Compare commits

..

11 Commits

Author SHA1 Message Date
a1782d2ec7 Add RemoveMyPhone dark logo 2020-10-31 17:40:16 +10:30
939727f82f Add sponsor RemoveMyPhone to organizations list. 2020-10-29 12:17:30 +10:30
085256ee88 Fix broken Bootstrap license link in LibreJS page (#2103) 2020-10-27 15:34:10 +00:00
e42553fbc2 Change K-9 Mail's link to the official site. (#2101) 2020-10-23 01:25:52 +00:00
256fae4bdf Add Kryptor as worth mentioning. (#2100) 2020-10-22 08:35:55 +01:00
7db82b296b DNS: document iOS 14+ & macOS Big Sur encrypted DNS (#2099)
* dns: begin another take at Apple's native encrypted DNS

* dns.html: mention mobileconfigs, versions and where to find them

* dns.html: fix clumsy heading

* dns: remove excess >

* dns: small clarification

open in Safari, others won't work

* Use two spaces, slightly reword.

* Use nice name

Co-authored-by: Daniel Gray <dng@disroot.org>
2020-10-22 08:15:15 +01:00
08a85975db Update Sponsors and About Pages 2020-10-11 10:50:57 -05:00
21e7a6da90 Section introducing VPN breaches (#2010)
* Add exclusive section of VPN breaches

* Fix div
2020-10-09 16:35:42 +01:00
4dde28f9fc Update README.md
fixed opencollective image and link.
2020-10-09 07:35:53 +08:00
5218730c58 Update README.md
removed gold/silver sponsors. outdated.
2020-10-09 07:33:19 +08:00
1fffeea178 Remove NextCloud's experimental E2EE warning. (#2083) 2020-10-07 23:09:50 +00:00
28 changed files with 236 additions and 267 deletions

View File

@ -45,15 +45,14 @@ If you want to discuss privacy in general, a new tool, or just something else, f
Like what we're doing? [Become a backer](https://opencollective.com/privacytools) and show your support for our project.
![](https://opencollective.com/privacytools/tiers/sponsor.svg?avatarHeight=64&width=890)
<a href="https://opencollective.com/privacytools">
<img src="https://opencollective.com/privacytools/tiers/sponsor.svg?avatarHeight=64&width=890" height="64px" width="890px" alt="opencollective.com" />
</a>
## Sponsors
Are you working with a privacy focused company? Ask your manager or marketing team if your company would be interested in supporting our project. Your support will help us continue to develop this website, promote privacy-respecting tools and services, and reach out to thousands of data privacy newcomers every month. Also, your company's logo will show on GitHub and [our site](https://www.privacytools.io/sponsors/), and who doesn't like a little extra exposure?
[![](https://opencollective.com/privacytools/tiers/gold.svg?avatarHeight=64&width=890&button=false)](https://opencollective.com/privacytools/contribute/gold-12312)
[![](https://opencollective.com/privacytools/tiers/silver.svg?avatarHeight=64&width=890&button=false)](https://opencollective.com/privacytools/contribute/silver-12311)
## Community Translations
- [繁体中文 / Chinese](https://privacytools.twngo.xyz/) - [GitHub](https://github.com/twngo/privacytools-zh)
- [Español / Spanish](https://victorhck.gitlab.io/privacytools-es/) - [GitLab](https://gitlab.com/victorhck/privacytools-es)

View File

@ -31,6 +31,19 @@
opera="https://addons.opera.com/en/extensions/details/https-everywhere"
%}
{% include cardv2.html
title="Decentraleyes: Block Content Delivery Networks"
image="/assets/img/svg/3rd-party/decentraleyes.svg"
description="<strong>Decentraleyes</strong> emulates Content Delivery Networks locally by intercepting requests, finding the required resource, and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required."
website="https://decentraleyes.org/"
privacy-policy="https://decentraleyes.org/privacy-policy/"
forum="https://forum.privacytools.io/t/discussion-decentraleyes/269"
gitlab="https://git.synz.io/Synzvato/decentraleyes"
firefox="https://addons.mozilla.org/firefox/addon/decentraleyes"
chrome="https://chrome.google.com/webstore/detail/decentraleyes/ldpochfccmkkmhdbclfhpagapcfdljkj"
opera="https://addons.opera.com/extensions/details/decentraleyes"
%}
{% include cardv2.html
title="ClearURLs"
image="/assets/img/svg/3rd-party/clearurls.svg"
@ -62,22 +75,23 @@
<li><a href="https://floccus.org/">floccus</a> - Synchronize bookmarks across browsers via Nextcloud, WebDAV or a local file (and thus any file sync solution). For <a href="https://addons.mozilla.org/firefox/addon/floccus/">Firefox</a>, <a href="https://chrome.google.com/webstore/detail/floccus-bookmarks-sync/fnaicdffflnofjppbagibeoednhnbjhg">Chrome</a>, <a href="https://microsoftedge.microsoft.com/addons/detail/gjkddcofhiifldbllobcamllmanombji">Edge</a>.</li>
</ul>
<h2 id="afunc" class="anchor"><a href="#afunc"><i class="fas fa-link anchor-icon"></i></a> Additional Functionality</h2>
<h2>Additional Functionality</h2>
<div class="alert alert-secondary" role="alert">
These add-ons don't necessarily add to your privacy when browsing the web, but add additional functionality to your browser you may find useful.
</div>
{% include cardv2.html
title="PrivacySpy"
image="/assets/img/svg/3rd-party/privacyspy.svg"
description="<strong>PrivacySpy</strong> uses a consistent rubric to grade major services' privacy practices on a ten-point scale. It's a new open source project that is dedicated to making privacy policies more accessible."
website="https://privacyspy.org/"
privacy-policy="https://privacyspy.org/terms-and-privacy"
forum="https://forum.privacytools.io/t/discussion-privacyspy/4508"
github="https://github.com/politiwatch"
firefox="https://addons.mozilla.org/firefox/addon/privacyspy"
chrome="https://chrome.google.com/webstore/detail/ppembnadnhiknioggbglgiciihgmkmnd"
title="Terms of Service; Didnt Read: Be Informed"
image="/assets/img/svg/3rd-party/terms_of_service_didnt_read.svg"
description='<strong>Terms of Service; Didnt Read</strong> is an addon that believes "I have read and agree to the Terms of Service" is the biggest lie on the web, and wants to fix it by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are published transparently by a community of reviewers.'
website="https://tosdr.org/"
privacy-policy="https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/privacy/"
forum="https://forum.privacytools.io/t/discussion-terms-of-service-didn-t-read/270"
github="https://github.com/tosdr/"
firefox="https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/"
chrome="https://chrome.google.com/webstore/detail/terms-of-service-didn%E2%80%99t-r/hjdoplcnndgiblooccencgcggcoihigg"
opera="https://addons.opera.com/extensions/details/terms-of-service-didnt-read"
%}
{% include cardv2.html
@ -91,7 +105,9 @@ title="PrivacySpy"
chrome="https://chrome.google.com/webstore/detail/snowflake/mafpmfcccpbjnhfhjnllmmalhifmlcie"
%}
<h2 id="psmanage" class="anchor"><a href="#psmanage"><i class="fas fa-link anchor-icon"></i></a> Persistent storage management (Desktop only)</h2>
<h2>Persistent storage management</h2>
<h3>Desktop</h3>
<div class="alert alert-warning" role="alert">
These add-ons are the preferred method for controlling persistent storage data that various websites and web-apps may create on your computer.
@ -119,7 +135,34 @@ title="PrivacySpy"
firefox="https://addons.mozilla.org/firefox/addon/multi-account-containers/"
%}
<h2 id="advaddons" class="anchor"><a href="#advaddons"><i class="fas fa-link anchor-icon"></i></a> For Advanced Users</h2>
<h3>Android</h3>
<div class="alert alert-warning" role="alert">
Unfortunately the Android version of Firefox <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1398097">doesn't support managing tabs as containers</a>. The recommended extensions below are a substitute, however as APIs do not exist for clearing <a href="https://en.wikipedia.org/wiki/Indexed_Database_API">IndexedDB</a>, <a href="https://en.wikipedia.org/wiki/Progressive_web_application#Service_workers">Service Workers</a> cache, <a href="https://en.wikipedia.org/wiki/Progressive_web_application#AppCache_(obsolete)">appCache</a>, or cache by host. As a result they are not as good as the above Temporary Container suggestions.
</div>
{% include cardv2.html
title="ETag Stoppa"
image="/assets/img/svg/3rd-party/etag_stoppa.svg"
description="<strong>ETag Stoppa</strong> Prevents Firefox from storing entity tags by removing ETag response headers unconditionally and without exceptions."
website="https://addons.mozilla.org/firefox/addon/etag-stoppa/"
forum=""
github="https://github.com/claustromaniac/etag-stoppa"
firefox="https://addons.mozilla.org/firefox/addon/etag-stoppa/"
%}
{% include cardv2.html
title="Cookie AutoDelete: Automatically Delete Cookies"
image="/assets/img/png/3rd-party/cookie_autodelete.png"
description="<strong>Cookie AutoDelete</strong> automatically removes cookies, lingering sessions, and other information that can be used to spy on you when they are no longer used by open browser tabs."
website="https://addons.mozilla.org/firefox/addon/cookie-autodelete/"
forum="https://forum.privacytools.io/t/discussion-cookie-autodelete/267"
github="https://github.com/Cookie-AutoDelete/Cookie-AutoDelete"
firefox="https://addons.mozilla.org/firefox/addon/cookie-autodelete"
chrome="https://chrome.google.com/webstore/detail/cookie-autodelete/fhcgjolkccmbidfldomjliifgaodjagh"
%}
<h2>For Advanced Users</h2>
<div class="alert alert-warning" role="alert">
These addons require quite a lot of interaction from the user, and some of them completely replace the add-ons we've recommended above. Some sites may not work properly without careful configuration.

