diff --git a/.github/CONTRIBUTING.md b/.github/CONTRIBUTING.md index 41b832f2..3d9ccdc6 100644 --- a/.github/CONTRIBUTING.md +++ b/.github/CONTRIBUTING.md @@ -31,15 +31,16 @@ Note: This criteria applies to all of privacytools.io ### DNS -- supports DoH or DoT (We love DNSCrypt, but there is already https://github.com/DNSCrypt/dnscrypt-resolvers which is directly supported by dnscrypt-proxy, so we don't consider useful to list providers only supporting it). -- supports DNSSEC (https://dnssec.vs.uni-due.de/ can test your current DNS provider). -- doesn't log IP addresses during normal operation (If your suggestion logs, please compare its privacy policy with other servers on our table that keep logs). -- preferably supports QNAME minimization (if you have access to the dig command, `dig +short txt qnamemintest.internet.nl` or `Resolve-DnsName -Type TXT -Name qnamemintest.internet.nl` if you are on Windows 10) +- Supports DoH or DoT (We love DNSCrypt, but there is already https://github.com/DNSCrypt/dnscrypt-resolvers which is directly supported by dnscrypt-proxy, so we don't consider useful to list providers only supporting it). +- Supports DNSSEC (https://dnssec.vs.uni-due.de/ can test your current DNS provider). +- Doesn't log IP addresses during normal operation (If your suggestion logs, please compare its privacy policy with other servers on our table that keep logs). +- Preferably supports QNAME minimization (if you have access to the dig command, `dig +short txt qnamemintest.internet.nl` or `Resolve-DnsName -Type TXT -Name qnamemintest.internet.nl` if you are on Windows 10) ### VPN +See https://www.privacytools.io/providers/vpn/#criteria for more details. - Prioritize Products by privacy respecting nationality. - Cannot be based in USA or UK. -- Must be accessible via Open Source Software (i.e OpenVPN, WireGuard) +- Must be accessible via Open Source Software (e.g. OpenVPN, WireGuard) - Use Encryption - Accept Cryptocurrency - No logging policy @@ -47,11 +48,11 @@ Note: This criteria applies to all of privacytools.io ### Email - Outside of USA - Support SMTP SSL -- Accessable Using Open Source Software (i.e IMAP) +- Accessible Using Open Source Software (e.g. allows IMAP) ### Hardware - Must be [H-Node Class A](https://h-node.org/wiki/page/en/compatibility-classes) or equivalent (if applicable) -- Must prioritize hardware certifications like [RYF](https://ryf.fsf.org/), [OSHWA](https://certification.oshwa.org/), and OSI when avalible. +- Must prioritize hardware certifications like [RYF](https://ryf.fsf.org/), [OSHWA](https://certification.oshwa.org/), and OSI when available. - Cannot lock users to a particular platform. ### Software diff --git a/README.md b/README.md index 12e2aab1..5f20c438 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,7 @@ _Encryption Against Global Mass Surveillance._ It's important for a website like privacytools.io to be up-to-date. Keep an eye on software updates of the applications listed here. Follow recent news about providers that are recommended. We try our best to keep up but we're not perfect and the internet is changing fast. So if you find an error, or you think a provider should not be listed here, or a qualified service provider is missing or a browser plugin is not the best choice anymore or anything else... -**Talk to us please.** Join our [subreddit](https://www.reddit.com/r/privacytoolsIO/) and start a discussion. This is a community project and we're aiming to deliver the best information available for a better privacy. Thank you for participating. +**Talk to us please.** Join our [subreddit](https://www.reddit.com/r/privacytoolsIO/) or [our Discourse community](https://forum.privacytools.io/) and start a discussion. This is a community project and we're aiming to deliver the best information available for a better privacy. Thank you for participating. You can submit your suggestions here on GitHub [(Issues)](https://github.com/privacytoolsIO/privacytools.io/issues) and also in our [subreddit](https://www.reddit.com/r/privacytoolsIO/). Please refer to the [Contributing Guidelines](.github/CONTRIBUTING.md) before submitting. Thank you. @@ -24,7 +24,7 @@ You can submit your suggestions here on GitHub [(Issues)](https://github.com/pri - [Donate.](https://www.privacytools.io/donate/) - [Liberapay](https://liberapay.com/privacytools.io/donate) or [Patreon.](https://www.patreon.com/privacytools) - [Spread the word.](https://www.privacytools.io/#participate) -- [Join our Discourse community](https://forum.privacytools.io/) +- [Join our Discourse community.](https://forum.privacytools.io/) - [Make suggestions on reddit.](https://www.reddit.com/r/privacytoolsIO/) - View and edit our website source code here on GitHub. diff --git a/_includes/sections/browser-addons.html b/_includes/sections/browser-addons.html index 1012d98c..023f05bf 100644 --- a/_includes/sections/browser-addons.html +++ b/_includes/sections/browser-addons.html @@ -7,7 +7,7 @@ {% include cardv2.html title="uBlock Origin: Block Ads and Trackers" image="/assets/img/addons/ublock-origin.png" -description="uBlock Origin is an efficient wide-spectrum-blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source." +description="uBlock Origin is an efficient wide-spectrum blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source." website="https://addons.mozilla.org/firefox/addon/ublock-origin/" forum="https://forum.privacytools.io/t/discussion-ublock-origin/266" github="https://github.com/gorhill/uBlock/" @@ -43,7 +43,7 @@ opera="https://addons.opera.com/en/extensions/details/https-everywhere" {% include cardv2.html title="Decentraleyes: Block Content Delivery Networks" image="/assets/img/addons/decentraleyes.png" -description="Decentraleyes emulates Content Delivery Networks locally by intercepting requests, finding the required resource and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required." +description="Decentraleyes emulates Content Delivery Networks locally by intercepting requests, finding the required resource, and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required." website="https://decentraleyes.org/" forum="https://forum.privacytools.io/t/discussion-decentraleyes/269" gitlab="https://git.synz.io/Synzvato/decentraleyes" @@ -55,7 +55,7 @@ opera="https://addons.opera.com/en/extensions/details/decentraleyes" {% include cardv2.html title="Terms of Service; Didn’t Read: Be Informed" image="/assets/img/addons/tosdr.png" -description="Terms of Service; Didn’t Read “I have read and agree to the Terms” is the biggest lie on the web. This addon aims to fix that by grading websites based on their Terms of Service agreements and gives short summaries." +description="Terms of Service; Didn’t Read is an addon that aims to fix how “I have read and agree to the Terms” is the biggest lie on the web by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are done transparently by a community of reviewers." website="https://tosdr.org/" forum="https://forum.privacytools.io/t/discussion-terms-of-service-didn-t-read/270" github="https://github.com/tosdr/" diff --git a/_includes/sections/browser-fingerprint.html b/_includes/sections/browser-fingerprint.html index 4c2144b1..6b3e1859 100644 --- a/_includes/sections/browser-fingerprint.html +++ b/_includes/sections/browser-fingerprint.html @@ -12,7 +12,7 @@
-You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.
+You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user-agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.
Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
@@ -27,5 +27,5 @@If you want to make sure every single WebRTC related setting is really disabled change these settings:
+If you want to make sure every single WebRTC-related setting is really disabled change these settings:
WebRTC cannot be fully disabled in Chrome, however it is possible to change its routing settings (and prevent leaks) using an extension. Two open source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).
+WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.
+The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.
Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
+Services based in the United States are not recommended because of the country's surveillance programs and use of National Security Letters (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
An example of this is Lavabit – a secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
diff --git a/_includes/sections/live-operating-systems.html b/_includes/sections/live-operating-systems.html index d718ece0..bf238f36 100644 --- a/_includes/sections/live-operating-systems.html +++ b/_includes/sections/live-operating-systems.html @@ -3,7 +3,7 @@ {% include cardv2.html title="Tails" image="/assets/img/tools/Tails.png" -description='Tails is a live operating system, that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and helps to: Use the Internet anonymously and circumvent censorship; Internet connections go through the Tor network; leave no trace on the computer; use state-of-the-art cryptographic tools to encrypt files, emails and instant messaging.' +description='Tails is a live operating system that starts on almost any computer from a DVD, USB stick, or SD card. It aims at preserving privacy and anonymity, and circumventing censorship by forcing Internet connections through the Tor network; leaving no trace on the computer; and using state-of-the-art cryptographic tools to encrypt files, emails, and instant messages.' badges="info:GNU/Linux" labels="warning:contrib:This software may depend on or recommend non-free software." website="https://tails.boum.org/" diff --git a/_includes/sections/mobile-operating-systems.html b/_includes/sections/mobile-operating-systems.html index 40aa5951..b48024e7 100644 --- a/_includes/sections/mobile-operating-systems.html +++ b/_includes/sections/mobile-operating-systems.html @@ -8,7 +8,7 @@ title="GrapheneOS" image="/assets/img/tools/GrapheneOS.png" image-dark="/assets/img/tools/GrapheneOS-dark.png" -description='GrapheneOS (formerly known as CopperheadOS) is a free and open-source security and privacy focused mobile operating system built on top of the Android Open Source Project. It currently specifically targets devices offering strong hardware security.' +description='GrapheneOS (formerly known as CopperheadOS) is a free and open-source security- and privacy-focused mobile operating system built on top of the Android Open Source Project. It currently specifically targets devices offering strong hardware security.' badges="info:AOSP" labels="warning:contrib:This software may depend on or recommend non-free software." website="https://grapheneos.org/" @@ -39,6 +39,6 @@ github="https://github.com/ubports"Mullvad is a fast and inexpensive VPN with a serious focus on transparency and security, they have been in operation since 2009. It is the only VPN provider that currently meets our criteria for recommendation. Mullvad is based in Sweden and does not have a free trial. Visit mullvad.net to create an account.
