="https://github.com/jedisct1/dnscrypt-proxy"
Worth Mentioning
-
NoTrack - A network-wide DNS server which blocks Tracking sites. Currently works in Debian and Ubuntu.
-
Namecoin - A decentralized DNS open source information registration and transfer system based on the Bitcoin cryptocurrency.
-
Pi-hole - A network-wide DNS server for the Raspberry Pi. Blocks advertising and tracking domains for all devices on your network.
-
ICANN DNS resolvers with support for encrypted DNS
-
-
AdGuard DNS - A commercial, anycast DNS resolver with ad-blocking and support for DNS over HTTPS (DoH), DNS over TLS (DoT), and DNSCrypt. Warnings
-
BlahDNS - A small hobby ad-blocking DNS project with DoH, DoT, and DNSCrypt support. Servers located in Switzerland, Japan, and Germany. Warnings
-
PowerDNS - A best effort DoH service. Servers located in the Netherlands.
-
Quad9 DNS - A non-profit, anycast DNS provider founded by IBM, PCH, and Global Cyber Alliance. Provides malicious domain filtering and supports DoH, DoT, and DNSCrypt. Warnings
-
+
NoTrack - A network-wide DNS server which blocks Tracking sites. Currently works in Debian and Ubuntu.
+
Namecoin - A decentralized DNS open source information registration and transfer system based on the Bitcoin cryptocurrency.
+
Pi-hole - A network-wide DNS server for the Raspberry Pi. Blocks advertising and tracking domains for all devices on your network.
+
ICANN DNS resolvers with support for encrypted DNS
+
+
AdGuard DNS - A commercial, anycast DNS resolver with ad-blocking and support for DNS over HTTPS (DoH), DNS over TLS (DoT), and DNSCrypt. Warnings
+
BlahDNS - A small hobby ad-blocking DNS project with DoH, DoT, and DNSCrypt support. Servers located in Switzerland, Japan, and Germany. Warnings
+
PowerDNS - A best effort DoH service. Servers located in the Netherlands.
+
Quad9 DNS - A non-profit, anycast DNS provider founded by IBM, PCH, and Global Cyber Alliance. Provides malicious domain filtering and supports DoH, DoT, and DNSCrypt. Warnings
+
\ No newline at end of file
diff --git a/_includes/sections/email-alternatives.html b/_includes/sections/email-alternatives.html
index 94c48ff8..c42ddbfd 100644
--- a/_includes/sections/email-alternatives.html
+++ b/_includes/sections/email-alternatives.html
@@ -29,5 +29,5 @@ linux=""
Worth Mentioning
-
I2P-Bote - End-to-end encrypted decentralized mail system within the I2P network.
-
+
I2P-Bote - End-to-end encrypted decentralized mail system within the I2P network.
+
\ No newline at end of file
diff --git a/_includes/sections/email-clients.html b/_includes/sections/email-clients.html
index e4a0047b..3cb35f04 100644
--- a/_includes/sections/email-clients.html
+++ b/_includes/sections/email-clients.html
@@ -30,17 +30,17 @@ bsd=""
Privacy Email Tools
-
gpg4usb - A very easy to use and small portable editor to encrypt and decrypt any text-message or -file. For Windows and Linux. GPG tutorial.
Enigmail - A security extension to Thunderbird and Seamonkey. It enables you to write and receive email messages signed and/or encrypted with the OpenPGP standard.
-
TorBirdy - TorBirdy configures Thunderbird to make connections over the Tor anonymity network. This extension is in beta and should be considered experimental.
-
Email Privacy Tester - This tool will send an Email to your address and perform privacy-related tests.
+
gpg4usb - A very easy to use and small portable editor to encrypt and decrypt any text-message or -file. For Windows and Linux. GPG tutorial.
Enigmail - A security extension to Thunderbird and Seamonkey. It enables you to write and receive email messages signed and/or encrypted with the OpenPGP standard.
+
TorBirdy - TorBirdy configures Thunderbird to make connections over the Tor anonymity network. This extension is in beta and should be considered experimental.
+
Email Privacy Tester - This tool will send an Email to your address and perform privacy-related tests.
Worth Mentioning
-
K-9 Mail - An independent mail application for Android. It supports both POP3 and IMAP mailboxes, but only supports push mail for IMAP.
Mailpile (Beta) - A modern, fast web-mail client with user-friendly encryption and privacy features.
+
\ No newline at end of file
diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html
index f0a60683..029f6939 100644
--- a/_includes/sections/email-providers.html
+++ b/_includes/sections/email-providers.html
@@ -1,210 +1,211 @@
Privacy-Conscious Email Providers - No Affiliates
- All providers listed here are operating outside the US and support SMTP TLS. The table is sortable.
+ All providers listed here are operating outside the US and support SMTP TLS. The table is sortable.
-
-
-
-
Email Service
-
Website
-
Since
-
Server
-
Storage
-
Price / Year
-
Bitcoin
-
Encryption
-
Own Domain
-
-
+
+
+
+
Email Service
+
Website
+
Since
+
Server
+
Storage
+
Price / Year
+
Bitcoin
+
Encryption
+
Own Domain
+
+
-
+
-
-
-
-
-
-
-
-
-
2013
-
Switzerland
-
500 MB
-
Free
-
Accepted
-
Built-in
-
Yes
-
+
+
+
+
+
+
+
+
+
2013
+
Switzerland
+
500 MB
+
Free
+
Accepted
+
Built-in
+
Yes
+
-
-
-
-
-
-
-
-
2015
-
Netherlands
-
2 GB
-
Free
-
Accepted
-
Built-in
-
Yes
-
+
+
+
+
+
+
+
+
2015
+
Netherlands
+
2 GB
+
Free
+
Accepted
+
Built-in
+
Yes
+
-
-
-
-
-
-
-
-
2011
-
Germany
-
1 GB
-
Free
-
No
-
Built-in
-
Yes
-
+
+
+
+
+
+
+
+
2011
+
Germany
+
1 GB
+
Free
+
No
+
Built-in
+
Yes
+
-
-
-
-
-
-
-
-
2013
-
Belgium
-
500 MB
-
Free
-
Accepted
-
Built-in
-
Yes
-
+
+
+
+
+
+
+
+
2013
+
Belgium
+
500 MB
+
Free
+
Accepted
+
Built-in
+
Yes
+
-
-
-
+
+
+
-
-
-
-
-
2014
-
Germany
-
2 GB
-
12 €
-
Accepted
-
Built-in
-
Yes
-
+
+
+
+
+
2014
+
Germany
+
2 GB
+
12 €
+
Accepted
+
Built-in
+
Yes
+
-
-
-
-
-
-
-
-
2009
-
Germany
-
2 GB
-
12 €
-
No
-
Built-in
-
No
-
+
+
+
+
+
+
+
+
2009
+
Germany
+
2 GB
+
12 €
+
No
+
Built-in
+
No
+
-
-
-
+
+
+
-
-
-
-
-
1999
-
Norway
-
1 GB
-
$ 19.95
-
Yes
-
No
-
Yes
-
+
+
+
+
+
1999
+
Norway
+
1 GB
+
$ 19.95
+
Yes
+
No
+
Yes
+
-
-
-
-
-
-
-
-
2003
-
Switzerland
-
1 GB
-
$ 49.95
-
Accepted
-
Built-in
-
Yes
-
+
+
+
+
+
+
+
+
2003
+
Switzerland
+
1 GB
+
$ 49.95
+
Accepted
+
Built-in
+
Yes
+
-
-
-
-
-
-
-
-
2014
-
Netherlands
-
10 GB
-
$ 59.95
-
Accepted
-
Built-in
-
Yes
-
+
+
+
+
+
+
+
+
2014
+
Netherlands
+
10 GB
+
$ 59.95
+
Accepted
+
Built-in
+
Yes
+
-
-
-
-
-
-
-
-
2010
-
Switzerland
-
2 GB
-
$ 60
-
Accepted
-
No
-
Yes
-
+
+
+
+
+
+
+
+
2010
+
Switzerland
+
2 GB
+
$ 60
+
Accepted
+
No
+
Yes
+
-
-
+
+
Interesting Email Providers Under Development
-
Confidant Mail - An open-source non-SMTP cryptographic email system optimized for large file attachments. It is a secure and spam-resistant alternative to regular email and online file drop services. It
- uses GNU Privacy Guard (GPG) for content encryption and authentication, and TLS 1.2 with ephemeral keys for transport encryption.
