From 8d32de7d5302bde7b79da200e732fdec6e1452af Mon Sep 17 00:00:00 2001 From: szTheory Date: Thu, 20 Feb 2020 19:08:27 -0500 Subject: [PATCH 01/38] Added ExifCleaner to the Metadata Removal Tools section on the Productivity Tools page --- _includes/sections/productivity-tools.html | 15 +- assets/img/svg/3rd-party/exifcleaner.svg | 3590 ++++++++++++++++++++ 2 files changed, 3603 insertions(+), 2 deletions(-) create mode 100644 assets/img/svg/3rd-party/exifcleaner.svg diff --git a/_includes/sections/productivity-tools.html b/_includes/sections/productivity-tools.html index c189abc9..0bb13b08 100644 --- a/_includes/sections/productivity-tools.html +++ b/_includes/sections/productivity-tools.html @@ -65,7 +65,6 @@ Metadata Removal Tools -
{% include cardv2.html title="MAT2" @@ -81,4 +80,16 @@ openbsd="https://pypi.org/project/mat2/" netbsd="https://pypi.org/project/mat2/" %} -
+ +{% + include cardv2.html + title="ExifCleaner" + image="/assets/img/svg/3rd-party/exifcleaner.svg" + description="ExifCleaner is a freeware, open source GUI app that removes exif metadata from images, videos, and PDF documents using a simple drag and drop interface. It supports multi-core batch processing and dark mode. It's an Electron app built on top of the open source ExifTool library, and is available for Linux, Windows, and Mac." + website="https://exifcleaner.com" + forum="https://forum.privacytools.io/t/discussion-mat/TODOADDTHIS" + github="https://github.com/szTheory/exifcleaner" + windows="https://github.com/szTheory/exifcleaner/releases" + mac="https://github.com/szTheory/exifcleaner/releases" + linux="https://github.com/szTheory/exifcleaner/releases" +%} diff --git a/assets/img/svg/3rd-party/exifcleaner.svg b/assets/img/svg/3rd-party/exifcleaner.svg new file mode 100644 index 00000000..36396542 --- /dev/null +++ b/assets/img/svg/3rd-party/exifcleaner.svg @@ -0,0 +1,3590 @@ + + + + -- 2.47.2 From dc76980832fec27a6b33b3218e4068db19b8c3b4 Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Fri, 21 Feb 2020 10:15:52 -0600 Subject: [PATCH 02/38] Replace GPG Key --- .../hu/omn8s4nziz8zmyz6f756asto39gefr63 | Bin 5603 -> 1312 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/.well-known/openpgpkey/hu/omn8s4nziz8zmyz6f756asto39gefr63 b/.well-known/openpgpkey/hu/omn8s4nziz8zmyz6f756asto39gefr63 index 3d6170c54909c3ec3342f93d8249a81f1f31a212..9b05199756205a2abcf3afe0f4bfacf812da909d 100755 GIT binary patch literal 1312 zcmbPX%o67>(jvyG&Bn;Wc*~uik&)eD75@>B^C^p6PSs7EGhOfNzN?2$W?jxblfBha zM9JW~$Kfq1Uio>6848X?iRt-y3N~3Fo=^iJ6gsNsf_8yn%s> zQvjyacPGRD>K3NIk5}4W*=wa5Cwpz3wywg>c<2ASxOo>G`8dJyzXiiznFkw})U@a4 z=!7xODm6KFHecw={KmQqf$V3~YeiUe_&Z9$?vVw$r%#Ss;qs}8YX!|59fQ~2IJfwM z*f)@S{-uGeg^4hHWccs3SCo z_fw1CT1u>T=jwQtkb6`AzU@h|ZULXodG3{4dW`tDC}9h%lA_FloYbVu61}|C61$Fx zV5eE)3=Mo?xSvUq5jnJSUoiYnY^#0ypRM8g*XNH@?r-?^U&^zv%o4h>=Wo6;>%4f4z08-R?u=|9f`&2Erzj}A$lSogNla*YB8QghWk!aR50et| z4mE$1UVJvZckX+`TR(rCxOHXbyaSrg_m_to&t>?{zBXR>+Sg0FBoCfiz1Z}%{{hQ( zoAk;bcU~^&-WQzG#fd#>6%=KbB_>yvt*H>m9$!M1}1V~xmh#((_zrw`fyhX zbLe&ZspoHg(0fzD^1^t@b=g0!-8u@j?GbbWAuft{PFx!$s5kh$id!G!6E_7n+kZ+l}HPd zG!Jr6*?eR8r{#XitN(fFnxy{`^&VUowkccuYmYhiB6R)BGwUZ-#wauVQ!EXCa?mO^ zyS@Gk>xEo*rM5ki(UW&FOlph!vBCb#T-F_+0!LIDwZM65T$tT?y0ywT;g0W&8Ga&H z64?IfP59zty4>-%^u^_JL^xMenn_v#*}3;E85xc@$-jvy-hH`A>DZje@3+`3->YU` z+3;zur{wLl*{SNh41eX4OrMm$)6Z?=_19Z@;^z|q57tB_jtE0$qs`qX+CBIIo?HcO literal 5603 zcmai&Ra6v!wuYG@hZ>|)x}+NsW(etSkQNC6NdYP8leap)X+=#J~T z=bn4d%USnv@3r>ZzrO!lI}1pFVZ!nH1AqvvS#NG-^CCyfATcV)Ri48wn|m-%ITe_% zSc-Aw)G_o0D;B41LMg@El#5;VmSe;GU_qMa>6zP_YwAy% zJ!BAVZq(|utHPPp)yKHL8C#tfy{29+nPF!|Bi5I>m&b&u78izFhusBD`TUX5iaa|X zuLFjRh_wx%z1rlpcZz%7l*fufHMnuk&g%5d3mb?|K@^wGDaU3cMiT4hrS^F}#PgV7 zSZ*Rg%s5xqQlz3b1=3)d^|V}iHz8BuUhPY_)Pzy97DYktnJ!-A*kVy5t@j_DiD3axEq0AE2lXb*10=Rl7sDBcqjkn-{f zhn2nkRkOJP9VgOyOmCz5EUOP%tlShBM$wEw2tCgHs1h_*tV=l4OqFkR1$ZCmjHnrK zjLUXNCXV07SkR;~tbg=avo=k*Z&ig~mkGX;ir{vBah=`#!)ivNDI=O3;{pr(N}eoa z?tF*Z>fH`97o|aBaQwo1GaY>|e$0XgMa`*xvnFmpnY}w59ic-bFeN49^3B%U*3R*m z1;4eKwP7Q4*ZH=M67jtj=x`;4_5^?ihz5#cFaU7S7|0nha^{$#2-(99O_M**%qzFD znnZ+9VFJx2p$|YhG&Ecg(Z7~9=io<`ZT1Mt5c(rcM&a9BmQdF?@D}?G{}TEQulBZz zngRG>$#mDT$aULo!ZFrgebqAPA~b40YWHtugDGn zVpl?T>0eHdg^1sqVxV)J(nc>mWkNC>bo?@89p_%OLBuR62qjj>-P(qXqWaJ9zp;QA zc}NdnBeQWXWRK0lbS{(Xr8{I{jxez^J8BmS&p@BL<2kQW$sw%%68%66ZIvBi_L9R` z=1(z8d;P@+i!g;!%d^NE8e0=(lnbHsN?&qN(9#dkRFAghYb%ZMM1nV1wH`o>izGw1 zXakD9Zd)nlChZ^uRXKZp zCxWvYj3pI!fiRF&H5;q1pZ!(MMS%0CvG?eN`pMdpM!Ru4iJU6>ifLmHV`wW&PL=D! zV7kG|p%>I0G@^W;5Wz3VPrLfbfOo9!Hc@PizdU8+hC+bG}3`-=~ROs0mZ+TVx8FA=B+_z?