View File

@ -1,64 +0,0 @@
<h1 id="easy_tweaks" class="anchor"><a href="#easy_tweaks"><i class="fas fa-link anchor-icon"></i></a> Firefox: Easy Privacy Enhancing Tweaks</h1>
<div class="alert alert-success" role="alert">With <a href="https://blog.mozilla.org/blog/2020/08/04/latest-firefox-rolls-out-enhanced-tracking-protection-2-0-blocking-redirect-trackers-by-default/">Enhanced Tracking Protection (ETP)</a> that Firefox offers, you can <a href="https://blog.mozilla.org/blog/2019/09/03/todays-firefox-blocks-third-party-tracking-cookies-and-cryptomining-by-default/">control cookies</a> and data saved on your device.</div>
<h2>Enhanced Tracking Protection</h2>
<p>ETP can be made more strict by clicking on the main menu (or Edit) and then <strong>Preferences</strong>. From the side menu select <strong>&#128274; Privacy &amp; Security</strong>.</p>
<p>We recommend that <strong>All third-party cookies</strong> be blocked. The only pages likely to break under this configuration are <a href="https://en.wikipedia.org/wiki/Social_login">social logins</a> (i.e. authentication with services using your Google, Facebook account etc). Social logins are terrible for privacy and they link all services you use to a single identity, that is mostly used for advertising purposes, such as targeted advertising.
<p>When you use a social login you also run the risk of being locked out of services you use, if you lose access to the account. We recommend creating <strong>individual accounts</strong> with <strong>separate passwords</strong>. Passwords can be managed with a <a href="software/passwords/">Password Manager</a>.</p>
For more information about <a href="https://support.mozilla.org/kb/trackers-and-scripts-firefox-blocks-enhanced-track">Enhanced Tracking Protection</a>, see Mozilla's for <a href="https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop">Desktop</a> and <a href="https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-android">Android</a>.
The only suggestion we would make is to switch from <strong>standard</strong> to <strong>custom</strong> with the configuration listed below.
<h5>Custom</h5>
<ul class="checkmark">
<li><img src="/assets/img/svg/etp/3rdpartycookies-disabled.svg"
class="mx-3" width="15" height="15"
title="3rd Party Cookies disabled"
alt="3rd Party Cookies disabled">
Cookies: <strong>All third-party cookies (may cause websites to break)</strong>
</li>
<li><img src="/assets/img/svg/etp/tracker-image-disabled.svg"
class="mx-3" width="15" height="15"
title="Tracking content disabled"
alt="Tracking content disabled">
Tracking content: <strong> In all windows</strong>
</li>
<li><img src="/assets/img/svg/etp/cryptominers-disabled.svg"
class="mx-3" width="15" height="15"
title="Cryptominers disabled"
alt="Cryptominers disabled">
Cryptominers
</li>
<li><img src="/assets/img/svg/etp/fingerprinters-disabled.svg"
class="mx-3" width="15" height="15"
title="Fingerprinters disabled"
alt="Fingerprinters disabled">
Fingerprinters
</li>
</ul>
<p>The <strong>strict</strong> setting will only block known cross-site and/or social media trackers. This may still let through third party cookies that can be used for tracking.</p>
<h2>Firefox sessions and saved data</h2>
<p>We also suggest clearing history, and persistent data upon close of your browser. If you wish to remain logged in for some websites we suggest <a href="https://support.mozilla.org/kb/block-websites-storing-cookies-site-data-firefox">setting some exceptions</a>. For desktop users we suggest using the <a href="/browsers/#psaddons">Persistent storage management</a> addons.</p>
<h5>History</h5>
Firefox will <strong>Use custom settings for history</strong>
<ul class="checkmark">
<li>Remember browsing and download history</li>
<li>Clear history when Firefox closes</li><br>
Next select <strong>Settings&#8230;</strong> the <strong>Settings for Clearing History</strong> will load. Make sure there is a checkmark next to each item:
<ul class="checkmark">
<li>Browsing &amp; Download History</li>
<li>Active Logins</li>
<li>Form &amp; Search History</li>
<li>Cookies</li>
<li>Cache</li>
<li>Data</li>
<li>Offline Website Data</li>
</ul>
</ul>