-
Become Your Own Email Provider with Mail-in-a-Box
+
Confidant Mail - An open-source non-SMTP cryptographic email system optimized for large file attachments. It is a secure and spam-resistant alternative to regular email and online file drop services. It
+ uses GNU Privacy Guard (GPG) for content encryption and authentication, and TLS 1.2 with ephemeral keys for transport encryption.
+
+
Become Your Own Email Provider with Mail-in-a-Box
Take it a step further and get control of your email with this easy-to-deploy mail server in a box. Mail-in-a-Box lets you become your own mail service provider in a few easy steps. It's sort of like making your own Gmail, but one you control from top
-to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a working mail server. But you don't need to be a technology expert to set it up. More: https://mailinabox.email/
+ to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a working mail server. But you don't need to be a technology expert to set it up. More: https://mailinabox.email/
Related Information
-
Aging 'Privacy' Law Leaves Cloud E-Mail Open to Cops - Data stored in the cloud for longer than 6 months is considered abandoned and may be accessed by intelligence agencies without
- a warrant. Learning: Use an external email client like Thunderbird or Enigmail, download your emails and store them locally. Never leave them on the server.
Autistici/Inventati server compromised - The cryptographic services offered by the Autistici/Inventati server have been compromised on 15th June 2004. It was discovered on 21st June 2005. One year
- later. During an enquiry on a single mailbox, the Postal Police may have tapped for a whole year every user's private communication going through the server autistici.org/inventati.org.
-
+
Aging 'Privacy' Law Leaves Cloud E-Mail Open to Cops - Data stored in the cloud for longer than 6 months is considered abandoned and may be accessed by intelligence agencies without
+ a warrant. Learning: Use an external email client like Thunderbird or Enigmail, download your emails and store them locally. Never leave them on the server.
Autistici/Inventati server compromised - The cryptographic services offered by the Autistici/Inventati server have been compromised on 15th June 2004. It was discovered on 21st June 2005. One year
+ later. During an enquiry on a single mailbox, the Postal Police may have tapped for a whole year every user's private communication going through the server autistici.org/inventati.org.
+
\ No newline at end of file
diff --git a/_includes/sections/file-encryption.html b/_includes/sections/file-encryption.html
index ad374d8d..511f5c13 100644
--- a/_includes/sections/file-encryption.html
+++ b/_includes/sections/file-encryption.html
@@ -1,12 +1,12 @@
File Encryption Software
- If you are currently not using encryption software for your hard disk, emails or file archives, you should pick an encryption software here.
+ If you are currently not using encryption software for your hard disk, emails or file archives, you should pick an encryption software here.
- {% include card.html color="success"
+ {% include card.html color="success"
title="VeraCrypt - Disk Encryption"
image="/assets/img/tools/VeraCrypt.png"
url="https://veracrypt.fr/"
@@ -16,7 +16,7 @@
raised by the initial TrueCrypt code audit have been addressed."
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="GNU Privacy Guard - Email Encryption"
image="/assets/img/tools/GnuPG.png"
url="https://gpgtools.org/"
@@ -26,7 +26,7 @@
government. GPGTools for macOS."
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="PeaZip - File Archive Encryption"
image="/assets/img/tools/PeaZip.png"
url="http://www.peazip.org/"
@@ -41,7 +41,7 @@
Worth Mentioning
-
Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
-
DiskCryptor - A full disk and partition encryption system for Windows including the ability to encrypt the partition and disk on which the OS is installed.
-
Linux Unified Key Setup (LUKS) - A full disk encryption system for Linux using dm-crypt as the disk encryption backend. Included by default in Ubuntu. Available for Windows and Linux.
-
+
Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
+
DiskCryptor - A full disk and partition encryption system for Windows including the ability to encrypt the partition and disk on which the OS is installed.
+
Linux Unified Key Setup (LUKS) - A full disk encryption system for Linux using dm-crypt as the disk encryption backend. Included by default in Ubuntu. Available for Windows and Linux.
+
\ No newline at end of file
diff --git a/_includes/sections/file-sharing.html b/_includes/sections/file-sharing.html
index 3e56763e..3930d353 100644
--- a/_includes/sections/file-sharing.html
+++ b/_includes/sections/file-sharing.html
@@ -39,5 +39,5 @@ linux=""
Worth Mentioning
-
croc - Easily and securely send things from one computer to another.
-
+
croc - Easily and securely send things from one computer to another.
+
\ No newline at end of file
diff --git a/_includes/sections/file-sync.html b/_includes/sections/file-sync.html
index e7a8fd77..bbd2709f 100644
--- a/_includes/sections/file-sync.html
+++ b/_includes/sections/file-sync.html
@@ -2,14 +2,14 @@
- {% include card.html color="success"
+ {% include card.html color="success"
title="SparkleShare"
image="/assets/img/tools/SparkleShare.png"
url="https://sparkleshare.org/"
footer="OS: Windows, macOS, Linux."
description="SparkleShare creates a special folder on your computer. You can add remotely hosted folders (or \"projects\") to this folder. These projects will be automatically
kept in sync with both the host and all of your peers when someone adds, removes or edits a file."
- %} {% include card.html color="primary"
+ %} {% include card.html color="primary"
title="Syncthing"
image="/assets/img/tools/Syncthing.png"
url="https://syncthing.net/"
@@ -23,8 +23,8 @@
Worth Mentioning
-
- git-annex - Allows managing files with git, without checking the file contents into git. While that may seem paradoxical, it is useful when dealing with files larger than git can currently easily handle,
- whether due to limitations in memory, time, or disk space.
-
-
+
+ git-annex - Allows managing files with git, without checking the file contents into git. While that may seem paradoxical, it is useful when dealing with files larger than git can currently easily handle,
+ whether due to limitations in memory, time, or disk space.