#}L z%LJRHIlAU|X%idjQtJj56&GhKdj=VID?1lw21$p1Owz9IZ@sLnecrpcIC=2Cb%8_! z^)N{O#tQan;Vp_p>}Y7;NHER-@%*E1>cbMHYPK1dvTvbF2Pc&C8fun6R6U^SbIh z;Kz9$N5eTJZ@tt2z3n9ywy)o+pZ2mXDB0dUVwhE5J_rJ?dQe-fXUa#Gjkx8(W z&(6nJ?x*R@V;wpgNUI*r!WNJ(Hk=n?-hEG+|F6Z`6gr-G z32M8ch{XSV;4fJ7bY5Tf--txf z{bsQy^(~q#k3Vce+o3i;wG;N0PlpPK;XrplCB&@W-&7ow<`gaCNJPRdcqzoxk@l++ z1GL4TI;+KLE9y>JxtK+kOhXTnh5R&QVGo4Jh<#=bYI5Sq1v~$^UAeuF#d}7!1<&kh zkC6VPwJc%N>l$}(g2AW6{2!8@FyhVA9OUuci>Ak64mQ8+AS&Zx)it=3Vc3V{#WBw^ z?Wy|{tS)x_V3p6E5`a(%Ub1@@F0!4!eO!b~)CcND)k|3DMg6>s4(q#r5)v21x@J*P zCQstnTGohfPK-A+K^C~MlTpAlDCWT6!(`gIS@2u@g8p&z;mMzK6X~$DSN2Q}9;^wf zGc`Ee_FvcO4?r)jBTVa|`%wE`Q->HrdbA-d*5P6;Dm$ms?StI0HcuSFSSa{CHvOXQ zCGj7DLi0$59e!EtTYIkuZCaHdi0L|xFU55-?Jtz|R})^E$N7TO{-?zxF)06HhV4JH z3?4I(-v|H6MBP1n%ap16sbb{It@0ZM4tT;3MT4}25pUHiB(_o%> zwMySVd(XsUKUQz%s}|n>ZBA`H7@h34N&ZRZ(xcm~Jx$=U;u1Y9DHP!2J3=`UCN7CX z)j4Ub!+ei1Ursj7$;A@`9+H?}|!?{{9f%Lx~T> zT^W_*W*7nIa6s<79BK6}6)IUyectc-joZkvK|9@%&??bCz@|COIL(b%##c6o6hn}) z_H10e)Bt_>d3HR7&FNdBzLl4{-d)C=%|_FmeN|%^;w_>b1J_6=0YG&MHu3aCV<=d$ zGN`e^)Z=5_!A^t1H@R+ecvu~1Om0S5l(=+UjI!y;}oIIS_iCDtzliSTF z&Jv!ygIW;up7z#SWD!BV$*V&=YhoXB+^dnfiw!{?tArB8;s-Ua9@08vvKtl|njla6 z@m)<{nvl@=WA+S0arHT;%eWE)4Pai1G`d4-S`q6;cfJC#d*Zk2DWv|u=uDIuMq7b=)f z*YMQ8`&~C%&CSpBLC3B7$-Jjo>My^mE791&)@0aat8hh+S&AZEv1L>MD&lx~&iP>c zKlzOZ&pt2|j)~&^;9_!qm%A_zI2W-I=8beA=@O)oY3Or^(2f3}&w7K(ch;6*GcZmG zhITNd8#z7>r?5c!;&%hhNM>)cfe|%rx|>oA{L>*&q3{aa=v1lNEGb!UmBM81}4#lkQEMN+hph1UzSaOG%%PLaFL$1ZhF-iGXi z+U9(m$F|l^DqX9l1t_?)fOw){< zyY^3<%<_pfG@a{r6WSgwvOiK4vZ4mtBH2{hB}EjXoR;M+G>4v|AjQJ$I4bih8lFk$ zG|9Ms{Q9=0CMN$>wPsW;iZ(G+8{ri%h*RW33pU|QXntRNd0i(5t@*}~`)JnSBgo3j zWp6af5j$Ipc}&;b<}2q_jzfk&CO?1N49KG);sz7S{6Yz>rb$T6*M{^0new3m9#oDk zU9JFqJlW|GRkGzL5*6kZmEwuso>;=4SvILhC6F;`e$ z`4#GM0aBgEntIPsL!oIf=sKe}#%-Vy3+o%KU%bLp&Z*{cA?ovX?WZWmUN-sRD4J4; zBrEnRo5%!wMi+{waI9mq@zv#b9@9$#CT{8$5ZkBhJra>SfWzNt2#5P3?Ns4_F*aSS zSh9n788aP*7zKrH5W^?Ag4w-ibh@{u<12)JDtZPcgSRC?$rJinW0h$+qy0bvom~#D zw7Z!fv263B5K69$`k2+d*C~<0xFBIuG=vW8idTtw0>jn1>t{wzkv_3@{!wW&sH=a8 z-8@q3$L=W}@f*!~c(>o&Ya4N@tlLl`w3G@cW3#*@gw9;=s3DXLx12Qjqv|tTGCTRE zV|;wm(^d)1`&FY7BD&)&M>K(w2-Fh7VaOm~nWFvS+K6(mK+E?1cV1hQ?#tY!Tpd4` zs%S=CZgzF1N!dER1h*-}deYcsHb!nRc);N%Dha{VaW$V|?eS;7!3uC{%CG;f_-BKg zx}Z|QGyUWdmtU1mnUlMwLBS%&J(HEMbPT=GU>VY?{aR;^(WzQHmoNdf-AR8B0{P(2 zMuSZ$UCX=lzHcIg!da6>y`^{j_vaXV317{1%C$B4YvW#OHJzQxi*?~Qcz0;+w*Tp9 zXe>b7d?L5caf4rmc0{|6<4oMO4QB6kY3!+<^Qfdd}qW62Vc;BX?!6xg^%q_uvJc;Cn+PQAAJaI{;~(;BCcxXo@x#6 z^F8Hh0=Sqp@o%H&N^nKBfd=WS#ma)U*v6N>N{Q%~X3-slPZ)<0xErhbJQl5Zk#=SF zAai*3b`uuE+7qUpau9kx77mp_o%+)oj199IibT9=5c2-P=Zwdpry7S@xk&Abv>bFH z^2AQYPG+zKsme!+RimW9=DI?1ep~oXmfctvXk&=NuM6;Xc)7)v6bFJUtBO*A0Cn5= zA+eYTGxmhDX_w&3nap9)f0j_T+ustJE_FwoVMl6nXQ@e1x>J_u2iS#}c`RzHeMPj0 z`5`YI2b~0@H84kEJV-IhgZNcNI`Xt~rQ@<|yiX;i!B^|XNv!N%+7UGdb!|R&lXxz~ z)t>}w`g7q1yf~W8bG5C8n@wFXJ(~i@Dw5l~9H=c>ozX`^#^^hht|0aGjX{^=+O6;W zer;Sctq#@uTafv|B}|&ob}E+OY#kDl)-O6zD+27^Kf|m$D6{rU0kF?bPGi*7Z=gmc zNfj3Z5iWw8EGqUxI>W9Pb0noU9>FSkMJqD_zz-Zv$_?AN;0L6$4T;K0AZ(9Li0|Ck zTd<5|eYv7%w^AB{tk-?QD9QW&8+#+iCg5o+ z%R%wqlJwbry?_rd1__OIlVQ!pCbZ-cbvb&iXus}ydP4lUiKX|`3E`-tECl0_pv)ZR)10dPFZ2}^HSZCTHJf3#Fp)CIC@sZ;)1v7j0#Wf|!48 ze)*~uZvv_x6%!qSU_rjE!79ELa$zUr{eBOwhXi*;MOs?_dW!u^f!q$qrlLh zj6EVY@nwZbKu_7#%GmT3ejgK{&EP?d8;mr`pPg}}HA`EK%~H3W+m$h-T{kFFZQU(z zOAy}`^PL-&M0s(6Kg&ja_PQNETGKeKpod}MscJ^ta1k~j?^-B!ht3Zaxt_nmptMQ3 za4aUHZJ#?CEPgFt8sC>UmM9N=Uee=gR+!Fh!Khq8A&eXfjxO2bvd{Q)BdQ%cCHyW! z6*G&?j>7kAWPwW9L7<+Spq7o!$t8byfDAYN9N=D~w}Ilyv&<3?mqC98IYsGKk4>(Z zX7Vv}p=Ran*P4yRNaC$iY(8!*I~MQ07Frr@EDaK@5*A5DiMK$Iv92rSGjote_QZ5h zX~V;qSKE3kF`1oVSr{}DyzKnfAGcy1V!O%d0q1K12Z(e{afm^w>d+YIyMGkyt$WMm lsv%|&Z~e?eTN$l?G^MdRMk+4`w|>(`|E3!$%_k@4{{m0Lk`n*` -- 2.47.2 From b0917bc14087e6e580a52ba34852335816e16dc8 Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Fri, 21 Feb 2020 11:34:10 -0600 Subject: [PATCH 03/38] Update images section (#1730) Closes: #1730, Resolves: #1359 Co-Authored-By: szTheory --- .github/CONTRIBUTING.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/.github/CONTRIBUTING.md b/.github/CONTRIBUTING.md index 0ce5bc54..18a48127 100644 --- a/.github/CONTRIBUTING.md +++ b/.github/CONTRIBUTING.md @@ -95,8 +95,9 @@ See https://www.privacytools.io/providers/vpn/#criteria for more details. ## Images -- Provider logos are 200px x 70px ([example](https://github.com/privacytoolsIO/privacytools.io/blob/master/assets/img/provider/Mullvad.png)) -- Tool logos are 120px x 120px ([example](https://github.com/privacytoolsIO/privacytools.io/blob/master/assets/img/tools/Firefox.png)) +- SVG file format is strongly preferred. PNG files can be used as a fallback if images are too complex or otherwise unsuitable as a vector format. +- Provider logo dimensions are 384px x 128px ([example](https://github.com/privacytoolsIO/privacytools.io/blob/master/assets/img/svg/3rd-party/mullvad.svg)) +- Tool logo dimensions are 120px x 120px ([SVG example](https://github.com/privacytoolsIO/privacytools.io/blob/master/assets/img/svg/3rd-party/firefox_browser.svg), [PNG example](https://github.com/privacytoolsIO/privacytools.io/blob/master/assets/img/png/3rd-party/claws_mail.png)) ## Licensing -- 2.47.2 From 64f79a4da5ba49f25c7f1e62a6ee47e43152af74 Mon Sep 17 00:00:00 2001 From: nitrohorse <1514352+nitrohorse@users.noreply.github.com> Date: Mon, 24 Feb 2020 07:43:50 -0800 Subject: [PATCH 04/38] Update README build instructions (#1681) * Update README build instructions * Update Ruby download link * Specify Bundler version * Add --incremental to bundle argument * Specify exact Bundler version * Specify bundler version in command --- README.md | 17 +++++++++++------ 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index 0df2c630..906c72cd 100644 --- a/README.md +++ b/README.md @@ -14,14 +14,19 @@ It's important for a website like PrivacyTools to be up-to-date. Keep an eye on You can submit your suggestions here on GitHub [(Issues)](https://github.com/privacytoolsIO/privacytools.io/issues) and also in our [subreddit](https://www.reddit.com/r/privacytoolsIO/). Please refer to the [Contributing Guidelines](.github/CONTRIBUTING.md) before submitting. Thank you. -## Building +## Developing -1. Install [Ruby](https://www.ruby-lang.org/en/documentation/installation/) -1. Install [bundler](https://bundler.io/) by running `gem install bundler`. -1. Run `bundle install` to install the required dependencies. -1. Use `bundle exec jekyll build` to build the website. The output can be found in the `_site` directory. Live preview is also possible by running `bundle exec jekyll serve` +1. Install the latest stable version of [Ruby](https://www.ruby-lang.org/en/downloads/). +1. Install [Bundler](https://bundler.io/) v2.0.1: + * `gem install bundler -v 2.0.1` +1. Install the required dependencies: + * `bundle install` +1. Build the website (the output can be found in the `_site` directory): + * `bundle exec jekyll build` +1. Serve the website locally with live reloading: + * `bundle exec jekyll serve --incremental --livereload` -# Support privacytools.io +# Support - [Donate.](https://www.privacytools.io/donate/) - [Liberapay](https://liberapay.com/privacytools.io/donate) or [Patreon.](https://www.patreon.com/privacytools) -- 2.47.2 From 065e454641b1c9b78be9315953786a6dcdc160c0 Mon Sep 17 00:00:00 2001 From: nitrohorse <1514352+nitrohorse@users.noreply.github.com> Date: Mon, 24 Feb 2020 07:58:43 -0800 Subject: [PATCH 05/38] Update public Searx instances link (#1712) --- _includes/sections/search-engines.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/search-engines.html b/_includes/sections/search-engines.html index 0eca5bf8..afdb78e2 100644 --- a/_includes/sections/search-engines.html +++ b/_includes/sections/search-engines.html @@ -7,7 +7,7 @@ {% include cardv2.html title="searx - Decentral" image="/assets/img/svg/3rd-party/searx.svg" -description='searx is an open-source metasearch engine, aggregating the results of other search engines while not storing information about its users. No logs, no ads and no tracking. There is a list of public instances, or you can try the PrivacyTools Search' +description='searx is an open-source metasearch engine, aggregating the results of other search engines while not storing information about its users. No logs, no ads and no tracking. There is a list of public instances or you can try the PrivacyTools instance.' website="https://searx.me/" tor="http://ulrn6sryqaifefld.onion" forum="https://forum.privacytools.io/t/discussion-searx/283" -- 2.47.2 From 7244734051e07519eaee6b33b812baa1f7876886 Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Sun, 1 Mar 2020 12:06:06 +0000 Subject: [PATCH 06/38] New email section (#1672) --- _includes/sections/email-providers.html | 520 +++++++++------------ _includes/sections/email-warning.html | 10 + assets/img/svg/3rd-party/anonaddy-dark.svg | 2 + assets/img/svg/3rd-party/anonaddy.svg | 2 + pages/providers/email.html | 270 ++++++++++- pages/software/email.html | 9 +- 6 files changed, 485 insertions(+), 328 deletions(-) create mode 100644 _includes/sections/email-warning.html create mode 100644 assets/img/svg/3rd-party/anonaddy-dark.svg create mode 100644 assets/img/svg/3rd-party/anonaddy.svg diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index 1841d765..ec7afb32 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -1,321 +1,235 @@ -