View File

@ -1,4 +1,4 @@
<h1 id="about_config" class="anchor"><a href="#about_config"><i class="fas fa-link anchor-icon"></i></a> Firefox: Advanced Privacy Tweaks using "about:config"</h1>
<h1 id="about_config" class="anchor"><a href="#about_config"><i class="fas fa-link anchor-icon"></i></a> Firefox: Privacy Related "about:config" Tweaks</h1>
<div class="alert alert-success" role="alert">This is a collection of privacy-related <strong>about:config</strong> tweaks. We'll show you how to enhance the privacy of your Firefox browser.</div>
@ -6,43 +6,38 @@
<ol>
<li>Enter "about:config" in the firefox address bar and press enter.</li>
<li>Press the button "Accept the Risk and Continue"</li>
<li>Copy and paste each of the preferences below (for example "<strong>webgl.disabled</strong>") into the search bar, and set each of them to the stated value (such as "true").</li>
<li>Press the button "Accept the Risk and Continue" [FF71+] or "I accept the risk".</li>
<li>Copy and paste each of the preferences below (for example "webgl.disabled") into the search bar, and set each of them to the stated value (such as "true").</li>
</ol>
<h4>Firefox Desktop:</h4>
<h3>Getting started:</h3>
<h5 id="fpid" class="anchord"><a href="#fpi"><i class="fas fa-link anchor-icon"></i></a> First Party Isolation</h5>
<p>These settings should be safe, however first party isolation may break some third party login systems.</p>
<dl class="long-string-list">
<dt>privacy.firstparty.isolate = true</dt>
<dd>A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)</dd>
<h5 id="rfpd" class="anchor"><a href="#rfpd"><i class="fas fa-link anchor-icon"></i></a> Resist Fingerprinting</h5>
<p>One of the features of resist fingerprinting is to set the reported browser timezone to UTC. If you depend on having your real time zone reported to the websites you visit, this setting may break that.</p>
<dt>privacy.resistFingerprinting = true</dt>
<dd>A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference makes Firefox more resistant to browser fingerprinting.</dd>
<h5 id="blockOut" class="anchor"><a href="#blockOut"><i class="fas fa-link anchor-icon"></i></a> Block outbound</h5>
<dt>privacy.trackingprotection.fingerprinting.enabled = true</dt>
<dd>[FF67+] Blocks Fingerprinting</dd>
<dt>privacy.trackingprotection.cryptomining.enabled = true</dt>
<dd>[FF67+] Blocks CryptoMining</dd>
<dt>privacy.trackingprotection.enabled = true</dt>
<dd>This is Mozilla's new built-in tracking protection. One of it's benefits is blocking tracking (i.e. Google Analytics) on <a href="https://github.com/gorhill/uMatrix/wiki/Privileged-Pages">privileged pages</a> where add-ons that usually do that are disabled.</dd>
<dt>browser.send_pings = false</dt>
<dd>The attribute would be useful for letting websites track visitors' clicks.</dd>
<dt>Disable Firefox prefetching pages it thinks you will visit next:</dt>
<dd>
Prefetching causes cookies from the prefetched site to be loaded and other potentially unwanted behavior. Details <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Link_prefetching_FAQ">here</a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control">here</a>.
<ul>
<li>network.dns.disablePrefetch = true</li>
<li>network.dns.disablePrefetchFromHTTPS = true</li>
<li>network.predictor.enabled = false</li>
<li>network.predictor.enable-prefetch = false</li>
<li>network.prefetch-next = false</li>
</dd>
<h5 id="locbar" class="anchor"><a href="#locbar"><i class="fas fa-link anchor-icon"></i></a> Location bar</h5>
<dt>browser.urlbar.speculativeConnect.enabled = false</dt>
<dd>Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. <a href="https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/">Source</a></dd>
<h5 id="plugins" class="anchor"><a href="#plugins"><i class="fas fa-link anchor-icon"></i></a> Plugins</h5>
<dt>dom.event.clipboardevents.enabled = false</dt>
<dd>Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.</dd>
<dt>media.eme.enabled = false</dt>
<dd>
<p>Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. <a href="https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads">Details</a></p>
@ -52,22 +47,21 @@
<dt>media.gmp-widevinecdm.enabled = false</dt>
<dd>Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. <a href="https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling">Details</a></dd>
<h5 id="hwfping" class="anchor"><a href="#hwfping"><i class="fas fa-link anchor-icon"></i></a> Hardware Fingerprinting</h5>
<dt>media.navigator.enabled = false</dt>
<dd>Websites can track the microphone and camera status of your device.</dd>
<h5 id="pstorage" class="anchor"><a href="#pstorage"><i class="fas fa-link anchor-icon"></i></a> Persistent Storage</h5>
<dt>network.cookie.cookieBehavior = 1</dt>
<dd>
Disable cookies. 2 is likely to break some sites. 4 is the default default. 1 is more strict than 4.
Disable cookies
<ul>
<li>0 = Accept all cookies by default</li>
<li>1 = Only accept from the originating site (block third-party cookies)</li>
<li>2 = Block all cookies by default</li>
<li>4 = Block Cross-site and social media trackers</li>
</ul>
</dd>
<h5 id="headref" class="anchor"><a href="#headref"><i class="fas fa-link anchor-icon"></i></a> Headers/Referers</h5>
<dt>network.http.referer.XOriginPolicy = 2</dt>
<dd>
Only send <code>Referer</code> header when the full hostnames match. (Note: if you notice significant breakage, you might try <code>1</code> combined with an <code>XOriginTrimmingPolicy</code> tweak below.) <a href="https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/">Source</a>
@ -88,12 +82,9 @@
</ul>
</dd>
<h5 id="mediad" class="anchor"><a href="#mediad"><i class="fas fa-link anchor-icon"></i></a> Media</h5>
<p>This may break some websites which use VOIP based features.</p>
<dt>webgl.disabled = true</dt>
<dd>WebGL is a potential security risk. <a href="https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern">Source</a></dd>
<h5 id="sessions" class="anchor"><a href="#sessions"><i class="fas fa-link anchor-icon"></i></a> Sessions and session restoration</h5>
<dt>browser.sessionstore.privacy_level = 2</dt>
<dd>
This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. <a href="http://kb.mozillazine.org/Browser.sessionstore.privacy_level">Details</a>
@ -104,44 +95,35 @@
</ul>
</dd>
<h5 id="misc" class="anchor"><a href="#misc"><i class="fas fa-link anchor-icon"></i></a> Miscellaneous</h5>
<dt>beacon.enabled = false</dt>
<dd>Disables sending additional analytics to web servers. <a href="https://developer.mozilla.org/en-US/docs/Web/API/Navigator/sendBeacon">Details</a></dd>
<dt>browser.safebrowsing.downloads.remote.enabled = false</dt>
<dd>Prevents Firefox from sending information about downloaded executable files to Google Safe Browsing to determine whether it should be blocked for safety reasons. <a href="https://support.mozilla.org/en-US/kb/how-does-phishing-and-malware-protection-work#w_what-information-is-sent-to-mozilla-or-its-partners-when-phishing-and-malware-protection-are-enabled">Details</a></dd>
<dt>Disable Firefox prefetching pages it thinks you will visit next:</dt>
<dd>
Prefetching causes cookies from the prefetched site to be loaded and other potentially unwanted behavior. Details <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Link_prefetching_FAQ">here</a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-DNS-Prefetch-Control">here</a>.
<ul>
<li>network.dns.disablePrefetch = true</li>
<li>network.dns.disablePrefetchFromHTTPS = true</li>
<li>network.predictor.enabled = false</li>
<li>network.predictor.enable-prefetch = false</li>
<li>network.prefetch-next = false</li>
</dd>
<dt>network.IDN_show_punycode = true</dt>
<dd>Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. <a href="https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636">Source</a></dd>
<h5 id="sb" class="anchor"><a href="#sb"><i class="fas fa-link anchor-icon"></i></a> Safe Browsing</h5>
<dt>browser.safebrowsing.downloads.remote.enabled = false</dt>
<dd>Prevents Firefox from sending information about downloaded executable files to Google Safe Browsing to determine whether it should be blocked for safety reasons. <a href="https://support.mozilla.org/en-US/kb/how-does-phishing-and-malware-protection-work#w_what-information-is-sent-to-mozilla-or-its-partners-when-phishing-and-malware-protection-are-enabled">Details</a></dd>
<h4>Firefox Android (Fenix):</h4>
<h5 id="fpia" class="anchor"><a href="#fpia"><i class="fas fa-link anchor-icon"></i></a> First Party Isolation</h5>
<p>These settings should be safe, however first party isolation may break some third party login systems.</p>
<dt>privacy.firstparty.isolate = true</dt>
<dd>A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)</dd>
<h5 id="rfpa" class="anchor"><a href="#rfpa"><i class="fas fa-link anchor-icon"></i></a> Resist Fingerprinting</h5>
<p>One of the features of resist fingerprinting is to set the reported browser timezone to UTC. If you depend on having your real time zone reported to the websites you visit, this setting may break that.</p>
<dt>privacy.resistFingerprinting = true</dt>
<dd>A result of the <a href="https://wiki.mozilla.org/Security/Tor_Uplift">Tor Uplift</a> effort, this preference makes Firefox more resistant to browser fingerprinting.</dd>
<dt>privacy.resistFingerprinting.letterboxing = true</dt>
<dd>This sets the resolution of your Firefox window to a standard resolution. Only use this if you are using the above <strong>privacy.resistFingerprinting</strong>
<h5 id="mediaa" class="anchor"><a href="#mediaa"><i class="fas fa-link anchor-icon"></i></a> Media</h5>
<p>This may break some websites which use VOIP based features.</p>
<dt>webgl.disabled = true</dt>
<dd>WebGL is a potential security risk. <a href="https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern">Source</a></dd>
<dt>Disable WebRTC</dt>
<dd>See <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> section</dd>
<dt>Looking for TRR, DoH or ESNI?</dt>
<dd>They have moved to <a href="/providers/dns/#dns">our DNS page</a>.</dd>
<h3 id="user.js">Firefox user.js Templates</h3>
<ul>
<li><a href="https://github.com/arkenfox/user.js">arkenfox user.js</a> An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting. <strong>Desktop Firefox Only</strong></li>
<li><a href="https://github.com/arkenfox/user.js">arkenfox user.js</a> (formerly ghacks-user.js) - An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting.</li>
</ul>
<h3>Related Information</h3>
<ul>