+
+
\ No newline at end of file
diff --git a/_includes/sections/fourteen-eyes.html b/_includes/sections/fourteen-eyes.html
index 8beafd79..e56ed4b8 100644
--- a/_includes/sections/fourteen-eyes.html
+++ b/_includes/sections/fourteen-eyes.html
@@ -5,7 +5,7 @@
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.
- {% include panel.html color="danger"
+ {% include panel.html color="danger"
title="Five Eyes"
body='
@@ -18,7 +18,7 @@
'
%}
- {% include panel.html color="warning"
+ {% include panel.html color="warning"
title="Nine Eyes"
body='
@@ -30,7 +30,7 @@
'
%}
- {% include panel.html color="secondary"
+ {% include panel.html color="secondary"
title="Fourteen Eyes"
body='
@@ -42,4 +42,4 @@
'
%}
-
+
\ No newline at end of file
diff --git a/_includes/sections/header.html b/_includes/sections/header.html
index 44dffd87..93dfcd31 100644
--- a/_includes/sections/header.html
+++ b/_includes/sections/header.html
@@ -1,13 +1,13 @@
-
-
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
+
+
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html
index dd9b98b9..a3168328 100644
--- a/_includes/sections/instant-messenger.html
+++ b/_includes/sections/instant-messenger.html
@@ -1,7 +1,7 @@
Encrypted Instant Messenger
- If you are currently using an Instant Messenger like LINE, Telegram, Viber, WhatsApp or plain SMS messages you should pick an alternative here.
+ If you are currently using an Instant Messenger like LINE, Telegram, Viber, WhatsApp or plain SMS messages you should pick an alternative here.
Ricochet - Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with your contacts without revealing your location or IP address. ExperimentalDangerKeep Tor up to date
-
RetroShare - An E2E encrypted instant messaging and voice/video call client. RetroShare supports both TOR and I2P.
Kontalk - A community-driven instant messaging network. Supports end-to-end encryption. Both client-to-server and server-to-server channels are fully encrypted.
-
Status - Experimental A free and open-source, peer-to-peer, encrypted instant messanger with support for DAPPs.
+
Ricochet - Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with your contacts without revealing your location or IP address. ExperimentalDangerKeep Tor up to date
+
RetroShare - An E2E encrypted instant messaging and voice/video call client. RetroShare supports both TOR and I2P.
Kontalk - A community-driven instant messaging network. Supports end-to-end encryption. Both client-to-server and server-to-server channels are fully encrypted.
+
Status - Experimental A free and open-source, peer-to-peer, encrypted instant messanger with support for DAPPs.
@@ -75,31 +75,31 @@ web=""
Currently there are no known vulnerabilities with Ricochet. The software is safe to use as long as you update the included Tor binary to the latest version.
-
Run the Tor Browser installer or extract package for your platform. Windows (.exe), MacOSX (.dmg) and Linux (.tar.bz2).
-
Copy the Tor binary or create a symbolic link to it:
-
-
-
Windows: Copy the Tor binary included with the Tor Browser and overwrite the old one included with Ricochet.
-
-
Tor Browser binary: %HOMEPATH%\Desktop\Tor Browser\Browser\TorBrowser\Tor\tor.exe
-
Ricochet's included binary: %HOMEPATH%\Desktop\Ricochet\tor.exe
-
-
-
MacOSX: Assuming you copied the Tor Browser.app and Ricochet.app from their respective .dmg install media to /Applications:
- Create a symbolic link to the Tor binary in Terminal. Ricochet will continue to use the up to date version of the Tor binary when you update the Tor Browser Bundle.
Run the Tor Browser installer or extract package for your platform. Windows (.exe), MacOSX (.dmg) and Linux (.tar.bz2).
+
Copy the Tor binary or create a symbolic link to it:
+
+
+
Windows: Copy the Tor binary included with the Tor Browser and overwrite the old one included with Ricochet.
+
+
Tor Browser binary: %HOMEPATH%\Desktop\Tor Browser\Browser\TorBrowser\Tor\tor.exe
+
Ricochet's included binary: %HOMEPATH%\Desktop\Ricochet\tor.exe
+
+
+
MacOSX: Assuming you copied the Tor Browser.app and Ricochet.app from their respective .dmg install media to /Applications:
+ Create a symbolic link to the Tor binary in Terminal. Ricochet will continue to use the up to date version of the Tor binary when you update the Tor Browser Bundle.
+
\ No newline at end of file
diff --git a/_includes/sections/key-disclosure-law.html b/_includes/sections/key-disclosure-law.html
index 6a554f03..c0d24c40 100644
--- a/_includes/sections/key-disclosure-law.html
+++ b/_includes/sections/key-disclosure-law.html
@@ -2,11 +2,12 @@
Who is required to hand over the encryption keys to authorities?
-
Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
+
Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
+
Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
- {% include panel.html color="danger"
+ {% include panel.html color="danger"
title="Key disclosure laws apply"
body='
@@ -24,7 +25,7 @@
'
%}
- {% include panel.html color="warning"
+ {% include panel.html color="warning"
title="Key disclosure laws may apply"
body='
@@ -38,7 +39,7 @@
'
%}
- {% include panel.html color="success"
+ {% include panel.html color="success"
title="Key disclosure laws don't apply"
body='
@@ -60,9 +61,9 @@
Why is it not recommended to choose a US-based service?
@@ -72,17 +73,17 @@
Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
An example of this is Lavabit – a secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access
-communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
+ communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order.
+
\ No newline at end of file
diff --git a/_includes/sections/live-operating-systems.html b/_includes/sections/live-operating-systems.html
index 80450669..42a481e6 100644
--- a/_includes/sections/live-operating-systems.html
+++ b/_includes/sections/live-operating-systems.html
@@ -2,7 +2,7 @@
- {% include card.html color="success"
+ {% include card.html color="success"
title="Tails"
labels="warning:contrib:This software may depend on or recommend non-free software."
image="/assets/img/tools/Tails.png"
@@ -10,7 +10,7 @@
description="Tails is a live operating system, that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and helps to: Use the Internet anonymously and circumvent censorship; Internet connections go through the Tor network; leave no trace on the computer; use state-of-the-art cryptographic tools to encrypt files, emails and instant messaging."
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="KNOPPIX"
labels="warning:contrib:This software may depend on or recommend non-free software."
image="/assets/img/tools/KNOPPIX.png"
@@ -19,7 +19,7 @@
description="Knoppix is an operating system based on Debian designed to be run directly from a CD / DVD (Live CD) or a USB flash drive (Live USB), one of the first of its kind for any operating system. When starting a program, it is loaded from the removable medium and decompressed into a RAM drive. The decompression is transparent and on-the-fly."
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="Puppy Linux"
labels="warning:contrib:This software may depend on or recommend non-free software."
image="/assets/img/tools/Puppy-Linux.png"
@@ -32,6 +32,6 @@
Worth Mentioning
-
Tiny Core Linuxcontrib - A minimal Linux operating system focusing on providing a base system using BusyBox and FLTK. The distribution is notable for its size (15 MB) and minimalism, with additional functionality
- provided by extensions.