Privacy-Conscious Email Providers - No Affiliates

+

Recommended Email Services

-
- - - - - - - - - - - - - - +
-
+
+
+ ProtonMail +
+
+

ProtonMail Free

+

ProtonMail.com is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. ProtonMail is based in Genève, Switzerland. Accounts start with 500 MB storage with their free plan.

-
- - - - - - - - - - +

Free accounts have some limitations and do not allow the use of the ProtonMail Bridge, which is required to use a recommended email client (eg. Thunderbird) or to search email by body text. Paid accounts are available starting at €48/Year which include features like ProtonMail Bridge, additional storage, custom domain support, and more. The webmail and mobile apps can only search To:, From:, Date: and Subject: (this is likely to change when v4.0 of ProtonMail is released).

- - - - - - - - - - - +
Domains and Aliases
+

Paid ProtonMail users can use their own domain with the service. Catch-all addresses are supported with custom domains. ProtonMail also supports subaddressing, which is useful for users who don't want to purchase a domain.

- - - - - - - - - - - +
Account Security
+

ProtonMail supports TOTP two factor authentication only. The use of a U2F security key is not yet supported. ProtonMail is planning to implement U2F upon completion of their Single Sign On (SSO) code.

- - - - - - - - - - - +
Data Security
+

ProtonMail has zero access encryption at rest for your emails, address book contacts, and calendars. This means the messages and other data stored in your account are only readable by you.

- - - - - - - - - - - +
Email Encryption
+

ProtonMail has integrated OpenPGP encryption in their webmail. Emails to other ProtonMail users are encrypted automatically, and encryption to non-ProtonMail users with a OpenPGP key can be enabled easily in your account settings. They also allow you to encrypt messages to non-ProtonMail users without the need for them to sign up for a ProtonMail account or use software like OpenPGP.

+

ProtonMail also supports the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of ProtonMail to find the OpenPGP keys of ProtonMail users easily, for cross-provider E2EE.

- - - - - - - - - - - +
.onion Service
+

ProtonMail is accessible via Tor at protonirockerxow.onion.

- - - - - - - - - - - +
Extra Functionality
+

ProtonMail offers a "Visionary" account for €24/Month, which also enables access to ProtonVPN in addition to providing multiple accounts, domains, aliases, and extra storage.

+ + +
+
+ Mailbox +
+
+

Mailbox.org €12/Year

+

Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with 2 GB of storage, which can be upgraded as needed.

-
- - - - - - - - - - +
Domains and Aliases
+

Mailbox.org lets users use their own domain and they support catch-all addresses. Mailbox.org also supports subaddressing, which is useful for users who don't want to purchase a domain.

- - - - - - - - - - - +
Payment Methods
+

Mailbox.org doesn't accept Bitcoin or any other cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofort.

- - - - - - - - - - - +
Account Security
+

Mailbox.org supports two factor authentication for their webmail only. You can use either TOTP or a Yubikey via the Yubicloud. Web standards such as U2F and WebAuthn are not yet supported.

- -
Email ProviderWebsiteSinceJurisdictionStorageYearly PriceBitcoinEncryptionOwn Domain
- Disroot - - - - - 2015 - - Netherlands - - 1 GBFreeAcceptedBuilt-inYes
- Kolab Now - - - - - 2010 - - Switzerland - - 2 GB$ 60AcceptedBuilt-inYes
- mailbox.org +
Payment Methods
+

ProtonMail accepts Bitcoin in addition to accepting credit/debit cards and PayPal.

-
- - - - 2014 - - Germany - - 2 GB12 €NoBuilt-inYes
- Mailfence - - - - - 2013 - - Belgium - - 500 MBFreeAcceptedBuilt-inYes
- Posteo - - - - - 2009 - - Germany - - 2 GB12 €NoBuilt-inNo
- ProtonMail - - - - - - - - 2013 - - Switzerland - - 500 MBFreeAcceptedBuilt-inYes
- Runbox - - - - - 1999 - - Norway - - 1 GB$ 19.95AcceptedNoYes
- Soverin - - - - - 2015 - - Netherlands - - 25 GB29 €NoNoYes
- StartMail - - - - - 2014 - - Netherlands - - 10 GB$ 59.95AcceptedBuilt-inYes
- Tutanota - - - - - 2011 - - Germany - - 1 GBFreeNoBuilt-inYes
+
Data Security
+

Mailbox.org allows for encryption of incoming mail using their encrypted mailbox. New messages that you receive will then be immediately encrypted with your public key. This only protects message content while at rest so you should request that the sender encrypt the email message before sending in order to ensure confidentiality.