View File

@ -8,7 +8,6 @@
title="Nextcloud - Choose your hoster"
image="/assets/img/svg/3rd-party/nextcloud.svg"
description="<strong>Nextcloud</strong> is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. The only limits on storage and bandwidth are the limits on the <a href=\"/providers/hosting\">server provider</a> you choose."
labels="color==warning::link==https://github.com/nextcloud/end_to_end_encryption/issues/111::text==Experimental E2EE::tooltip==Regarding E2EE their description states 'End-to-end encryption is still in alpha state, don't use this in production and only with test data!'."
website="https://nextcloud.com/"
privacy-policy="https://nextcloud.com/privacy/"
forum="https://forum.privacytools.io/t/discussion-nextcloud/287"

View File

@ -538,97 +538,113 @@ We also log how many times this or that tracker has been blocked. We need this i
</h1>
{%
include cardv2.html
title="Unbound"
image="/assets/img/svg/3rd-party/unbound.svg"
description='A validating, recursive, caching DNS resolver, supporting DNS-over-TLS, and has been <a href="https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/">independently audited</a>.'
website="https://nlnetlabs.nl/projects/unbound/about/"
forum="https://forum.privacytools.io/t/discussion-unbound/3563"
github="https://github.com/NLnetLabs/unbound"
include cardv2.html
title="Unbound"
image="/assets/img/svg/3rd-party/unbound.svg"
description='A validating, recursive, caching DNS resolver, supporting DNS-over-TLS, and has been <a href="https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/">independently audited</a>.'
website="https://nlnetlabs.nl/projects/unbound/about/"
forum="https://forum.privacytools.io/t/discussion-unbound/3563"
github="https://github.com/NLnetLabs/unbound"
%}
{%
include cardv2.html
title="dnscrypt-proxy"
image="/assets/img/svg/3rd-party/dnscrypt-proxy.svg"
description='A DNS proxy with support for DNSCrypt, DNS-over-HTTPS, and <a href="https://github.com/DNSCrypt/dnscrypt-protocol/blob/master/ANONYMIZED-DNSCRYPT.txt">Anonymized DNSCrypt</a>, a <a href="https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS">relay-based protocol that the hides client IP address.</a>'
website="https://github.com/DNSCrypt/dnscrypt-proxy/wiki"
forum="https://forum.privacytools.io/t/discussion-dnscrypt-proxy/1498"
github="https://github.com/DNSCrypt/dnscrypt-proxy"
include cardv2.html
title="dnscrypt-proxy"
image="/assets/img/svg/3rd-party/dnscrypt-proxy.svg"
description='A DNS proxy with support for DNSCrypt, DNS-over-HTTPS, and <a href="https://github.com/DNSCrypt/dnscrypt-protocol/blob/master/ANONYMIZED-DNSCRYPT.txt">Anonymized DNSCrypt</a>, a <a href="https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS">relay-based protocol that the hides client IP address.</a>'
website="https://github.com/DNSCrypt/dnscrypt-proxy/wiki"
forum="https://forum.privacytools.io/t/discussion-dnscrypt-proxy/1498"
github="https://github.com/DNSCrypt/dnscrypt-proxy"
%}
{%
include cardv2.html
title="Stubby"
image="/assets/img/png/3rd-party/stubby.png"
description='An application that acts as a local DNS-over-TLS stub resolver. Stubby can be used in <a href="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Clients#DNSPrivacyClients-Unbound/Stubbycombination">combination with Unbound</a> by managing the upstream TLS connections (since Unbound cannot yet re-use TCP/TLS connections) with Unbound providing a local cache.'
website="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Daemon+-+Stubby"
forum="https://forum.privacytools.io/t/discussion-stubby/3582"
github="https://github.com/getdnsapi/stubby"
include cardv2.html
title="Stubby"
image="/assets/img/png/3rd-party/stubby.png"
description='An application that acts as a local DNS-over-TLS stub resolver. Stubby can be used in <a href="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Clients#DNSPrivacyClients-Unbound/Stubbycombination">combination with Unbound</a> by managing the upstream TLS connections (since Unbound cannot yet re-use TCP/TLS connections) with Unbound providing a local cache.'
website="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Daemon+-+Stubby"
forum="https://forum.privacytools.io/t/discussion-stubby/3582"
github="https://github.com/getdnsapi/stubby"
%}
{%
include cardv2.html
title="Firefox's built-in DNS-over-HTTPS resolver"
image="/assets/img/svg/3rd-party/firefox_browser.svg"
description='Firefox comes with built-in DNS-over-HTTPS support for <a href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/">NextDNS and Cloudflare</a> but users can manually any other DoH resolver.'
labels="color==warning::icon==fas fa-exclamation-triangle::link==https://developers.cloudflare.com/1.1.1.1/privacy/firefox::text==Warning::tooltip==Cloudflare logs a limited amount of data about the DNS requests that are sent to their custom resolver for Firefox."
website="https://support.mozilla.org/en-US/kb/firefox-dns-over-https"
privacy-policy="https://wiki.mozilla.org/Security/DOH-resolver-policy"
forum="https://forum.privacytools.io/t/discussion-firefox-s-built-in-dns-over-https-resolver/3564"
include cardv2.html
title="Firefox's built-in DNS-over-HTTPS resolver"
image="/assets/img/svg/3rd-party/firefox_browser.svg"
description='Firefox comes with built-in DNS-over-HTTPS support for <a href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/">NextDNS and Cloudflare</a> but users can manually any other DoH resolver.'
labels="color==warning::icon==fas fa-exclamation-triangle::link==https://developers.cloudflare.com/1.1.1.1/privacy/firefox::text==Warning::tooltip==Cloudflare logs a limited amount of data about the DNS requests that are sent to their custom resolver for Firefox."
website="https://support.mozilla.org/en-US/kb/firefox-dns-over-https"
privacy-policy="https://wiki.mozilla.org/Security/DOH-resolver-policy"
forum="https://forum.privacytools.io/t/discussion-firefox-s-built-in-dns-over-https-resolver/3564"
