-
- -

privacytools.io

-

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.

- -
- - -

- - Language: - - 繁體中文 - - Español - - Deutsch - - Italiano - - Русский - - Français -

- - - - -
-

- Glenn Greenwald: Why privacy matters - Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a - pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I - want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.

- -
- -

Read also:

- - - + {% include sections/header.html %} From dfc38032500ecd4fe97668969c52c7e3a923fa33 Mon Sep 17 00:00:00 2001 From: Vincevrp Date: Sun, 20 Jan 2019 01:22:09 +0100 Subject: [PATCH 05/45] Move fourteen eyes and KDL to separate file --- _includes/sections/fourteen-eyes.html | 45 +++++++ _includes/sections/key-disclosure-law.html | 84 +++++++++++++ index.html | 139 +-------------------- 3 files changed, 132 insertions(+), 136 deletions(-) create mode 100644 _includes/sections/fourteen-eyes.html create mode 100644 _includes/sections/key-disclosure-law.html diff --git a/_includes/sections/fourteen-eyes.html b/_includes/sections/fourteen-eyes.html new file mode 100644 index 00000000..8fe0acf3 --- /dev/null +++ b/_includes/sections/fourteen-eyes.html @@ -0,0 +1,45 @@ +

Global Mass Surveillance - The Fourteen Eyes

+ +UKUSA Agreement + +

The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.

+ +
+ {% include panel.html color="danger" + title="Five Eyes" + body=' +
    +
  1. Australia
  2. +
  3. Canada
  4. +
  5. New Zealand
  6. +
  7. United Kingdom
  8. +
  9. United States of America
  10. +
+ ' + %} + + {% include panel.html color="warning" + title="Nine Eyes" + body=' +
    +
  1. Denmark
  2. +
  3. France
  4. +
  5. Netherlands
  6. +
  7. Norway
  8. +
+ ' + %} + + {% include panel.html color="secondary" + title="Fourteen Eyes" + body=' +
    +
  1. Belgium
  2. +
  3. Germany
  4. +
  5. Italy
  6. +
  7. Spain
  8. +
  9. Sweden
  10. +
+ ' + %} +
diff --git a/_includes/sections/key-disclosure-law.html b/_includes/sections/key-disclosure-law.html new file mode 100644 index 00000000..b91b95d5 --- /dev/null +++ b/_includes/sections/key-disclosure-law.html @@ -0,0 +1,84 @@ +

Key Disclosure Law

+ +

Who is required to hand over the encryption keys to authorities?

+ +

Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).

+ +
+ + {% include panel.html color="danger" + title="Key disclosure laws apply" + body=' +
    +
  1. Antigua and Barbuda
  2. +
  3. Australia
  4. +
  5. Canada
  6. +
  7. France
  8. +
  9. India
  10. +
  11. Ireland
  12. +
  13. Norway
  14. +
  15. Russia
  16. +
  17. South Africa
  18. +
  19. United Kingdom
  20. +
+ ' + %} + + {% include panel.html color="warning" + title="Key disclosure laws may apply" + body=' +
    +
  1. Belgium *
  2. +
  3. Finland *
  4. +
  5. New Zealand (unclear)
  6. +
  7. The Netherlands *
  8. +
  9. United States (see related information)
  10. +
+ ' + %} + + {% include panel.html color="success" + title="Key disclosure laws don't apply" + body=' +
    +
  1. Czech Republic
  2. +
  3. Germany
  4. +
  5. Poland
  6. +
  7. Sweden (proposed)
  8. +
+ ' + %} + +
+ +

* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)

+ +

Related Information

+ + + +

Why is it not recommended to choose a US-based service?

+ +USA + +

Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.

+ +

An example of this is Lavabit – a discontinued secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access +communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.

+ +

Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order.

+ +

Related Information

+ + diff --git a/index.html b/index.html index b945286d..6a19bb51 100644 --- a/index.html +++ b/index.html @@ -5,144 +5,11 @@ layout: default {% include sections/header.html %} - + {% include sections/fourteen-eyes.html %} -

Global Mass Surveillance - The Fourteen Eyes

+ {% include sections/key-disclosure-law.html %} - UKUSA Agreement - -

The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, - focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do - spy on each other.