+

However, Open-Exchange, the software platform used by Mailbox.org, does not support the encryption of your address book and calendar. A standalone option may be more appropriate for that information.

+ +
Email Encryption
+

Mailbox.org has integrated E2EE encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also allow remote recipients to decrypt an email on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.

+

Mailbox.org also supports the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of Mailbox.org to find the OpenPGP keys of Mailbox.org users easily, for cross-provider E2EE.

+ +
.onion Service
+

You can access your Mailbox.org account via IMAP/SMTP using their .onion service. However, their webmail interface cannot be accessed via their .onion service, and users may experience TLS certificate errors.

+ +
Extra Functionality
+

All accounts come with limited cloud storage that can be encrypted. Mailbox.org also offers the alias @secure.mailbox.org, which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all.

+
+ +
+
+ Posteo +
+
+

Posteo €12/Year

+

Posteo.de is an email provider that focuses on anonymous, secure, and private email. Their servers are powered by 100% sustainable energy. They have been in operation since 2009. Posteo is based in Germany and has a free 14-day trial. Posteo comes with 2 GB for the monthly cost and an extra gigabyte can be purchased for €0.25 per month.

+ +
Domains and Aliases
+

Posteo does not allow the use of custom domains, however users may still make use of subaddressing.

+ +
Payment Methods
+

Posteo does not accept Bitcoin or other cryptocurrencies as a form of payment, however they do accept cash-by-mail. They also accept credit/debit cards, bank transfers, and PayPal, and claim that PII (personally identifiable information) that they receive in connection with these payment methods is not linked to your account.

+ +
Account Security
+

Posteo supports two factor authentication for their webmail only. You can use either TOTP a Yubikey with TOTP. Web standards such as U2F and WebAuthn are not yet supported.

+ +
Data Security
+

Posteo has zero access encryption for email storage. This means the messages stored in your account are only readable by you.

+

Posteo also supports the encryption of your address book contacts and calendars at rest. However, Posteo still uses standard CalDAV and CardDAV for calendars and contacts. These protocols do not support E2EE (End-To-End Encryption). A standalone option may be more appropiate.

+ +
Email Encryption
+

Posteo has integrated encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also support the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of Posteo to find the OpenPGP keys of Posteo users easily, for cross-provider E2EE.

+ +
.onion Service
+

Posteo does not operate a .onion service.

+ +
Extra Functionality
+

Posteo allows users to set up their own mailing lists. Each account can create one list for free.

+
+
+
+
+ Soverin +
+
+

Soverin €29/Year

+

Soverin.net is an email provider which focuses on being private, ad-free, and powered by sustainable energy. They have been in operation since 2015. Soverin is based in Amsterdam and does not have a free trial. Accounts start at 25 GB.

+ +
Domains and Aliases
+

Soverin lets users use their own domain. Soverin users can also use catch-all and aliases for domains they own. Soverin also allows for subaddressing, which is useful for users who don't want to purchase a domain.

+ +
Payment Methods
+

Soverin accepts Bitcoin as payment. They also accept credit/debit cards, PayPal, and the Netherlands-specific payment gateway iDEAL.

+ +
Account Security
+

Soverin supports TOTP two factor authentication for webmail only. They do not allow U2F security key authentication.

+ +
Data Security
+

Soverin has encryption at rest however it doesn't appear to be "zero access", meaning it is technically possible for them to decrypt the data they have.

+

Soverin also uses the standard CalDAV and CardDAV protocols for calendars and contacts, which do not support E2EE. A standalone option may be more appropriate.

+ +
Email Encryption
+

Soverin has integrated encryption in their webmail, which simplifies sending messages to users. However, Soverin has not integrated a Web Key Directory (WKD) for users on their platform.

+ +

.onion Service
+

Soverin does not operate a .onion service.

+ +
Extra Functionality
+

Soverin also providers users with space for a personal webpage.

+
+
+
+
+ Disroot +
+
+

Disroot Free

+

Disroot offers email amongst other services. The service is maintained by volunteers and its community. They have been in operation since 2015. Disroot is based in Amsterdam. Disroot is free and uses open source software such as Rainloop to provide service. Users support the service through donations and buying extra storage. The mailbox limit is 1 GB, but extra storage can be purchased 0.15€ per GB per month paid yearly.

+ +
Domains and Aliases
+

Disroot lets users use their own domain. They have aliases, however you must manually apply for them.

+ +
Payment Methods
+

Disroot accepts Bitcoin and Faircoin as payment methods. They also accept PayPal, direct bank deposit, and Patreon payments. Disroot is a not-for-profit organization that also accepts donations through Liberapay, Flattr, and Monero, but these payment methods cannot be used to purchase services.

+ +
Account Security
+

Disroot supports TOTP two factor authentication for webmail only. They do not allow U2F security key authentication.

+ +
Data Security
+

Disroot uses full disk encryption. However, it doesn't appear to be "zero access", meaning it is technically possible for them to decrypt the data they have.

+

Disroot also uses the standard CalDAV and CardDAV protocols for calendars and contacts, which do not support E2EE. A standalone option may be more appropriate.

+ +
Email Encryption
+

Disroot allows for encrypted emails to be sent from their webmail application using OpenPGP. However, Disroot has not integrated a Web Key Directory (WKD) for users on their platform.

+ +
.onion Service
+

Disroot does not operate a .onion service.

+ +
Extra Functionality
+

They offer other services such as NextCloud, XMPP Chat, Etherpad, Ethercalc, Pastebin, Online polls and a Gitea instance. They also have an app available in F-Droid.

+
+
+
+
+ Tutanota +
+
+

Tutanota Free

+

Tutanota.com is an email service with a focus on security and privacy through the use of encryption. Tutanota has been in operation since 2011 and is based in Hanover, Germany. Accounts start with 1GB storage with their free plan.

+

Tutanota doesn't allow the use of third-party email clients. There are plans to allow Tutanota pull email from external email accounts using the IMAP protocol. Email import is currently not possible.

+

Emails can be exported individually or by bulk selection. Tutanota does not allow for subfolders as you might expect with other email providers.

+

Tutanota is working on a desktop client and they have an app available in F-Droid. They also have their app in conventional stores such as App Store on iOS and Google Play for Android.