%}
<h1 id="dns-android-clients" class="anchor">
<a href="#dns-android-clients">
<i class="fas fa-link anchor-icon"></i>
</a> Encrypted DNS Client Recommendations for Android
<a href="#dns-android-clients">
<i class="fas fa-link anchor-icon"></i>
</a> Encrypted DNS Client Recommendations for Android
</h1>
{%
include cardv2.html
title="Android 9's built-in DNS-over-TLS resolver"
image="/assets/img/svg/3rd-party/android.svg"
description="Android 9 (Pie) comes with built-in DNS-over-TLS support without the need for a 3rd-party application."
labels="color==warning::icon==fas fa-exclamation-triangle::link==https://developers.google.com/speed/public-dns/docs/using#android_9_pie_or_later::text==Warning::tooltip==Android 9's DoT settings have no effect when used concurrently with VPN-based apps which override the DNS."
website="https://support.google.com/android/answer/9089903#private_dns"
forum="https://forum.privacytools.io/t/discussion-android-9s-built-in-dns-over-tls-resolver/3562"
include cardv2.html
title="Android 9's built-in DNS-over-TLS resolver"
image="/assets/img/svg/3rd-party/android.svg"
description="Android 9 (Pie) comes with built-in DNS-over-TLS support without the need for a 3rd-party application."
labels="color==warning::icon==fas fa-exclamation-triangle::link==https://developers.google.com/speed/public-dns/docs/using#android_9_pie_or_later::text==Warning::tooltip==Android 9's DoT settings have no effect when used concurrently with VPN-based apps which override the DNS."
website="https://support.google.com/android/answer/9089903#private_dns"
forum="https://forum.privacytools.io/t/discussion-android-9s-built-in-dns-over-tls-resolver/3562"
%}
{%
include cardv2.html
title="Nebulo"
image="/assets/img/png/3rd-party/nebulo.png"
description='An open-source Android client supporting DNS-over-HTTPS and DNS-over-TLS, caching DNS responses, and locally logging DNS queries.'
website="https://git.frostnerd.com/PublicAndroidApps/smokescreen/-/blob/master/README.md"
privacy-policy="https://smokescreen.app/privacypolicy"
forum="https://forum.privacytools.io/t/discussion-nebulo/3565"
fdroid="https://git.frostnerd.com/PublicAndroidApps/smokescreen#f-droid"
googleplay="https://play.google.com/store/apps/details?id=com.frostnerd.smokescreen"
source="https://git.frostnerd.com/PublicAndroidApps/smokescreen"
include cardv2.html
title="Nebulo"
image="/assets/img/png/3rd-party/nebulo.png"
description='An open-source Android client supporting DNS-over-HTTPS and DNS-over-TLS, caching DNS responses, and locally logging DNS queries.'
website="https://git.frostnerd.com/PublicAndroidApps/smokescreen/-/blob/master/README.md"
privacy-policy="https://smokescreen.app/privacypolicy"
forum="https://forum.privacytools.io/t/discussion-nebulo/3565"
fdroid="https://git.frostnerd.com/PublicAndroidApps/smokescreen#f-droid"
googleplay="https://play.google.com/store/apps/details?id=com.frostnerd.smokescreen"
source="https://git.frostnerd.com/PublicAndroidApps/smokescreen"
%}
<h1 id="dns-ios-clients" class="anchor">
<a href="#dns-ios-clients">
<i class="fas fa-link anchor-icon"></i>
</a> Encrypted DNS Client Recommendations for iOS
<a href="#dns-ios-clients">
<i class="fas fa-link anchor-icon"></i>
</a> Encrypted DNS Client Recommendations for iOS
</h1>
{%
include cardv2.html
title="DNSCloak"
image="/assets/img/png/3rd-party/dnscloak.png"
description='An open-source iOS client supporting DNS-over-HTTPS, DNSCrypt, and <a href="https://github.com/DNSCrypt/dnscrypt-proxy/wiki">dnscrypt-proxy</a> options such as caching DNS responses, locally logging DNS queries, and custom block lists. Users can <a href="https://blog.privacytools.io/adding-custom-dns-over-https-resolvers-to-dnscloak/">add custom resolvers by DNS stamp</a>.'
website="https://github.com/s-s/dnscloak/blob/master/README.md"
privacy-policy="https://drive.google.com/file/d/1050No_pU74CAWUS5-BwQWyO2x_aiMzWc/view"
forum="https://forum.privacytools.io/t/discussion-dnscloak/3566"
ios="https://apps.apple.com/app/id1452162351"
github="https://github.com/s-s/dnscloak"
include cardv2.html
title="DNSCloak"
image="/assets/img/png/3rd-party/dnscloak.png"
description='An open-source iOS client supporting DNS-over-HTTPS, DNSCrypt, and <a href="https://github.com/DNSCrypt/dnscrypt-proxy/wiki">dnscrypt-proxy</a> options such as caching DNS responses, locally logging DNS queries, and custom block lists. Users can <a href="https://blog.privacytools.io/adding-custom-dns-over-https-resolvers-to-dnscloak/">add custom resolvers by DNS stamp</a>.'
website="https://github.com/s-s/dnscloak/blob/master/README.md"
privacy-policy="https://drive.google.com/file/d/1050No_pU74CAWUS5-BwQWyO2x_aiMzWc/view"
forum="https://forum.privacytools.io/t/discussion-dnscloak/3566"
ios="https://apps.apple.com/app/id1452162351"
github="https://github.com/s-s/dnscloak"
%}
<h2 id="appledns" class="anchor">
<a href="#appledns">
<i class="fas fa-link anchor-icon"></i>
</a>Apple's native support
</h2>
<p>
In iOS, iPadOS, tvOS 14 and macOS 11, DoT and DoH were introduced. DoT and DoH are supported natively by installation of profiles (through mobileconfig files opened in <em>Safari</em>).
After installation, the encrypted DNS server can be selected in <em>Settings &rarr; General &rarr; VPN and Network &rarr; DNS</em>.
</p>
<ul>
<li><strong>Signed profiles</strong> are offered by <a href="https://adguard.com/en/blog/encrypted-dns-ios-14.html">AdGuard</a> and <a href="https://apple.nextdns.io/">NextDNS</a>.</li>
<li>User contributed <strong>unsigned profiles</strong> for several DNS providers are hosted by <a href="https://encrypted-dns.party/">encrypted-dns.party</a>.</li>
</ul>
<h2 id="dns-definitions" class="anchor">
<a href="#dns-definitions">
<i class="fas fa-link anchor-icon"></i>
</a> Definitions
<a href="#dns-definitions">
<i class="fas fa-link anchor-icon"></i>
</a> Definitions
</h2>
<h4>DNS-over-TLS (DoT)</h4>