- - -
- {% include panel.html color="danger" - title="Five Eyes" - body=' -
    -
  1. Australia
  2. -
  3. Canada
  4. -
  5. New Zealand
  6. -
  7. United Kingdom
  8. -
  9. United States of America
  10. -
- ' - %} - - {% include panel.html color="warning" - title="Nine Eyes" - body=' -
    -
  1. Denmark
  2. -
  3. France
  4. -
  5. Netherlands
  6. -
  7. Norway
  8. -
- ' - %} - - {% include panel.html color="secondary" - title="Fourteen Eyes" - body=' -
    -
  1. Belgium
  2. -
  3. Germany
  4. -
  5. Italy
  6. -
  7. Spain
  8. -
  9. Sweden
  10. -
- ' - %} -
- - - -

Key Disclosure Law

Who is required to hand over the encryption keys to authorities?

-

Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant - is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an - adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).

- - -
- - {% include panel.html color="danger" - title="Key disclosure laws apply" - body=' -
    -
  1. Antigua and Barbuda
  2. -
  3. Australia
  4. -
  5. Canada
  6. -
  7. France
  8. -
  9. India
  10. -
  11. Ireland
  12. -
  13. Norway
  14. -
  15. Russia
  16. -
  17. South Africa
  18. -
  19. United Kingdom
  20. -
- ' - %} - - {% include panel.html color="warning" - title="Key disclosure laws may apply" - body=' -
    -
  1. Belgium *
  2. -
  3. Finland *
  4. -
  5. New Zealand (unclear)
  6. -
  7. The Netherlands *
  8. -
  9. United States (see related information)
  10. -
- ' - %} - - {% include panel.html color="success" - title="Key disclosure laws don't apply" - body=' -
    -
  1. Czech Republic
  2. -
  3. Germany
  4. -
  5. Poland
  6. -
  7. Sweden (proposed)
  8. -
- ' - %} - -
- -

* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)

- -

Related Information

- - - - -

Why is it not recommended to choose a US-based service?

- - USA - -

Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which - forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and - transform the service into a tool of mass surveillance.

- -

An example of this is Lavabit – a discontinued secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access - communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.

- -

Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, - saying that shutting down the service was a violation of the court order.

Related Information

-

VPN providers with extra layers of privacy

+

VPN providers with extra layers of privacy

From 4be9551177aaa81130c2b8f2cda3c7fb886bec9e Mon Sep 17 00:00:00 2001 From: Vincevrp Date: Sun, 20 Jan 2019 13:39:59 +0100 Subject: [PATCH 06/45] Move VPN section to separate file --- _includes/sections/vpn.html | 266 ++++++++++++++++++++++++++++++++++ index.html | 277 +----------------------------------- 2 files changed, 267 insertions(+), 276 deletions(-) create mode 100644 _includes/sections/vpn.html diff --git a/_includes/sections/vpn.html b/_includes/sections/vpn.html new file mode 100644 index 00000000..598d9768 --- /dev/null +++ b/_includes/sections/vpn.html @@ -0,0 +1,266 @@ +

VPN providers with extra layers of privacy

+ + + +{% assign eur_to_usd = 1.14 %} +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Sortable VPN Providers TableYearly PriceFree Trial# ServersJurisdictionWebsite
+ AirVPN54 €Yes162 ItalyAirVPN.org
+ AzireVPN + 45 €Yes22 SwedenAzireVPN.com
+ blackVPN + 49 €Yes31 Hong KongblackVPN.com
+ Cryptostorm + $ 52Yes28 IcelandCryptostorm.is
+ ExpressVPN + $ 99.95 Yes148 British Virgin IslandsExpressVPN.com
+ FrootVPN + $ 35.88No27 SwedenFrootVPN.com
+ hide.me + FreeYes160+ Malaysiahide.me
+ IVPN + $ 100Yes38 GibraltarIVPN.net
+ Mullvad + 60 €Yes281 SwedenMullvad.net
+ NordVPN + $ 83.88Yes5200+ PanamaNordVPN.com
+ OVPN.com + 84 €Yes67 SwedenOVPN.com
+ Perfect Privacy + 119.99 €No54 SwitzerlandPerfect-Privacy.com
+ ProtonVPN + FreeYes325 SwitzerlandProtonVPN.com
+ Proxy.sh + $ 40No300+ SeychellesProxy.sh
+ Trust.Zone + $ 39.95Yes164 SeychellesTrust.Zone
+ VPN.ht + $ 39.99No128 Hong KongVPN.ht
+ VPNArea + $ 59Yes204 BulgariaVPNArea.com
+ VPNTunnel + 35.88 €No800+ SeychellesVPNTunnel.com
+
+ + + +
+
+
+

Our VPN Provider Criteria

+ +
    +
  • Operating outside the USA or other Five Eyes countries.

    More: Avoid all US and UK based services.

  • +
  • OpenVPN software support.
  • +
  • Accepts Bitcoin, cash, debit cards or cash cards as a payment method.
  • +
  • No personal information is required to create an account. Only username, password and Email.
  • +
+ +

We're not affiliated with any of the above-listed VPN providers. This way we can give you honest recommendations.