+ +
Domains and Aliases
+

Paid Tutanota accounts can use up to 5 aliases and custom domains. Tutanota doesn't allow for subaddressing (plus addresses), but you can use a catch-all with a custom domain.

+ +
Payment Methods
+

Tutanota accepts only credit cards and PayPal.

+ +
Account Security
+

Tutanota supports two factor authentication. Users can either use TOTP or U2F. U2F support is not yet available on Android.

+ +
Data Security
+

Tutanota has zero access encryption at rest for your emails, address book contacts, and calendars. This means the messages and other data stored in your account are only readable by you.

+ +
Email Encryption
+

Tutanota does not use OpenPGP. Tutanota users can only receive encrypted emails when external users send them through a temporary Tutanota mailbox.

+

Tutanota does have plans to support AutoCrypt. This would allow for external users to send encrypted emails to Tutanota users as long as their email client supports the AutoCrypt headers.

+ +
.onion Service
+

Tutanota does not operate a .onion service but may consider it in the future.

+ +
Extra Functionality
+

Tutanota offers the business version of Tutanota to non-profit organizations for free or with a heavy discount.

+ +

Tutanota also has a business feature called Secure Connect. This ensures customer contact to the business uses E2EE. The feature costs €240/year.

+
+
- -

Interesting Email Providers Under Development

- -
    -
  • Confidant Mail - An open-source non-SMTP cryptographic email system optimized for large file attachments. It is a secure and spam-resistant alternative to regular email and online file drop services. It - uses GNU Privacy Guard (GPG) for content encryption and authentication, and TLS 1.2 with ephemeral keys for transport encryption.
  • -
- -

Become Your Own Email Provider

- -Mail-in-a-Box -

Mail-in-a-Box lets you become your own mail service provider in a few easy steps. It's sort of like making your own Gmail, but one you control from top to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a working mail server. But you don't need to be a technology expert to set it up. More: https://mailinabox.email/

- -Mailcow -

Mailcow is a slightly more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mailserver with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. More: Mailcow Dockerized docs

diff --git a/_includes/sections/email-warning.html b/_includes/sections/email-warning.html new file mode 100644 index 00000000..ac524a13 --- /dev/null +++ b/_includes/sections/email-warning.html @@ -0,0 +1,10 @@ + +
+
Warning
+
+

When using end-to-end encryption (E2EE) technology like OpenPGP, email will still have some metadata that is not encrypted in the header of the email. Read more about email metadata.

+

OpenPGP also does not support Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. How do I protect my private keys?

+

Rather than use email for prolonged conversations, consider using a medium that does support Forward secrecy.

+ Recommended Instant Messengers +
+
diff --git a/assets/img/svg/3rd-party/anonaddy-dark.svg b/assets/img/svg/3rd-party/anonaddy-dark.svg new file mode 100644 index 00000000..02562e5d --- /dev/null +++ b/assets/img/svg/3rd-party/anonaddy-dark.svg @@ -0,0 +1,2 @@ + + diff --git a/assets/img/svg/3rd-party/anonaddy.svg b/assets/img/svg/3rd-party/anonaddy.svg new file mode 100644 index 00000000..9928c50f --- /dev/null +++ b/assets/img/svg/3rd-party/anonaddy.svg @@ -0,0 +1,2 @@ + + diff --git a/pages/providers/email.html b/pages/providers/email.html index 974e0018..78a7e353 100644 --- a/pages/providers/email.html +++ b/pages/providers/email.html @@ -1,27 +1,263 @@ --- layout: page permalink: /providers/email/ -title: "Best Secure Email Providers for Privacy" +title: "Private Email Providers" description: "Find a secure email provider that will keep your privacy in mind. Don't settle for ad-supported platforms. Never trust any company with your privacy, always encrypt." --- -
-
Warning
-
-

Even when using end-to-end encryption technology like GPG, email is inherently insecure and should not be trusted for sensitive communications. Metadata is always communicated in plaintext, and even when encryption is used correctly it is very easy for either party to accidentally respond to or forward a previously encrypted message in plaintext in many clients. GPG also does not easily support modern crypto functionality such as key rotation and forward secrecy.

-

We recommend the following email providers for routine notifications and messages from other services that require an email address. For communications that need to be safe and secure, you should use a dedicated instant messaging tool, such as Signal.

- Recommended Instant Messengers -
-
+{% include sections/email-warning.html %} {% include sections/email-providers.html %} -

Related Information

+
+

Our Email Provider Criteria

-
    -
  • Aging 'Privacy' Law Leaves Cloud E-Mail Open to Cops - Data stored in the cloud for longer than 6 months is considered abandoned and may be accessed by intelligence agencies without - a warrant. Learning: Use an external email client like Thunderbird or Enigmail, download your emails and store them locally. Never leave them on the server.
  • -
  • With May First/Riseup Server Seizure, FBI Overreaches Yet Again
  • -
  • Autistici/Inventati server compromised - The cryptographic services offered by the Autistici/Inventati server have been compromised on 15th June 2004. It was discovered on 21st June 2005. One year - later. During an enquiry on a single mailbox, the Postal Police may have tapped for a whole year every user's private communication going through the server autistici.org/inventati.org.
  • -
+

Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations. We have developed a clear set of requirements for any Email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing a Email provider, and conduct your own research to ensure the Email provider you choose is the right choice for you.

+ +
+
+
+

Jurisdiction

+

Operating outside the five/nine/fourteen-eyes countries is not necessarily a guarantee of privacy, and there are other factors to consider. However, we believe that avoiding these countries is important if you wish to avoid mass government dragnet surveillance, especially from the United States. Read our page on global mass surveillance and avoiding the US and UK to learn more about why we feel this is important.

+
+
+

Minimum to Qualify:

+
    +
  • Operating outside the USA or other Five Eyes countries.
  • +
+
+
+

Best Case:

+
    +
  • Operating outside the USA or other Fourteen Eyes countries.
  • +
  • Operating inside a country with strong consumer protection laws.
  • +
+
+ +
+

Technology

+

We regard these features as important in order to provide a safe and optimal service to users. Users should consider the provider which has the features they require.