+Mullvad is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since 2009. It is the only VPN provider that currently meets our criteria for recommendation. Mullvad is based in Sweden and does not have a free trial. Visit mullvad.net to create an account.
Mullvad has 409 servers in 38 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.
In addition to standard OpenVPN connections, Mullvad supports Wireguard. Wireguard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
+In addition to standard OpenVPN connections, Mullvad supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest report published at cure53.de. The security researchers concluded:
@@ -58,7 +58,7 @@442+ Servers
ProtonVPN has 442 servers in 33 countries at the time of writing this page. Typically the more servers a provider offers, the better: With hundreds of servers in operation, you are far more likely to find a fast connection and a server geographically closest to you.
Accepts Bitcoin
-ProtonVPN does technically accept Bitcoin payments, however you either need to have an existing account, or contact their support team in advance to register with Bitcoin.
+ProtonVPN does technically accept Bitcoin payments; however, you either need to have an existing account, or contact their support team in advance to register with Bitcoin.
Mobile Clients
In addition to providing standard OpenVPN configuration files, ProtonVPN has mobile clients for iOS or Android allowing for easy connections to their servers.
Extra Functionality
@@ -72,7 +72,7 @@
IVPN is another strong premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar and offers a 3 day free trial. Unfortunately due to its lack of an independent security audit it does not meet the complete criteria for recommendation, see our notes below.
+IVPN is another strong premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar and offers a 3 day free trial. Unfortunately, due to its lack of an independent security audit, it does not meet the complete criteria for recommendation, see our notes below.
IVPN has undergone a no-logging audit from Cure53 which concluded in agreement with IVPN's no-logging claim. However, IVPN has not undergone a more comprehensive security audit by an independent third party, and therefore cannot be strongly recommended at this time. We have still chosen to list it on this page with the assumption that an audit will be published soon: The IVPN team reportedly plans to begin the process in September.
We will reevaluate this listing at the end of 2019 or when the aforementioned report has been published, whichever is sooner. diff --git a/_includes/sections/windows10.html b/_includes/sections/windows10.html index 8ea3cc88..6d4987b4 100644 --- a/_includes/sections/windows10.html +++ b/_includes/sections/windows10.html @@ -80,7 +80,7 @@
We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. If a VPN provides their own custom client, we require a kill-switch to block network data leaks when disconnected.
+We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. If a VPN provides their own custom client, we require a killswitch to block network data leaks when disconnected.
Minimum to Qualify:
Best Case:
A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards for their OpenVPN connections. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security. Ideally in a very comprehensive manner and on a repeated (yearly) basis.
+A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards for their OpenVPN connections. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security, ideally in a very comprehensive manner and on a repeated (yearly) basis.
Minimum to Qualify:
@@ -102,7 +102,7 @@ description: "Find a no-logging VPN operator who isn't out to sell or read yourIn most cases, most of your traffic is already encrypted! Over 98% of the top 3000 websites offer HTTPS, meaning your non-DNS traffic is safe regardless of using a VPN. It is incredibly rare for applications that handle personal data to not support HTTPS in 2019, especially with services like Let's Encrypt offering free HTTPS certificates to any website operator.