+ +

More VPN Providers

+

+ + Spreadsheet with unbiased, independently verifiable data on over 100 VPN services. + + + (Join the discussion on Reddit) + +

+
+ + +
+
+ diff --git a/index.html b/index.html index 6a19bb51..357a07ad 100644 --- a/index.html +++ b/index.html @@ -9,282 +9,7 @@ layout: default {% include sections/key-disclosure-law.html %} -

VPN providers with extra layers of privacy

- - - - - {% assign eur_to_usd = 1.14 %} -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Sortable VPN Providers TableYearly PriceFree Trial# ServersJurisdictionWebsite
- AirVPN54 €Yes162 ItalyAirVPN.org
- AzireVPN - 45 €Yes22 SwedenAzireVPN.com
- blackVPN - 49 €Yes31 Hong KongblackVPN.com
- Cryptostorm - $ 52Yes28 IcelandCryptostorm.is
- ExpressVPN - $ 99.95 Yes148 British Virgin IslandsExpressVPN.com
- FrootVPN - $ 35.88No27 SwedenFrootVPN.com
- hide.me - FreeYes160+ Malaysiahide.me
- IVPN - $ 100Yes38 GibraltarIVPN.net
- Mullvad - 60 €Yes281 SwedenMullvad.net
- NordVPN - $ 83.88Yes5200+ PanamaNordVPN.com
- OVPN.com - 84 €Yes67 SwedenOVPN.com
- Perfect Privacy - 119.99 €No54 SwitzerlandPerfect-Privacy.com
- ProtonVPN - FreeYes325 SwitzerlandProtonVPN.com
- Proxy.sh - $ 40No300+ SeychellesProxy.sh
- Trust.Zone - $ 39.95Yes164 SeychellesTrust.Zone
- VPN.ht - $ 39.99No128 Hong KongVPN.ht
- VPNArea - $ 59Yes204 BulgariaVPNArea.com
- VPNTunnel - 35.88 €No800+ SeychellesVPNTunnel.com
-
- - -
-
-
- -

Our VPN Provider Criteria

-
    -
  • Operating outside the USA or other Five Eyes countries.

    More: Avoid all US and UK based services.

  • -
  • OpenVPN software support.
  • -
  • Accepts Bitcoin, cash, debit cards or cash cards as a payment method.
  • -
  • No personal information is required to create an account. Only username, password and Email.
  • -
-

We're not affiliated with any of the above-listed VPN providers. This way we can give you honest recommendations.

- -

More VPN Providers

-

- - Spreadsheet with unbiased, independently verifiable data on over 100 VPN services. - - - (Join the discussion on Reddit) - -

-
- - - -
-
+ {% include sections/vpn.html %}

What is a warrant canary?

From 9b84ebe4e56912797b54f7186b6c22e4f047353c Mon Sep 17 00:00:00 2001 From: Vincevrp Date: Sun, 20 Jan 2019 13:43:53 +0100 Subject: [PATCH 07/45] Move warrant-canary to separate file --- _includes/sections/warrant-canary.html | 23 +++++++++++++++++++++++ index.html | 21 ++------------------- 2 files changed, 25 insertions(+), 19 deletions(-) create mode 100644 _includes/sections/warrant-canary.html diff --git a/_includes/sections/warrant-canary.html b/_includes/sections/warrant-canary.html new file mode 100644 index 00000000..b2cd7bb5 --- /dev/null +++ b/_includes/sections/warrant-canary.html @@ -0,0 +1,23 @@ +

What is a warrant canary?

+ +Warrant Canary Example + +

A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.

+ +

Warrant Canary Examples:

+ +
    +
  1. https://proxy.sh/canary
  2. +
  3. https://www.ivpn.net/resources/canary.txt
  4. +
  5. https://www.bolehvpn.net/canary.txt
  6. +
  7. https://lokun.is/canary.txt
  8. +
  9. https://www.ipredator.se/static/downloads/canary.txt
  10. +
+ +

Related Warrant Canary Information

+ + diff --git a/index.html b/index.html index 357a07ad..3263b4da 100644 --- a/index.html +++ b/index.html @@ -11,25 +11,8 @@ layout: default {% include sections/vpn.html %} - -

What is a warrant canary?

- Warrant Canary Example -

A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has - received such a subpoena and should stop using the service.