-
+
Tiny Core Linuxcontrib - A minimal Linux operating system focusing on providing a base system using BusyBox and FLTK. The distribution is notable for its size (15 MB) and minimalism, with additional functionality
+ provided by extensions.
+
\ No newline at end of file
diff --git a/_includes/sections/mobile-operating-systems.html b/_includes/sections/mobile-operating-systems.html
index 3884ba7f..dedf2742 100644
--- a/_includes/sections/mobile-operating-systems.html
+++ b/_includes/sections/mobile-operating-systems.html
@@ -1,12 +1,12 @@
Mobile Operating Systems
- Even though the source code of the following OS is provided, installing Google Apps may compromise your setup.
+ Even though the source code of the following OS is provided, installing Google Apps may compromise your setup.
- {% include card.html color="success"
+ {% include card.html color="success"
title="LineageOS"
labels="warning:contrib:This software may depend on or recommend non-free software."
image="/assets/img/tools/LineageOS.png"
@@ -14,7 +14,7 @@
description="LineageOS is a free and open-source operating system for smartphones and tablets, based on the official releases of the Android Open Source Project. It is the continuation of the CyanogenMod project."
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="Ubuntu Touch"
labels="warning:contrib:This software may depend on or recommend non-free software."
image="/assets/img/tools/Ubuntu-Touch.png"
@@ -22,7 +22,7 @@
description="Ubuntu Touch is a free and open-source operating system for smartphones and tablets. It's an alternative to the current popular mobile operating systems on the market. Only a few devices are supported."
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="GrapheneOS"
labels="warning:contrib:This software may depend on or recommend non-free software."
image="/assets/img/tools/GrapheneOS.png"
@@ -35,7 +35,7 @@
Worth Mentioning
-
Replicant - An open-source operating system based on Android, aiming to replace all proprietary components with free software.
-
OmniROMcontrib - A free software operating system for smartphones and tablet computers, based on the Android mobile platform.
-
MicroGcontrib - A project that aims to reimplement the proprietary Google Play Services in the Android operating system with a FLOSS replacement.
-
+
Replicant - An open-source operating system based on Android, aiming to replace all proprietary components with free software.
+
OmniROMcontrib - A free software operating system for smartphones and tablet computers, based on the Android mobile platform.
+
MicroGcontrib - A project that aims to reimplement the proprietary Google Play Services in the Android operating system with a FLOSS replacement.
+
\ No newline at end of file
diff --git a/_includes/sections/notebooks.html b/_includes/sections/notebooks.html
index 219f867a..fcf7911f 100644
--- a/_includes/sections/notebooks.html
+++ b/_includes/sections/notebooks.html
@@ -1,12 +1,12 @@
Digital Notebook
- If you are currently using an application like Evernote, Google Keep or Microsoft OneNote you should pick an alternative here.
+ If you are currently using an application like Evernote, Google Keep or Microsoft OneNote you should pick an alternative here.
- {% include card.html color="success"
+ {% include card.html color="success"
title="Joplin"
image="/assets/img/tools/Joplin.png"
url="https://joplinapp.org/"
@@ -14,7 +14,7 @@
description="Joplin is a free, open source, fully featured note taking and to-do application, which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE encryption and can sync through Nextcloud, Dropbox and more. It also offers easy import from Evernote and plain text notes."
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="Standard Notes"
image="/assets/img/tools/StandardNotes.png"
url="https://standardnotes.org/"
@@ -22,7 +22,7 @@
description="Standard Notes is a simple and private notes app that makes your notes easy and available everywhere you are. Features end-to-end encryption on every platform, and a powerful desktop experience with themes and custom editors."
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="Turtl"
image="/assets/img/tools/Turtl.png"
url="https://turtlapp.com/"
@@ -35,13 +35,13 @@
Warning
-
Note: As of Dec 2018, Joplin does not support password/pin protection for the application itself or individual notes/notebooks. Data is still encrypted in transit and at sync location using your master key. See open issue.
+
Note: As of Dec 2018, Joplin does not support password/pin protection for the application itself or individual notes/notebooks. Data is still encrypted in transit and at sync location using your master key. See open issue.
Worth Mentioning
-
Notable - The markdown-based note-taking app that doesn't suck.
-
Paperwork - Open source and self-hosted solution. For PHP / MySQL servers.
-
Org-mode - A major mode for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system.
-
+
Notable - The markdown-based note-taking app that doesn't suck.
+
Paperwork - Open source and self-hosted solution. For PHP / MySQL servers.
+
Org-mode - A major mode for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system.
+
\ No newline at end of file
diff --git a/_includes/sections/operating-systems.html b/_includes/sections/operating-systems.html
index 8c546a3b..2c7ff280 100644
--- a/_includes/sections/operating-systems.html
+++ b/_includes/sections/operating-systems.html
@@ -1,12 +1,12 @@
PC Operating Systems
- If you are currently using a operating system like Microsoft Windows or Apple macOS, you should pick an alternative here.
+ If you are currently using a operating system like Microsoft Windows or Apple macOS, you should pick an alternative here.
- {% include card.html color="success"
+ {% include card.html color="success"
title="Qubes OS"
labels="warning:contrib:This software may depend on or recommend non-free software."
image="/assets/img/tools/Qubes-OS.png"
@@ -15,7 +15,7 @@
description="Qubes is an open-source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, the X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers."
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="Debian"
image="/assets/img/tools/Debian.png"
url="https://www.debian.org/"
@@ -23,7 +23,7 @@
description="Debian is a Unix-like computer operating system and a Linux distribution that is composed entirely of free and open-source software, most of which is under the GNU General Public License, and packaged by a group of individuals known as the Debian project."
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="Trisquel"
image="/assets/img/tools/Trisquel.png"
url="https://trisquel.info/"
@@ -35,17 +35,17 @@
OpenBSD - A project that produces a free, multi-platform 4.4BSD-based UNIX-like operating system. Emphasizes portability, standardization, correctness, proactive security and integrated cryptography.
-
Arch Linux - A simple, lightweight Linux distribution. It is composed predominantly of free and open-source software, and supports community involvement. Parabola is a
- completely open source version of Arch Linux.
-
Whonixcontrib - A Debian GNU/Linux based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation"
- and a Tor "Gateway". All communication are forced through the Tor network to accomplish this.
-
Subgraph OScontrib - Another Debian based Linux distribution, it features security hardening which makes it more resistant to security vulnerabilities. Subgraph runs many desktop applications in a security sandbox to limit their risk in case of compromise.
- By default, it anonymizes Internet traffic by sending it through the Tor network. Note: It is still in alpha, and much testing and bug fixing still has to be done.
-
+
OpenBSD - A project that produces a free, multi-platform 4.4BSD-based UNIX-like operating system. Emphasizes portability, standardization, correctness, proactive security and integrated cryptography.
+
Arch Linux - A simple, lightweight Linux distribution. It is composed predominantly of free and open-source software, and supports community involvement. Parabola is a
+ completely open source version of Arch Linux.