View File

@ -45,7 +45,7 @@
<h3>Worth Mentioning</h3>
<ul>
<li><a href="https://github.com/k9mail/k-9/releases">K-9 Mail</a> - An independent mail application for Android. It supports both POP3 and IMAP mailboxes, but only supports push mail for IMAP.</li>
<li><a href="https://k9mail.app/">K-9 Mail</a> - An independent mail application for Android. It supports both POP3 and IMAP mailboxes, but only supports push mail for IMAP.</li>
<li><a href="https://www.gnupg.org/">GNU Privacy Guard</a> - Email Encryption. GnuPG is a GPL Licensed alternative to the PGP suite of cryptographic software. <a href="https://theprivacyguide.org/tutorials/gpg.html">Tutorial.</a> Use <a href="https://gpgtools.org/">GPGTools for macOS.</a></li>
<li><a href="https://www.mailpile.is/">Mailpile (Beta)</a> - A modern, fast web-mail client with user-friendly encryption and privacy features.</li>
</ul>

View File

@ -72,4 +72,10 @@
link="https://github.com/aonez/Keka#so-where-is-the-source-code"
tooltip="This software is no longer open source."
%}</li>
<li><a href="https://kryptor.co.uk/">Kryptor</a> is a file encryption program for Windows, MacOS, and Linux.
{% include badge.html
color="warning"
icon="fas fa-exclamation-triangle"
tooltip="As Kryptor is still in beta, it may not be stable."
%}</li>
</ul>

View File

@ -8,7 +8,6 @@
title="Nextcloud"
image="/assets/img/svg/3rd-party/nextcloud.svg"
description="<strong>Nextcloud</strong> is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. The only limits on storage and bandwidth are the limits on the <a href=\"/providers/hosting\">server provider</a> you choose."
labels="color==warning::link==https://github.com/nextcloud/end_to_end_encryption/issues/111::text==Experimental E2EE::tooltip==Regarding E2EE their description states 'End-to-end encryption is still in alpha state, don't use this in production and only with test data!'."
website="https://nextcloud.com/"
privacy-policy="https://nextcloud.com/privacy/"
forum="https://forum.privacytools.io/t/discussion-nextcloud/287"

View File

@ -22,4 +22,19 @@
title="Insurgo Technologies Libres / Open Technologies — Empower yourself!"
alt="Insurgo Logo" />
</a>
<a class="m-3" href="https://joindeleteme.com" target="_blank" rel="noreferrer">
<img
src="/assets/img/png/3rd-party/sponsors/deleteme.png"
height="70rem"
title="DeleteMe is a hands-free subscription service that removes your personal information from data brokers and prevents it from being sold online."
alt="DeleteMe Logo" />
</a>
<a class="m-3" href="https://www.removemyphone.com" target="_blank" rel="noreferrer">
<img
src="/assets/img/png/3rd-party/sponsors/removemyphone.png"
{% unless page.url == '/sponsors/' %}data-theme-src="/assets/img/png/3rd-party/sponsors/removemyphone-dark.png"{% endunless %}
height="70rem"
title="RemoveMyPhone helps you delete your data from data broker sites and Google, Bing, and Yahoo search results."
alt="RemoveMyPhone Logo" />
</a>
</div>

View File

@ -1,5 +1,7 @@
<ul class="d-flex flex-wrap list-group-flush">
<li class="list-group-item flex-fill">Alex</li>
<li class="list-group-item flex-fill">Daw-Ran Liou</li>
<li class="list-group-item flex-fill">Greg Werbin</li>
<li class="list-group-item flex-fill">Michael DeMichillie</li>
<li class="list-group-item flex-fill">Nathan Myers</li>
<li class="list-group-item flex-fill">PablO</li>