Even if a site you visit doesn't support HTTPS, a VPN will not protect you, because a VPN cannot magically encrypt the traffic between the VPN's servers and the website's servers. Installing an extension like HTTPS Everywhere and making sure every site you visit uses HTTPS is far more helpful than using a VPN.
The answer to this question is also the not very helpful: it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.
+The answer to this question is also not very helpful: it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.
However you shouldn't use encrypted DNS with Tor. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.
VPNs cannot provide strong anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data.
@@ -159,9 +159,9 @@ description: "Find a no-logging VPN operator who isn't out to sell or read yourA VPN may still be useful to you in a variety of scenarios, such as:
For use-cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're trusting the provider. In pretty much any other scenario you should be using a secure-by-design tool such as Tor.
+For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're trusting the provider. In pretty much any other scenario you should be using a secure-by-design tool such as Tor.
We currently have the following free-to-use services online now.
diff --git a/pages/software.html b/pages/software.html index 1c1d74ef..d19ebb9d 100644 --- a/pages/software.html +++ b/pages/software.html @@ -2,7 +2,7 @@ layout: page permalink: /software/ title: "Software" -description: "Discover a variety of open source software built to protect your privacy and keep your digital data secure." +description: "Discover a variety of open-source software built to protect your privacy and keep your digital data secure." ---Click on whatever software you need to view our recommendations.
diff --git a/pages/software/cal-card.html b/pages/software/cal-card.html index d102b7e7..7246efd9 100644 --- a/pages/software/cal-card.html +++ b/pages/software/cal-card.html @@ -2,7 +2,7 @@ layout: page permalink: /software/calendar-contacts/ title: "Calendar/Contacts Sync Tools" -description: "Discover free, open source, and secure ways to sync your contacts and calendars across your devices." +description: "Discover free, open-source, and secure ways to sync your contacts and calendars across your devices." --- {% include sections/calendar-contacts-sync.html %} diff --git a/pages/software/cloud.html b/pages/software/cloud.html index a5b35e20..c14b8938 100644 --- a/pages/software/cloud.html +++ b/pages/software/cloud.html @@ -2,7 +2,7 @@ layout: page permalink: /software/cloud/ title: "Self Hosted \"Cloud\"" -description: "Discover how to securely and privately self-host your cloud with open source software." +description: "Discover how to securely and privately self-host your cloud with open-source software." --- {% include sections/selfhosted-cloud.html %} diff --git a/pages/software/email.html b/pages/software/email.html index 57e1f3a7..1c9d9921 100644 --- a/pages/software/email.html +++ b/pages/software/email.html @@ -2,7 +2,7 @@ layout: page permalink: /software/email/ title: "Email Clients" -description: "Discover free, open source, and secure ways email clients, and some email alternatives you may not have considered." +description: "Discover free, open-source, and secure email clients, along with some email alternatives you may not have considered." --- {% include sections/email-clients.html %} diff --git a/pages/software/encryption.html b/pages/software/encryption.html index 028ea587..18cbd06a 100644 --- a/pages/software/encryption.html +++ b/pages/software/encryption.html @@ -2,7 +2,7 @@ layout: page permalink: /software/encryption-tools/ title: "Encryption Tools" -description: "Discover free, open source, and secure ways to encrypt your sensitive data to keep it from prying eyes." +description: "Discover free, open-source, and secure ways to encrypt your sensitive data to keep it from prying eyes." --- {% include sections/file-encryption.html %} diff --git a/pages/software/file-sync.html b/pages/software/file-sync.html index 29702b93..54012237 100644 --- a/pages/software/file-sync.html +++ b/pages/software/file-sync.html @@ -2,7 +2,7 @@ layout: page permalink: /software/file-sync/ title: "File Sync" -description: "Discover free, open source, and secure ways to sync your files across your devices." +description: "Discover free, open-source, and secure ways to sync your files across your devices." --- {% include sections/file-sync.html %} diff --git a/pages/software/notebooks.html b/pages/software/notebooks.html index e883fe0f..69d46b61 100644 --- a/pages/software/notebooks.html +++ b/pages/software/notebooks.html @@ -2,7 +2,7 @@ layout: page permalink: /software/notebooks/ title: "Notebooks" -description: "Keep track of your notes and journalings without giving them to a third-party." +description: "Keep track of your notes and journalings without giving them to a third party." --- {% include sections/notebooks.html %}