+
Whonixcontrib - A Debian GNU/Linux based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation"
+ and a Tor "Gateway". All communication are forced through the Tor network to accomplish this.
+
Subgraph OScontrib - Another Debian based Linux distribution, it features security hardening which makes it more resistant to security vulnerabilities. Subgraph runs many desktop applications in a security sandbox to limit their risk in case of compromise.
+ By default, it anonymizes Internet traffic by sending it through the Tor network. Note: It is still in alpha, and much testing and bug fixing still has to be done.
+
\ No newline at end of file
diff --git a/_includes/sections/participate.html b/_includes/sections/participate.html
index a4ce8b99..088300b6 100644
--- a/_includes/sections/participate.html
+++ b/_includes/sections/participate.html
@@ -1,12 +1,12 @@
-
Participate with suggestions and constructive criticism
+
Participate with suggestions and constructive criticism
It's important for a website like privacytools.io to stay up-to-date. Keep an eye on software updates for the applications listed on our site. Follow recent news about providers that we recommend. We try our best to keep up, but we're not perfect and the internet is changing fast. If you find an error, or you think a provider should not be listed here, or a qualified service provider is missing, or a browser plugin is not the best choice anymore, or anything else... Talk to us please. You can also find us on our own Mastodon instance or on Matrix at #general:privacytools.io.
- {% include card.html color="success"
+ {% include card.html color="success"
title="Discourse & Reddit"
image="/assets/img/icons/discourse.png"
url="https://forum.privacytools.io/"
@@ -15,7 +15,7 @@
description='Join our Discourse community to stay up to date on privacy news or make suggestions!'
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="Follow on Mastodon & Twitter"
image="/assets/img/icons/mastodon.png"
url="https://social.privacytools.io/"
@@ -24,7 +24,7 @@
description="Get the latest privacy-related updates from our Mastodon Feed. Follow us today!"
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="Develop on GitHub"
image="/assets/img/icons/github.png"
url="https://github.com/privacytoolsIO/privacytools.io"
@@ -35,4 +35,4 @@
-
This is a community project aiming to deliver the best information available to improve privacy online. Thank you for participating. This project needs you.
+
This is a community project aiming to deliver the best information available to improve privacy online. Thank you for participating. This project needs you.
\ No newline at end of file
diff --git a/_includes/sections/password-managers.html b/_includes/sections/password-managers.html
index 57624ed7..7d1e7fcc 100644
--- a/_includes/sections/password-managers.html
+++ b/_includes/sections/password-managers.html
@@ -1,12 +1,12 @@
Password Manager Software
- If you are currently using a password manager software like 1Password, LastPass, Roboform or iCloud Keychain, you should pick an alternative here.
+ If you are currently using a password manager software like 1Password, LastPass, Roboform or iCloud Keychain, you should pick an alternative here.
- {% include card.html color="success"
+ {% include card.html color="success"
title="Bitwarden - Cloud/Self-host"
image="/assets/img/tools/bitwarden.png"
url="https://bitwarden.com/"
@@ -14,7 +14,7 @@
description="Bitwarden is a free and open source password manager. It aims to solve password management problems for individuals, teams, and business organizations. Bitwarden is among the easiest and safest solutions to store all of your logins and passwords while conveniently keeping them synced between all of your devices. If you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden server."
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="KeePass / KeePassXC - Local"
image="/assets/img/tools/KeePass.png"
url="https://keepass.info/download.html"
@@ -23,7 +23,7 @@
description='KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. All passwords in one database, which is locked with one
master key or a key file. The databases are encrypted using the best and most secure encryption algorithms currently known: AES and Twofish. See also: KeePassXC with official native cross-platform support for Windows/macOS/Linux.'
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="LessPass - Browser"
image="/assets/img/tools/LessPass.png"
url="https://lesspass.com/"
@@ -36,22 +36,22 @@
Worth Mentioning
-
- Master Password - Master Password is based on an ingenious password generation algorithm that guarantees your passwords can never be lost. Its passwords aren't stored: they are generated on-demand from your name, the site and your master password. No syncing, backups or internet access needed.
-
+
+ Master Password - Master Password is based on an ingenious password generation algorithm that guarantees your passwords can never be lost. Its passwords aren't stored: they are generated on-demand from your name, the site and your master password. No syncing, backups or internet access needed.
+
-
- Psono - Free and open source password manager for teams with client side encryption and secure sharing of passwords, files, bookmarks, emails... All secrets are protected by a master password. Uses NACL Crypto, a combination of Curve25519, Salsa20 and Poly1305.
-
+
+ Psono - Free and open source password manager for teams with client side encryption and secure sharing of passwords, files, bookmarks, emails... All secrets are protected by a master password. Uses NACL Crypto, a combination of Curve25519, Salsa20 and Poly1305.
+
-
- Password Safe - Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted username/password list. With Password Safe all you have to do is create and remember
- a single "Master Password" of your choice in order to unlock and access your entire username/password list.
-
+
+ Password Safe - Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted username/password list. With Password Safe all you have to do is create and remember
+ a single "Master Password" of your choice in order to unlock and access your entire username/password list.
+
+
\ No newline at end of file
diff --git a/_includes/sections/privacy-resources.html b/_includes/sections/privacy-resources.html
index e4340e80..4a6f8626 100644
--- a/_includes/sections/privacy-resources.html
+++ b/_includes/sections/privacy-resources.html
@@ -3,41 +3,41 @@
Guides
-
Surveillance Self-Defense by EFF - Guide to defending yourself from surveillance by using secure technology and developing careful practices.
-
The Crypto Paper - Privacy, Security and Anonymity for Every Internet User.
The Ultimate Privacy Guide - Excellent privacy guide written by the creators of the bestVPN.com website.
-
IVPN Privacy Guides - These privacy guides explain how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation.
The Ultimate Privacy Guide - Excellent privacy guide written by the creators of the bestVPN.com website.
+
IVPN Privacy Guides - These privacy guides explain how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation.
PRISM Break - We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
-
Security in-a-Box - A guide to digital security for activists and human rights defenders throughout the world.
-
SecureDrop - An open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. It was originally created
- by the late Aaron Swartz and is currently managed by Freedom of the Press Foundation.
-
Reset The Net - Privacy Pack - Help fight to end mass surveillance. Get these tools to protect yourself and your friends.
-
Security First - Umbrella is an Android app that provides all the advice needed to operate safely in a hostile environment.
PRISM Break - We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
+
Security in-a-Box - A guide to digital security for activists and human rights defenders throughout the world.
+
SecureDrop - An open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. It was originally created
+ by the late Aaron Swartz and is currently managed by Freedom of the Press Foundation.
+
Reset The Net - Privacy Pack - Help fight to end mass surveillance. Get these tools to protect yourself and your friends.
+
Security First - Umbrella is an Android app that provides all the advice needed to operate safely in a hostile environment.
Osalt - A directory to help you find open source alternatives to proprietary tools.
+
AlternativeTo - A directory to help find alternatives to other software, with the option to only show open source software
-
Note: Just being open source does not make software secure!
+
Note: Just being open source does not make software secure!