View File

@ -28,11 +28,6 @@ a,
}
}
ul.checkmark {
list-style-type: '\2714';
display:block;
}
.card-ol {
padding-left: 1.25rem;
}

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.8 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 13 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 13 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 196 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 125 KiB

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 5.3 KiB

View File

@ -1,2 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g id="fingerprint" transform="matrix(.091982 0 0 .091982 -1.4319 -1.7656)" fill="#202020"><path d="m187.89 20.011c-56.055 5.836-104.18 33.869-132.62 77.255-17.71 27.016-43.556 94.786-43.556 114.21 0 14.178 18.302 21.359 27.9 10.947 2.823-3.062 3.275-4.263 6.731-17.882 20.808-81.975 52.937-124.67 108.33-143.95 97.472-33.927 194.13 36.69 200.45 146.44 3.312 57.515-39.038 105.48-73.195 82.908-19.564-12.93-21.571-21.661-13.762-59.861 10.015-48.992 1.365-72.203-33.407-89.639-47.664-23.901-88.926-0.797-109.32 61.212-14.419 43.84-4.916 105.76 22.765 148.33 10.174 15.648 27.047 33.654 34.037 36.323 10.441 3.988 21.658-3.562 21.658-14.576 0-6.02-1.74-8.837-11.929-19.319-43.259-44.502-53.583-121.56-22.621-168.84 14.224-21.719 31.863-25.494 55.214-11.815 15.766 9.235 18.182 18.966 12.12 48.799-9.382 46.167-6.382 65.457 13.214 84.96 40.176 39.985 96.72 25.264 124.69-32.463 20.191-41.667 16.649-101.12-9.077-152.34-33.003-65.715-107.57-107.99-177.63-100.69m1.178 53.496c-85.832 8.259-142.86 118.61-118.26 228.84 5.186 23.238 10.812 30.464 22.124 28.415 12.984-2.351 15.885-9.902 11.13-28.965-27.116-108.69 35.548-213.83 115.52-193.8 62.457 15.637 88.885 67.878 68.602 135.6-5.391 18.003 6.86 31.308 21.806 23.683 13.72-6.999 21.801-62.411 14.196-97.337-11.42-52.441-57.47-90.99-115.24-96.468-9.392-0.891-10.23-0.889-19.874 0.038m3.119 121.4c-7.475 2.413-13.126 9.52-13.833 17.397-2.223 24.748 32.384 31.258 39.321 7.397 4.397-15.125-10.513-29.628-25.488-24.794" fill-rule="evenodd"/></g></svg>

Before

Width:  |  Height:  |  Size: 1.6 KiB

View File

@ -1,7 +0,0 @@
<!-- This Source Code Form is subject to the terms of the Mozilla Public
- License, v. 2.0. If a copy of the MPL was not distributed with this
- file, You can obtain one at http://mozilla.org/MPL/2.0/. -->
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 16 16" fill="context-fill" fill-opacity="context-fill-opacity">
<path d="M15.379,8a.142.142,0,0,0,.02,0,7.978,7.978,0,0,1-1.858-.356.981.981,0,0,1-.054.847,1,1,0,1,1-1.735-.994.981.981,0,0,1,.481-.407c-.069-.036-.13-.083-.2-.121L6.613,12.387a.977.977,0,0,1-.4.476.85.85,0,0,1-.117.04L4.031,14.969c.509.219,1,.24,1.161-.147-.424,1.025,2.823,1.668,2.822.558,0,1.11,3.246.461,2.821-.564.425,1.025,3.175-.816,2.39-1.6.785.784,2.621-1.97,1.6-2.394C15.846,11.246,16.489,8,15.379,8Zm-5.073,5a1,1,0,1,1,1-1A1,1,0,0,1,10.306,13Z"/>
<path d="M14.707,1.293a1,1,0,0,0-1.414,0L9.679,4.907A7.942,7.942,0,0,1,8,.61C8,.619,8,.626,8,.635,8-.474,4.753.174,5.179,1.2,4.753.174,2,2.016,2.788,2.8,2,2.016.167,4.77,1.193,5.193.167,4.77-.476,8.016.634,8.015c-1.11,0-.461,3.247.564,2.821-.639.265-.163,1.428.475,2.077l-.38.38a1,1,0,1,0,1.414,1.414l12-12A1,1,0,0,0,14.707,1.293Zm-9,1.7a1,1,0,1,1-1,1A1,1,0,0,1,5.706,3ZM2.524,7.508a1,1,0,1,1,.37,1.364A1,1,0,0,1,2.524,7.508Zm4.769-.215Z"/>
</svg>

Before

Width:  |  Height:  |  Size: 1.2 KiB

View File

@ -1,7 +0,0 @@
<!-- This Source Code Form is subject to the terms of the Mozilla Public
- License, v. 2.0. If a copy of the MPL was not distributed with this
- file, You can obtain one at http://mozilla.org/MPL/2.0/. -->
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 16 16" fill="context-fill" fill-opacity="context-fill-opacity">
<path d="M14.71 1.29a1 1 0 0 0-1.42 0l-.7.71H9v-.5a.5.5 0 0 0-.5-.5h-1a.5.5 0 0 0-.5.5V2H5a2 2 0 0 0-1.6.8L2.2 4.4A1 1 0 0 0 3 6h4v1.59l-5.71 5.7a1 1 0 0 0 0 1.42 1 1 0 0 0 1.42 0l12-12a1 1 0 0 0 0-1.42z"/>
<path d="M7 14.5a.5.5 0 0 0 .5.5h1a.5.5 0 0 0 .5-.5V10l-2 2z"/>
</svg>