+
+
+

Minimum to Qualify:

+
    +
  • Encrypts account data at rest.
  • +
  • Integrated webmail encryption provides convenience to users who want improve on having no E2EE encryption.
  • +
+
+
+

Best Case:

+
    +
  • Encrypts account data at rest with zero-access encryption.
  • +
  • Allow users to use their own domain name. Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad, be acquired by another company which doesn't prioritize privacy etc.
  • +
  • Support for WKD to allow improved discovery of public OpenPGP keys via HTTP.
    GnuPG users can get a key by typing: gpg --locate-key example_user@example.com
  • +
  • Support for a temporary mailbox for external users. This is useful when you want to send a encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
  • +
  • Availability of the email provider's services via an onion service.
  • +
  • Subaddressing support.
  • +
  • Catch all or aliases for users who own their own domains.
  • +
  • Use of standard email access protocols such as IMAP, SMTP or JMAP. Standard access protocols ensure customers can easily download all of their email,should they want to switch to another provider.
  • +
+
+ +
+

Privacy

+

We prefer our recommended providers to collect as little data as possible.

+
+
+

Minimum to Qualify:

+
    +
  • Protect sender's IP address. Filter it from showing in the Received header field.
  • +
  • Don't require personally identifiable information (PII) besides username and password.
  • +
  • Privacy policy that meets the requirements defined by the GDPR
  • +
+
+
+

Best Case:

+
    +
  • Accepts Bitcoin, cash, and other forms of cryptocurrency and/or anonymous payment options (gift cards, etc.)
  • +
+
+ +
+

Security

+

Email servers deal with a lot of very sensitive data. We expect that providers will adopt best industry practices in order to protect their users.

+
+
+

Minimum to Qualify:

+ +
+
+

Best Case:

+
    +
  • Support for hardware authentication, ie U2F and WebAuthn. U2F and WebAuthn are more secure as they use a private key stored on a client-side hardware device to authenticate users, as opposed to a shared secret that is stored on the web server and on the client side when using TOTP. Furthermore, U2F and WebAuthn are more resistant to phishing as their authentication response is based on the authenticated domain name.
  • +
  • Zero access encryption, builds on encryption at rest. The difference being the provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server.
  • +
  • DNS Certification Authority Authorization (CAA) Resource Record in addition to DANE support.
  • +
  • Implementation of Authenticated Received Chain (ARC), this is useful for users who post to mailing lists RFC8617.
  • +
  • Bug-bounty programs and/or a coordinated vulnerability-disclosure process.
  • +
  • Website security standards such as:
  • + +
+
+ +
+

Trust

+

You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.

+
+
+

Minimum to Qualify:

+
    +
  • Public-facing leadership or ownership.
  • +
+
+
+

Best Case:

+
    +
  • Public-facing leadership.
  • +
  • Frequent transparency reports.
  • +
+
+ +
+

Marketing

+

With the email providers we recommend we like to see responsible marketing.

+
+
+

Minimum to Qualify:

+
    +
  • Must self host analytics (no Google Analytics etc). The provider's site must also comply with DNT (Do Not Track) for those users who want to opt-out.
  • +
+

Must not have any marketing which is irresponsible:

+
    +
  • Claims of "unbreakable encryption". Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
  • +
  • Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know users can quite easily deanonymize themselves in a number of ways, eg:
  • +
      +
    • Reusing personal information eg. (email accounts, unique pseudonyms etc) that they accessed without anonymity software (Tor, VPN etc)
    • +
    • Browser fingerprinting
    • +
    +
+
+
+

Best Case:

+
    +
  • Clear and easy to read documentation. This includes things like, setting up 2FA, email clients, OpenPGP, etc.
  • +
+
+ +
+

Additional Functionality

+

While not strictly requirements, there are some factors we looked into when determining which providers to recommend.

+
+
+
+
+ +

Email encryption

+
+
+
+

What is end-to-end encryption (E2EE) encryption in email?

+

End-to-end encryption (E2EE) is a way of encrypting email contents so that nobody but the recipient(s) can read the email message.

+

How can I encrypt my email?

+

The standard way to do email E2EE and have it work between different email providers is with OpenPGP. There are different implementations of the OpenPGP standard, the most common being GnuPG and OpenPGP.js.

+

There is another standard that was popular with business called S/MIME, however it requires a certificate issued from a Certificate Authority (not all of them issue S/MIME certificates). It has support in G Suite Enterprise/Education and Office 365 Business or Exchange Server 2016, 2019.

+

What software can I use to get E2EE?

+

Email providers which allow you to use standard access protocols like IMAP and SMTP can be used with any of the email clients we recommend. This can be less secure as you are now relying on email providers to ensure that their encryption implementation works and has not been compromised in anyway.

+
+
+

How do I protect my private keys?

+

A smartcard (such as a Yubikey or Nitrokey) works by receiving an encrypted email message from a device (phone, tablet, computer etc) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.

+

It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.

+
+
+
+ +

Email metadata

+
+
+
+

Who can see the email metadata?

+

Email metadata is able to be seen by your email client software (or webmail) and any servers relaying the message from you to any recipients. Sometimes email servers will also use external parties to protect against spam.

+

What is email metadata?

+

Email software will often show some visible headers that you may have seen such as: To, From, Cc, Date, Subject. +

+

When is email metadata used?

+

Client software may use it to show who a message is from and what time it was received. Servers may use it to determine where an email message must be sent, among other purposes not transparent to the user.

+
+
+

Where is the email metadata?

+

Email metadata is stored in the message header of the email message.

+

Why can't email metadata be E2EE?

+

Email metadata is is cruicial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally and is also optional, therefore, only the message content is protected.

+

How is my metadata protected?

+

When emails travel between email providers an encrypted connection is negotiated using Opportunistic TLS. This protects the metadata from outside observers, but as it is not E2EE, server administrators can snoop on the metadata of an email.

+
+
+
+ +
+ +

Email cloaking services

+
+ + AnonAddy + +

AnonAddy lets users create aliases that forward to their email address. Can be self-hosted. Source code on GitHub.

+
+ +

Self-hosting Email

+
+

Advanced users may consider setting up their own email server. Mailservers require attention and continuous maintenance in order to keep things secure and mail delivery reliable.

+

Combined software solutions

+ + Mail-in-a-Box + +
+

Mail-in-a-Box is an automated setup script for deploying a mail server on Ubuntu. Its goal is to make it easier for users to set up their own mail server.

+ + Mailcow + +

Mailcow is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mailserver with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. Mailcow Dockerized docs

+ +

For a more manual approach we've picked out these two articles.

+ +
+ +

Related Email Articles

+ diff --git a/pages/software/email.html b/pages/software/email.html index 0366201c..1ce7dd68 100644 --- a/pages/software/email.html +++ b/pages/software/email.html @@ -5,14 +5,7 @@ title: "Email Clients" description: "Discover free, open-source, and secure email clients, along with some email alternatives you may not have considered." --- -
-
Warning
-
-

Even when using end-to-end encryption technology like GPG, email is inherently insecure and should not be trusted for sensitive communications. Metadata is always communicated in plaintext, and even when encryption is used correctly it is very easy for either party to accidentally respond to or forward a previously encrypted message in plaintext in many clients. GPG also does not easily support modern crypto functionality such as key rotation and forward secrecy.