\ No newline at end of file
diff --git a/_includes/sections/productivity-tools.html b/_includes/sections/productivity-tools.html
index 01c36154..2fdbe3ca 100644
--- a/_includes/sections/productivity-tools.html
+++ b/_includes/sections/productivity-tools.html
@@ -2,7 +2,7 @@
- {% include card.html color="success"
+ {% include card.html color="success"
title="CryptPad"
image="/assets/img/provider/CryptPad.png"
@@ -12,7 +12,7 @@
footer='OS: Linux, macOS, Windows, Web.'
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="Etherpad"
image="/assets/img/tools/Etherpad.png"
url="https://etherpad.org/"
@@ -20,7 +20,7 @@
description="Etherpad is a highly customizable Open Source online editor providing collaborative editing in really real-time. Etherpad allows you to edit documents collaboratively in real-time, much like a live multi-player editor that runs in your browser. Write articles, press releases, to-do lists, etc. Sites That Run Etherpad"
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="Write.as"
image="/assets/img/tools/WriteAs.png"
url="https://write.as/"
@@ -34,10 +34,10 @@
Worth Mentioning
-
Cryptee - Free privacy-friendly service for storing Documents, files and Photos
-
EtherCalc - EtherCalc is a web spreadsheet. Data is saved on the web, and people can edit the same document at the same time. Changes are instantly reflected on all screens. Work together on inventories, survey forms, list management, brainstorming sessions.
-
disroot.org - Free privacy-friendly service that offers Etherpad, EtherCalc and PrivateBin.
-
dudle - An online scheduling application, which is free and OpenSource. Schedule meetings or make small online polls. No email collection or the need of registration.
VSCodium - Fork of Visual Studio Code editor without Microsoft's tracking
-
+
Cryptee - Free privacy-friendly service for storing Documents, files and Photos
+
EtherCalc - EtherCalc is a web spreadsheet. Data is saved on the web, and people can edit the same document at the same time. Changes are instantly reflected on all screens. Work together on inventories, survey forms, list management, brainstorming sessions.
+
disroot.org - Free privacy-friendly service that offers Etherpad, EtherCalc and PrivateBin.
+
dudle - An online scheduling application, which is free and OpenSource. Schedule meetings or make small online polls. No email collection or the need of registration.
VSCodium - Fork of Visual Studio Code editor without Microsoft's tracking
+
\ No newline at end of file
diff --git a/_includes/sections/quotes.html b/_includes/sections/quotes.html
index fed23a8a..a5fae21c 100644
--- a/_includes/sections/quotes.html
+++ b/_includes/sections/quotes.html
@@ -1,43 +1,43 @@
-
Privacy? I don't have anything to hide.
+
Privacy? I don't have anything to hide.
-
- Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a
- pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I
- want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
-
+
+ Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a
+ pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I
+ want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
+
-
The primary reason for window curtains in our house, is to stop people from being able to see in. The reason we don’t want them to see in is because we consider much of what we do inside our homes to be private. Whether that be having dinner at the table, watching a movie with your kids, or even engaging in intimate or sexual acts with your partner. None of these things are illegal by any means but even knowing this, we still keep the curtains and blinds on our windows. We clearly have this strong desire for privacy when it comes to our personal life and the public.
-
+
The primary reason for window curtains in our house, is to stop people from being able to see in. The reason we don’t want them to see in is because we consider much of what we do inside our homes to be private. Whether that be having dinner at the table, watching a movie with your kids, or even engaging in intimate or sexual acts with your partner. None of these things are illegal by any means but even knowing this, we still keep the curtains and blinds on our windows. We clearly have this strong desire for privacy when it comes to our personal life and the public.
Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.
-
+
Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.
+
-
The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all
- I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. I don't want to live in a society that does these sort of things... I do not want to live in a world where everything I do and say is recorded. That is
- not something I am willing to support or live under.
-
+
The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all
+ I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. I don't want to live in a society that does these sort of things... I do not want to live in a world where everything I do and say is recorded. That is
+ not something I am willing to support or live under.
+
-
We all need places where we can go to explore without the judgmental eyes of other people being cast upon us, only in a realm where we're not being watched can we really test the limits of who we want to be. It's really in the private realm where
- dissent, creativity and personal exploration lie.
-
-
+
We all need places where we can go to explore without the judgmental eyes of other people being cast upon us, only in a realm where we're not being watched can we really test the limits of who we want to be. It's really in the private realm where
+ dissent, creativity and personal exploration lie.
+
+
\ No newline at end of file
diff --git a/_includes/sections/resources.html b/_includes/sections/resources.html
index 3cba057a..5f1928b8 100644
--- a/_includes/sections/resources.html
+++ b/_includes/sections/resources.html
@@ -4,7 +4,7 @@
- {% include card.html color="success"
+ {% include card.html color="success"
title="Providers"
icon="fas fa-server"
iconcolor="dark"
@@ -12,7 +12,7 @@
description="Discover privacy-centric online services, including email providers, VPN operators, DNS administrators, and more!"
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="Web Browsers"
icon="far fa-compass"
iconcolor="dark"
@@ -20,7 +20,7 @@
description="Find a web browser that respects your privacy, and discover how to harden your browser against tracking and leaks."
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="Software"
icon="far fa-window-restore"
iconcolor="dark"
@@ -28,7 +28,7 @@
description="Discover a variety of open source software built to protect your privacy and keep your digital data secure."
%}
- {% include card.html color="info"
+ {% include card.html color="info"
title="Operating Systems"
icon="fas fa-desktop"
iconcolor="dark"
@@ -36,7 +36,7 @@
description="Find out how your operating system is comprimising your privacy, and what simple alternatives exist."
%}
- {% include card.html color="secondary"
+ {% include card.html color="secondary"
title="privacytoolsIO Services"
icon="far fa-eye-slash"
iconcolor="dark"
@@ -44,7 +44,7 @@
description="The privacytools.io team is proud to launch a variety of privacy-centric online services, including a Mastodon instance, search engine, and more!"
%}
- {% include card.html color="danger"
+ {% include card.html color="danger"
title="Donate"
icon="fas fa-donate"
iconcolor="dark"
@@ -52,4 +52,4 @@
description="We can't operate this site without the generous contributions we receive from our viewers. If you love privacy and our website please consider donating."
%}
-
+
\ No newline at end of file
diff --git a/_includes/sections/router-firmware.html b/_includes/sections/router-firmware.html
index 40395a7d..148f0981 100644
--- a/_includes/sections/router-firmware.html
+++ b/_includes/sections/router-firmware.html
@@ -2,7 +2,7 @@
- {% include card.html color="success"
+ {% include card.html color="success"
title="OpenWrt"
labels="warning:contrib:This software may depend on or recommend non-free software."
image="/assets/img/tools/OpenWrt.png"
@@ -10,7 +10,7 @@
description="OpenWrt is an operating system (in particular, an embedded operating system) based on the Linux kernel, primarily used on embedded devices to route network traffic. The main components are the Linux kernel, util-linux, uClibc and BusyBox. All components have been optimized for size, to be small enough for fitting into the limited storage and memory available in home routers."