-

Warrant Canary Examples:

-
    -
  1. https://proxy.sh/canary
  2. -
  3. https://www.ivpn.net/resources/canary.txt
  4. -
  5. https://www.bolehvpn.net/canary.txt
  6. -
  7. https://lokun.is/canary.txt
  8. -
  9. https://www.ipredator.se/static/downloads/canary.txt
  10. -
-

Related Warrant Canary Information

- + {% include sections/warrant-canary.html %} +

Browser Recommendation

From c9b05461caf7b60dfafff8629386964d8a1b4525 Mon Sep 17 00:00:00 2001 From: Vincevrp Date: Sun, 20 Jan 2019 13:48:59 +0100 Subject: [PATCH 08/45] Move browser recommendation to separate file --- .../sections/browser-recommendation.html | 32 ++++++++++++ index.html | 50 +------------------ 2 files changed, 33 insertions(+), 49 deletions(-) create mode 100644 _includes/sections/browser-recommendation.html diff --git a/_includes/sections/browser-recommendation.html b/_includes/sections/browser-recommendation.html new file mode 100644 index 00000000..1a5fbea4 --- /dev/null +++ b/_includes/sections/browser-recommendation.html @@ -0,0 +1,32 @@ +

Browser Recommendation

+ +
+ + {% include card.html color="success" + title="Tor Browser" + image="assets/img/tools/Tor-Project.png" + url="https://www.torproject.org/" + tor="http://expyuzz4wqqyqhjn.onion" + footer='OS: Windows, macOS, Linux, iOS, Android, OpenBSD.' + description="Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, it comes with pre-installed privacy add-ons, encryption and an advanced proxy." + %} + + {% include card.html color="primary" + title="Mozilla Firefox" + image="assets/img/tools/Firefox.png" + url="https://www.firefox.com/" + footer="OS: Windows, macOS, Linux, Android, iOS, BSD." + description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our + recommendations: WebRTC and about:config and get the privacy add-ons.' + %} + + {% include card.html color="warning" + title="Brave" + labels="warning:experimental:Brave is a good choice if you want to use a Chromium-based browser. But at this point in Brave's development, it's not as good as Firefox with privacy addons." + image="assets/img/tools/Brave.png" + url="https://www.brave.com/" + footer="OS: Windows, macOS, Linux, Android, iOS." + description="The new open source browser \"Brave\" automatically blocks ads and trackers, making it faster and safer than your current browser. Brave is based on Chromium." + %} + +
diff --git a/index.html b/index.html index 3263b4da..85f46442 100644 --- a/index.html +++ b/index.html @@ -13,55 +13,7 @@ layout: default {% include sections/warrant-canary.html %} - - -

Browser Recommendation

- -
- - {% include card.html color="success" - title="Tor Browser" - image="assets/img/tools/Tor-Project.png" - url="https://www.torproject.org/" - tor="http://expyuzz4wqqyqhjn.onion" - footer='OS: Windows, macOS, Linux, iOS, Android, OpenBSD.' - description="Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, it comes with pre-installed privacy add-ons, encryption and an advanced proxy." - %} - - {% include card.html color="primary" - title="Mozilla Firefox" - image="assets/img/tools/Firefox.png" - url="https://www.firefox.com/" - footer="OS: Windows, macOS, Linux, Android, iOS, BSD." - description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our - recommendations: WebRTC and about:config and get the privacy add-ons.' - %} - - {% include card.html color="warning" - title="Brave" - labels="warning:experimental:Brave is a good choice if you want to use a Chromium-based browser. But at this point in Brave's development, it's not as good as Firefox with privacy addons." - image="assets/img/tools/Brave.png" - url="https://www.brave.com/" - footer="OS: Windows, macOS, Linux, Android, iOS." - description="The new open source browser \"Brave\" automatically blocks ads and trackers, making it faster and safer than your current browser. Brave is based on Chromium." - %} - - - -
+ {% include sections/browser-recommendation.html %}

Browser Fingerprint - Is your browser configuration unique?

From d88d7d5b49c4e2c69b5c6f2610dd38b219c25df9 Mon Sep 17 00:00:00 2001 From: Vincevrp Date: Sun, 20 Jan 2019 15:34:21 +0100 Subject: [PATCH 09/45] Move browser fingerprint to separate file --- _includes/sections/browser-fingerprint.html | 28 +++++++++++++++ index.html | 40 +-------------------- 2 files changed, 29 insertions(+), 39 deletions(-) create mode 100644 _includes/sections/browser-fingerprint.html diff --git a/_includes/sections/browser-fingerprint.html b/_includes/sections/browser-fingerprint.html new file mode 100644 index 00000000..470a2442 --- /dev/null +++ b/_includes/sections/browser-fingerprint.html @@ -0,0 +1,28 @@ +

Browser Fingerprint - Is your browser configuration unique?