Before

Width:  |  Height:  |  Size: 634 B

View File

@ -1,8 +0,0 @@
<!-- This Source Code Form is subject to the terms of the Mozilla Public
- License, v. 2.0. If a copy of the MPL was not distributed with this
- file, You can obtain one at http://mozilla.org/MPL/2.0/. -->
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 16 16" fill="context-fill" fill-opacity="context-fill-opacity">
<path d="M14.71 1.29a1 1 0 0 0-1.42 0l-.56.57A7 7 0 0 0 1 7a1 1 0 0 0 2 0 5 5 0 0 1 5-5 5 5 0 0 1 3.31 1.28l-.7.7A4 4 0 0 0 8 3a4 4 0 0 0-4 4 2 2 0 0 1-2 2 1 1 0 0 0 0 2 3.86 3.86 0 0 0 2.33-.75l-3 3a.91.91 0 0 0-.08.13.82.82 0 0 0-.11.17 1.17 1.17 0 0 0-.06.2A.86.86 0 0 0 1 14a.61.61 0 0 0 0 .23.62.62 0 0 0 0 .13v.08a.76.76 0 0 0 .12.19s0 .06.06.09a1 1 0 0 0 1.42 0l12-12a1 1 0 0 0 .11-1.43zM6 7a2 2 0 0 1 2-2 1.94 1.94 0 0 1 1.18.41l-.72.72A.91.91 0 0 0 8 6a1 1 0 0 0-1 1 4.76 4.76 0 0 1-.06.65L5.12 9.47A4.1 4.1 0 0 0 6 7z"/>
<path d="M9.68 9.32a8.06 8.06 0 0 1-1.42 2.48 11 11 0 0 0-1.15 1.75 1 1 0 0 0 .44 1.34A.93.93 0 0 0 8 15a1 1 0 0 0 .89-.55 9.74 9.74 0 0 1 1-1.44A8.84 8.84 0 0 0 12 7z"/>
<path d="M12.91 6.09A5.5 5.5 0 0 1 13 7a8.24 8.24 0 0 1-1.14 4.28A5.75 5.75 0 0 0 11 14a1 1 0 0 0 2 0 3.91 3.91 0 0 1 .63-1.79A10.18 10.18 0 0 0 15 7a6.81 6.81 0 0 0-.48-2.52z"/>
</svg>

Before

Width:  |  Height:  |  Size: 1.2 KiB

View File

@ -1,11 +0,0 @@
<!-- This Source Code Form is subject to the terms of the Mozilla Public
- License, v. 2.0. If a copy of the MPL was not distributed with this
- file, You can obtain one at http://mozilla.org/MPL/2.0/. -->
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" width="16" height="16">
<path fill="context-fill" fill-opacity="context-fill-opacity" d="M2 15a1 1 0 0 1-.71-.29 1 1 0 0 1 0-1.42l12-12a1 1 0 1 1 1.42 1.42l-12 12A1 1 0 0 1 2 15z"/>
<path fill="context-fill" fill-opacity="context-fill-opacity" d="M14 5v7a1 1 0 0 1-1 1H6l-2 2h9a3 3 0 0 0 3-3V4a3 3 0 0 0-.14-.86z"/>
<path fill="context-fill" fill-opacity="context-fill-opacity" d="M3 13a1 1 0 0 1-1-1V4a1 1 0 0 1 1-1h10l1.55-1.55A2.93 2.93 0 0 0 13 1H3a3 3 0 0 0-3 3v8a3 3 0 0 0 1.45 2.55z"/>
<path fill="context-fill" fill-opacity="context-fill-opacity" d="M11.64 7.36L7 12h6V9.18a.47.47 0 0 0-.12-.32z"/>
<path fill="context-fill" fill-opacity="context-fill-opacity" d="M7.29 8.71l-1.52-.6a.5.5 0 0 0-.5.07L3.19 9.85a.49.49 0 0 0-.19.39V12h1z"/>
<circle fill="context-fill" fill-opacity="context-fill-opacity" cx="5" cy="6" r="1"/>
</svg>

Before

Width:  |  Height:  |  Size: 1.1 KiB

View File

@ -27,19 +27,6 @@ hidedesc: true
</div>
<div class="row">
{% include team.html
avatar="jonah.png"
name="Jonah Aragon"
role="Administrator"
bio="I run the website and services for PrivacyTools. My goal is to spread the word about data privacy as widely as possible."
email="mailto:jonah@privacytools.io"
website="https://www.jonaharagon.com"
keys="https://keybase.io/jonaharagon"
mastodon="https://social.privacytools.io/@jonah"
twitter="JonahAragon"
blog="jonah"
%}
{% include team.html
avatar="burung.png"
name="Burung Hantu"
@ -70,10 +57,10 @@ email="https://dngray.netlify.com/email"
keys="https://keybase.io/dngray"
mastodon="https://social.privacytools.io/@dngray"
%}
{% include team.html
avatar="freddy.png"
name="Freddy Marsden"
name="Freddy Marsden"
nick="Freddy"
bio="I'm an amateur writer covering privacy, security and open-source development."
role="Blogging & Education"
@ -82,8 +69,9 @@ email="mailto:freddy@privacytools.io"
mastodon="https://social.privacytools.io/@freddy"
blog="freddy"
%}
{% include team.html
avatar="lynn.png"
name="Lynn Stephenson"
bio="I'm a software developer doing some pentesting on the side, specializing in security, cryptography, networking, web development, and accessibility."
role="Researcher"
@ -152,6 +140,17 @@ keys="https://nitrohorse.com/keys"
blog="nitrohorse"
emeritus=true
%}
{% include team.html
name="Jonah Aragon"
role="Former Sysadmin"
website="https://jonaharagon.com"
keys="https://jonaharagon.com/accounts/"
mastodon="https://social.privacytools.io/@jonah"
blog="jonah"
twitter="JonahAragon"
emeritus=true
%}
</div>
<div class="row">

View File

@ -17,7 +17,7 @@ permalink: /about/javascript/
</tr>
<tr>
<td><a href="/assets/js/bootstrap.min.js">bootstrap.min.js</a></td>
<td><a href="https://github.com/twbs/bootstrap/raw/master/LICENSE">Expat</a></td>
<td><a href="https://github.com/twbs/bootstrap/raw/main/LICENSE">Expat</a></td>
</tr>
<tr>
<td><a href="/assets/js/jquery-3.3.1.min.js">jquery-3.3.1.min.js</a></td>

View File

@ -13,6 +13,4 @@ description: "These are our current web browser recommendations and some tweaks
{% include sections/browser-addons.html %}
{% include sections/browser-easy-tweaks.html %}
{% include sections/browser-advanced-tweaks.html %}
{% include sections/browser-tweaks.html %}

View File

@ -27,9 +27,7 @@ permalink: /classic/
{% include sections/browser-addons.html %}
{% include sections/browser-easy-tweaks.html %}
{% include sections/browser-advanced-tweaks.html %}
{% include sections/browser-tweaks.html %}
{% include sections/email-providers.html %}

View File

@ -267,6 +267,21 @@ breadcrumb: "VPN"
<hr>
<div id="vpn-breaches" class="container">
<div class="row">
<div class="col-md-12">
<h3>VPN Related breaches - why external auditing is important!</h3>
<ul>
<li><a href="https://www.comparitech.com/blog/vpn-privacy/ufo-vpn-data-exposure/">"Zero logs" VPN exposes millions of logs including user passwords, claims data is anonymous</a> July 2020 </li>
<li><a href="https://www.zdnet.com/article/nordvpn-http-post-bug-exposed-sensitive-customer-information/">NordVPN HTTP POST bug exposed customer information, no authentication required</a> March 2020</li>
<li><a href="https://www.theregister.com/2019/10/21/nordvpn_security_issue/">Row erupts over who to blame after NordVPN says: One of our servers was hacked via remote management tool</a> October 2019</li>
</ul>
</div>
</div>
</div>
<div class="container">
<div class="row">
<div class="col-lg-6 col-12">