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="pfSense"
labels="warning:contrib:This software may depend on or recommend non-free software."
image="/assets/img/tools/pfSense.png"
@@ -18,7 +18,7 @@
description="pfSense is an open source firewall/router computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for a network and is noted for its reliability and offering features often only found in expensive commercial firewalls. pfSense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and as a VPN endpoint."
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="LibreCMC"
image="/assets/img/tools/LibreCMC.png"
url="https://librecmc.org"
@@ -30,6 +30,6 @@
Worth Mentioning
-
OpenBSD - A project that produces a free, multi-platform 4.4BSD-based UNIX-like operating system. Emphasizes portability, standardization, correctness, proactive security and integrated cryptography.
-
DD-WRTcontrib - A is Linux-based firmware for wireless routers and wireless access points. It is compatible with several models of routers and access points.
-
+
OpenBSD - A project that produces a free, multi-platform 4.4BSD-based UNIX-like operating system. Emphasizes portability, standardization, correctness, proactive security and integrated cryptography.
+
DD-WRTcontrib - A is Linux-based firmware for wireless routers and wireless access points. It is compatible with several models of routers and access points.
+
\ No newline at end of file
diff --git a/_includes/sections/search-engines.html b/_includes/sections/search-engines.html
index 37e49982..e63a55c2 100644
--- a/_includes/sections/search-engines.html
+++ b/_includes/sections/search-engines.html
@@ -1,7 +1,7 @@
Privacy Respecting Search Engines
- If you are currently using search engines like Google, Bing or Yahoo, you should pick an alternative here.
+ If you are currently using search engines like Google, Bing or Yahoo, you should pick an alternative here.
{% include cardv2.html
@@ -45,17 +45,17 @@ github="https://github.com/Qwant/"
Firefox Addon
-
- Google search link fix - Firefox extension that prevents Google and Yandex search pages from modifying search result links when you click them. This is useful when
- copying links but it also helps privacy by preventing the search engines from recording your clicks. (Open Source)
-
+
+ Google search link fix - Firefox extension that prevents Google and Yandex search pages from modifying search result links when you click them. This is useful when
+ copying links but it also helps privacy by preventing the search engines from recording your clicks. (Open Source)
+
Worth Mentioning
-
YaCy - A free software P2P search engine powered by its users.
-
Jive Search - A free software search engine with a similar look and feel to Google.
-
MetaGer - An open source metasearch engine, which is based in Germany. It focuses on protecting the user's privacy.
-
Mojeek - Independent and unbiased search results with no user tracking.
-
+
YaCy - A free software P2P search engine powered by its users.
+
Jive Search - A free software search engine with a similar look and feel to Google.
+
MetaGer - An open source metasearch engine, which is based in Germany. It focuses on protecting the user's privacy.
+
Mojeek - Independent and unbiased search results with no user tracking.
+
\ No newline at end of file
diff --git a/_includes/sections/self-contained-networks.html b/_includes/sections/self-contained-networks.html
index 083d08ac..4880754e 100644
--- a/_includes/sections/self-contained-networks.html
+++ b/_includes/sections/self-contained-networks.html
@@ -1,12 +1,12 @@
Self-contained Networks
- If you are currently browsing clearnet and want to access the dark web, this section is for you.
+ If you are currently browsing clearnet and want to access the dark web, this section is for you.
- {% include card.html color="success"
+ {% include card.html color="success"
title="Tor Browser"
image="/assets/img/tools/Tor-Project.png"
url="https://www.torproject.org/"
@@ -15,7 +15,7 @@
description="The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Tor is an effective censorship circumvention tool."
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="I2P Anonymous Network"
image="/assets/img/tools/I2P.png"
url="https://geti2p.net/"
@@ -24,7 +24,7 @@
Web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. The software is free and open source and is published under multiple licenses."
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="The Freenet Project"
image="/assets/img/tools/Freenet.png"
url="https://freenetproject.org/"
@@ -39,15 +39,15 @@
Yggdrasil - An early-stage implementation of a fully end-to-end encrypted IPv6 network. It is lightweight, self-arranging, supported on multiple platforms and allows pretty much any IPv6-capable application to communicate securely with other Yggdrasil nodes. Yggdrasil does not require you to have IPv6 Internet connectivity - it also works over IPv4. experimental privacy warning
-
+
ZeroNet - Open, free and uncensorable websites, using Bitcoin cryptography and BitTorrent network.
+
RetroShare - Open Source cross-platform, Friend-2-Friend and secure decentralized communication platform.
+
GNUnet - GNUnet provides a strong foundation of free software for a global, distributed network that provides security and privacy.
Yggdrasil - An early-stage implementation of a fully end-to-end encrypted IPv6 network. It is lightweight, self-arranging, supported on multiple platforms and allows pretty much any IPv6-capable application to communicate securely with other Yggdrasil nodes. Yggdrasil does not require you to have IPv6 Internet connectivity - it also works over IPv4. experimental privacy warning
+
\ No newline at end of file
diff --git a/_includes/sections/selfhosted-cloud.html b/_includes/sections/selfhosted-cloud.html
index ca02b5d0..22fad14b 100644
--- a/_includes/sections/selfhosted-cloud.html
+++ b/_includes/sections/selfhosted-cloud.html
@@ -1,12 +1,12 @@
Self-Hosted Cloud Server Software
- If you are currently using a Cloud Storage Services like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should think about hosting it on your own.
+ If you are currently using a Cloud Storage Services like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should think about hosting it on your own.
- {% include card.html color="success"
+ {% include card.html color="success"
title="Pydio"
image="/assets/img/tools/Pydio.png"
url="https://pydio.com/"
@@ -15,7 +15,7 @@
to SaaS Boxes and Drives, with more control, safety and privacy, and favorable TCOs."
%}
- {% include card.html color="primary"
+ {% include card.html color="primary"
title="Tahoe-LAFS"
image="/assets/img/tools/Tahoe-LAFS.png"
url="https://www.tahoe-lafs.org/"
@@ -24,7 +24,7 @@
taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security."
%}
- {% include card.html color="warning"
+ {% include card.html color="warning"
title="Nextcloud"
image="/assets/img/provider/Nextcloud.png"
url="https://nextcloud.com/"
@@ -36,5 +36,5 @@
Worth Mentioning
-
CryptPad - End-to-end encrypted real time collaboration sharing folders, media, and documents (open-source).
-
+
CryptPad - End-to-end encrypted real time collaboration sharing folders, media, and documents (open-source).
+
\ No newline at end of file
diff --git a/_includes/sections/social-networks.html b/_includes/sections/social-networks.html
index 8acac077..8725458c 100644
--- a/_includes/sections/social-networks.html
+++ b/_includes/sections/social-networks.html
@@ -1,7 +1,7 @@
Decentralized Social Networks
- If you are currently using Social Networks like Facebook or Twitter, you should pick an alternative here.
+ If you are currently using Social Networks like Facebook or Twitter, you should pick an alternative here.
{% include cardv2.html
@@ -66,21 +66,21 @@ web=""
Worth Mentioning
-
Minds - An open source and distributed social networking service, integrating the blockchain to reward the community.