+ + + +Fingerprint image + +

When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.

+ +

+ + Test your Browser now + +

+ +

You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.

+ +

Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger, uBlock Origin and Disconnect. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.

+ +

Related Information

+ + diff --git a/index.html b/index.html index 85f46442..17d13982 100644 --- a/index.html +++ b/index.html @@ -15,45 +15,7 @@ layout: default {% include sections/browser-recommendation.html %} - -

Browser Fingerprint - Is your browser configuration unique?

- - - - - - Fingerprint image - - -

When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using - cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.

- - -

- - Test your Browser now - -

- - -

You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should - have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to - look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.

- - -

Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger, uBlock Origin and Disconnect. - They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.

- - -

Related Information

- + {% include sections/browser-fingerprint.html %}

WebRTC IP Leak Test - Is your IP address leaking?

From e9f17c8be49c25c0b6c8382bdf173b465c91c2bd Mon Sep 17 00:00:00 2001 From: Vincevrp Date: Sun, 20 Jan 2019 15:34:42 +0100 Subject: [PATCH 10/45] Move browser webrtc to separate file --- _includes/sections/browser-webrtc.html | 47 ++++++++++++++++++++++++ index.html | 50 +------------------------- 2 files changed, 48 insertions(+), 49 deletions(-) create mode 100644 _includes/sections/browser-webrtc.html diff --git a/_includes/sections/browser-webrtc.html b/_includes/sections/browser-webrtc.html new file mode 100644 index 00000000..19fd4dc2 --- /dev/null +++ b/_includes/sections/browser-webrtc.html @@ -0,0 +1,47 @@ +

WebRTC IP Leak Test - Is your IP address leaking?

+ + + +

While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.

+ +

+Test your Browser now +

+ +

How to disable WebRTC in Firefox?

+ +

In short: Set "media.peerconnection.enabled" to "false" in "about:config".

+

Explained:

+ +
    +
  1. Enter "about:config" in the firefox address bar and press enter.
  2. +
  3. Press the button "I'll be careful, I promise!"
  4. +
  5. Search for "media.peerconnection.enabled"
  6. +
  7. Double click the entry, the column "Value" should now be "false"
  8. +
  9. Done. Do the WebRTC leak test again.
  10. +
+ +

If you want to make sure every single WebRTC related setting is really disabled change these settings:

+ +
    +
  1. media.peerconnection.turn.disable = true
  2. +
  3. media.peerconnection.use_document_iceservers = false
  4. +
  5. media.peerconnection.video.enabled = false
  6. +
  7. media.peerconnection.identity.timeout = 1
  8. +
+ +

Now you can be 100% sure WebRTC is disabled.

+ +

+Test your Browser again +

+ +

How to fix the WebRTC Leak in Google Chrome?

+ +

WebRTC cannot be fully disabled in Chrome, however it is possible to change its routing settings (and prevent leaks) using an extension. Two open source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).

+ +

What about other browsers?

+ +

Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. But we recommend using Firefox on all devices.

diff --git a/index.html b/index.html index 17d13982..48fadeaf 100644 --- a/index.html +++ b/index.html @@ -17,56 +17,8 @@ layout: default {% include sections/browser-fingerprint.html %} - -

WebRTC IP Leak Test - Is your IP address leaking?

+ {% include sections/browser-webrtc.html %} - - - - -

While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.

- - -

- Test your Browser now -

- - -

How to disable WebRTC in Firefox?

- - -

In short: Set "media.peerconnection.enabled" to "false" in "about:config".

-

Explained:

-
    -
  1. Enter "about:config" in the firefox address bar and press enter.
  2. -
  3. Press the button "I'll be careful, I promise!"
  4. -
  5. Search for "media.peerconnection.enabled"
  6. -
  7. Double click the entry, the column "Value" should now be "false"
  8. -
  9. Done. Do the WebRTC leak test again.
  10. -
- -

If you want to make sure every single WebRTC related setting is really disabled change these settings:

-
    -
  1. media.peerconnection.turn.disable = true
  2. -
  3. media.peerconnection.use_document_iceservers = false
  4. -
  5. media.peerconnection.video.enabled = false
  6. -
  7. media.peerconnection.identity.timeout = 1
  8. -
-

Now you can be 100% sure WebRTC is disabled.

- - -

- Test your Browser again -

- - -

How to fix the WebRTC Leak in Google Chrome?

-

WebRTC cannot be fully disabled in Chrome, however it is possible to change its routing settings (and prevent leaks) using an extension. Two open source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).

- -

What about other browsers?

-

Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. But we recommend using Firefox on all devices.

Excellent Firefox Privacy Add-ons