-
Movim - Federated social platform that relies on the XMPP standard and therefore allows you to exchange with many other clients on all devices.
+
Minds - An open source and distributed social networking service, integrating the blockchain to reward the community.
+
Movim - Federated social platform that relies on the XMPP standard and therefore allows you to exchange with many other clients on all devices.
Stop using Facebook - A curated list of reasons to stop using Facebook and how to do it.
+
\ No newline at end of file
diff --git a/_includes/sections/voice-video-messenger.html b/_includes/sections/voice-video-messenger.html
index 2f5a0988..a42a95bf 100644
--- a/_includes/sections/voice-video-messenger.html
+++ b/_includes/sections/voice-video-messenger.html
@@ -1,7 +1,7 @@
Encrypted Video & Voice Messenger
- If you are currently using a Video & Voice Messenger like Skype, Viber or Google Hangouts, you should pick an alternative here.
+ If you are currently using a Video & Voice Messenger like Skype, Viber or Google Hangouts, you should pick an alternative here.
{% include cardv2.html
@@ -57,14 +57,14 @@ web=""
Worth Mentioning
-
Jitsi - Jitsi is a free and open source multiplatform voice (VoIP), videoconferencing and instant messaging application.
-
Tox - Experimental A free and open-source, peer-to-peer, encrypted instant messaging and video calling software.
-
Jami (formerly Ring/SFLphone) - Gives you a full control over your communications and an unmatched level of privacy.
+
Jitsi - Jitsi is a free and open source multiplatform voice (VoIP), videoconferencing and instant messaging application.
+
Tox - Experimental A free and open-source, peer-to-peer, encrypted instant messaging and video calling software.
+
Jami (formerly Ring/SFLphone) - Gives you a full control over your communications and an unmatched level of privacy.
+
\ No newline at end of file
diff --git a/_includes/sections/vpn.html b/_includes/sections/vpn.html
index 2fd3fe8d..de89be40 100644
--- a/_includes/sections/vpn.html
+++ b/_includes/sections/vpn.html
@@ -1,316 +1,316 @@
Privacy VPN Services
- All providers listed here are outside the US, use encryption, accept Bitcoin, support OpenVPN and have a no logging policy.
+ All providers listed here are outside the US, use encryption, accept Bitcoin, support OpenVPN and have a no logging policy.
- Note: Using a VPN provider will not make you anonymous. But it will give you a better privacy. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.
+ Note: Using a VPN provider will not make you anonymous. But it will give you a better privacy. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.
\ No newline at end of file
diff --git a/_includes/sections/warrant-canary.html b/_includes/sections/warrant-canary.html
index cc45d24b..cc2ba601 100644
--- a/_includes/sections/warrant-canary.html
+++ b/_includes/sections/warrant-canary.html
@@ -7,16 +7,16 @@
+
\ No newline at end of file
diff --git a/_includes/sections/windows10.html b/_includes/sections/windows10.html
index c8a1977a..3e1ad897 100644
--- a/_includes/sections/windows10.html
+++ b/_includes/sections/windows10.html
@@ -1,76 +1,76 @@
Don't use Windows 10 - It's a privacy nightmare
- Microsoft introduced a lot of new features in Windows 10 such as Cortana. However, most of them are violating your privacy.
+ Microsoft introduced a lot of new features in Windows 10 such as Cortana. However, most of them are violating your privacy.
-
Data syncing is by default enabled.
-
-
Browsing history and open websites.
-
Apps settings.
-
WiFi hotspot names and passwords.
-
-
+
Data syncing is by default enabled.
+
+
Browsing history and open websites.
+
Apps settings.
+
WiFi hotspot names and passwords.
+
+
-
Your device is by default tagged with a unique advertising ID.
-
-
Used to serve you with personalized advertisements by third-party advertisers and ad networks.
-
-
+
Your device is by default tagged with a unique advertising ID.
+
+
Used to serve you with personalized advertisements by third-party advertisers and ad networks.
+
+
-
Cortana can collect any of your data.
-
-
Your keystrokes, searches and mic input.
-
-
-
Calendar data.
-
-
-
Music you listen to.
-
-
-
Credit Card information.
-
-
-
Purchases.
-
-
+
Cortana can collect any of your data.
+
+
Your keystrokes, searches and mic input.
+
+
+
Calendar data.
+
+
+
Music you listen to.
+
+
+
Credit Card information.
+
+
+
Purchases.
+
+
-
Microsoft can collect any personal data.
-
-
Your identity.
-
-
-
Passwords.
-
-
-
Demographics.
-
-
-
Interests and habits.
-
-
-
Usage data.
-
-
-
Contacts and relationships.
-
-
-
Location data.
-
-
-
Content like emails, instant messages, caller list, audio and video recordings.
-
-
+
Microsoft can collect any personal data.
+
+
Your identity.
+
+
+
Passwords.
+
+
+
Demographics.
+
+
+
Interests and habits.
+
+
+
Usage data.
+
+
+
Contacts and relationships.
+
+
+
Location data.
+
+
+
Content like emails, instant messages, caller list, audio and video recordings.
+
+
-
Your data can be shared.
-
-
When downloading Windows 10, you are authorizing Microsoft to share any of above-mentioned data with any third-party, with or without your consent.
-
-
+
Your data can be shared.
+
+
When downloading Windows 10, you are authorizing Microsoft to share any of above-mentioned data with any third-party, with or without your consent.
Microsoft Privacy Statement - Microsoft collects, uses and discloses personal information as described here. This allows One Drive data, Cortana searches and MS browser history to be sold to third parties.
-
Cortana and privacy - To personalize your experience and provide the best possible suggestions, Cortana accesses your email and other communications and collects data about your contacts (People), like their title, suffix, first name, last name, middle name, nicknames, and company name. If you call, email, or text someone or they call, email, or text you, Cortana collects that person’s email address or phone number.
+
Microsoft Privacy Statement - Microsoft collects, uses and discloses personal information as described here. This allows One Drive data, Cortana searches and MS browser history to be sold to third parties.
+
Cortana and privacy - To personalize your experience and provide the best possible suggestions, Cortana accesses your email and other communications and collects data about your contacts (People), like their title, suffix, first name, last name, middle name, nicknames, and company name. If you call, email, or text someone or they call, email, or text you, Cortana collects that person’s email address or phone number.
\ No newline at end of file
diff --git a/_layouts/default.html b/_layouts/default.html
index 89882cde..b84ecf2d 100644
--- a/_layouts/default.html
+++ b/_layouts/default.html
@@ -2,10 +2,10 @@
layout: minimal
---
-
- {{ content }}
-
-
+
+ {{ content }}
+
+
\ No newline at end of file
diff --git a/_layouts/minimal.html b/_layouts/minimal.html
index 1061dc36..9576ee04 100644
--- a/_layouts/minimal.html
+++ b/_layouts/minimal.html
@@ -1,12 +1,14 @@
{% include head.html %}
+
-
- {% include nav.html %}
-
-
- {{ content }}
- {% include scripts.html %}
+
+ {% include nav.html %}
+
+
+ {{ content }}
+ {% include scripts.html %}
-
+
+