-

We recommend the following email providers for routine notifications and messages from other services that require an email address. For communications that need to be safe and secure, you should use a dedicated instant messaging tool, such as Signal.

- Recommended Instant Messengers -
-
+{% include sections/email-warning.html %} {% include sections/email-clients.html %} -- 2.47.2 From 4efdd0e27e61b47095b250b4dabcd339d8e98bbd Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Sun, 1 Mar 2020 13:15:49 +0000 Subject: [PATCH 07/38] Add optimized version of Mailcow logo (#1743) --- assets/img/svg/3rd-party/mailcow.svg | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/assets/img/svg/3rd-party/mailcow.svg b/assets/img/svg/3rd-party/mailcow.svg index 60bb1a76..e3b2ad95 100644 --- a/assets/img/svg/3rd-party/mailcow.svg +++ b/assets/img/svg/3rd-party/mailcow.svg @@ -1,3 +1,2 @@ - - -image/svg+xml \ No newline at end of file + + -- 2.47.2 From 79adb49386ed003d1b78e7fc9b87d637a247cc6d Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Sun, 1 Mar 2020 14:51:44 +0000 Subject: [PATCH 08/38] Add missing space, use e.g. (#1744) --- _includes/sections/email-providers.html | 2 +- pages/providers/email.html | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index ec7afb32..c646afc5 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -19,7 +19,7 @@

ProtonMail Free

ProtonMail.com is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. ProtonMail is based in Genève, Switzerland. Accounts start with 500 MB storage with their free plan.

-

Free accounts have some limitations and do not allow the use of the ProtonMail Bridge, which is required to use a recommended email client (eg. Thunderbird) or to search email by body text. Paid accounts are available starting at €48/Year which include features like ProtonMail Bridge, additional storage, custom domain support, and more. The webmail and mobile apps can only search To:, From:, Date: and Subject: (this is likely to change when v4.0 of ProtonMail is released).

+

Free accounts have some limitations and do not allow the use of the ProtonMail Bridge, which is required to use a recommended email client (e.g. Thunderbird) or to search email by body text. Paid accounts are available starting at €48/Year which include features like ProtonMail Bridge, additional storage, custom domain support, and more. The webmail and mobile apps can only search To:, From:, Date: and Subject: (this is likely to change when v4.0 of ProtonMail is released).

Domains and Aliases

Paid ProtonMail users can use their own domain with the service. Catch-all addresses are supported with custom domains. ProtonMail also supports subaddressing, which is useful for users who don't want to purchase a domain.

diff --git a/pages/providers/email.html b/pages/providers/email.html index 78a7e353..2ba39b4f 100644 --- a/pages/providers/email.html +++ b/pages/providers/email.html @@ -55,7 +55,7 @@ description: "Find a secure email provider that will keep your privacy in mind.
  • Availability of the email provider's services via an onion service.
  • Subaddressing support.
  • Catch all or aliases for users who own their own domains.
  • -
  • Use of standard email access protocols such as IMAP, SMTP or JMAP. Standard access protocols ensure customers can easily download all of their email,should they want to switch to another provider.
  • +
  • Use of standard email access protocols such as IMAP, SMTP or JMAP. Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider.
  • @@ -86,7 +86,7 @@ description: "Find a secure email provider that will keep your privacy in mind.

    Minimum to Qualify:

    • Protection of webmail with two-factor authentication (2FA), such as TOTP.
    • -
    • Encryption at rest, (eg dm-crypt) this protects the contents of the servers in case of unlawful seizure.
    • +
    • Encryption at rest, (e.g. dm-crypt) this protects the contents of the servers in case of unlawful seizure.
    • DNSSEC support.
    • No TLS errors/vulnerabilities when being profiled by tools such as Hardenize, testssl.sh or Qualys SSL Labs, this includes certificate related errors, poor or weak ciphers suites, weak DH parameters such as those that led to Logjam.
    • A valid MTA-STS and TLS-RPT policy.
    • @@ -148,9 +148,9 @@ description: "Find a secure email provider that will keep your privacy in mind.

      Must not have any marketing which is irresponsible:

      • Claims of "unbreakable encryption". Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
      • -
      • Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know users can quite easily deanonymize themselves in a number of ways, eg:
      • +
      • Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know users can quite easily deanonymize themselves in a number of ways, e.g.:
        • -
        • Reusing personal information eg. (email accounts, unique pseudonyms etc) that they accessed without anonymity software (Tor, VPN etc)
        • +
        • Reusing personal information e.g. (email accounts, unique pseudonyms etc) that they accessed without anonymity software (Tor, VPN etc)
        • Browser fingerprinting
      -- 2.47.2 From e047c72a0f219abb43d04642976ffaac7552aa97 Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Mon, 2 Mar 2020 03:05:27 +0000 Subject: [PATCH 09/38] Catchall only with Professional/Visionary accounts (#1748) --- _includes/sections/email-providers.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index c646afc5..e495ddb1 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -22,7 +22,7 @@

      Free accounts have some limitations and do not allow the use of the ProtonMail Bridge, which is required to use a recommended email client (e.g. Thunderbird) or to search email by body text. Paid accounts are available starting at €48/Year which include features like ProtonMail Bridge, additional storage, custom domain support, and more. The webmail and mobile apps can only search To:, From:, Date: and Subject: (this is likely to change when v4.0 of ProtonMail is released).

      Domains and Aliases
      -

      Paid ProtonMail users can use their own domain with the service. Catch-all addresses are supported with custom domains. ProtonMail also supports subaddressing, which is useful for users who don't want to purchase a domain.

      +

      Paid ProtonMail users can use their own domain with the service. Catch-all addresses are supported with custom domains for Professional and Visionary plans. ProtonMail also supports subaddressing, which is useful for users who don't want to purchase a domain.

      Payment Methods

      ProtonMail accepts Bitcoin in addition to accepting credit/debit cards and PayPal.

      -- 2.47.2 From 63ae3b3fb8506f7184efbf2febde7b70927eca60 Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Mon, 2 Mar 2020 03:10:38 +0000 Subject: [PATCH 10/38] =?UTF-8?q?Use=20full=20name=20for=20processor=20Sof?= =?UTF-8?q?ort=C3=BCberweisung=20(#1747)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- _includes/sections/email-providers.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index e495ddb1..6d488b34 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -61,7 +61,7 @@

      Mailbox.org lets users use their own domain and they support catch-all addresses. Mailbox.org also supports subaddressing, which is useful for users who don't want to purchase a domain.

      Payment Methods
      -

      Mailbox.org doesn't accept Bitcoin or any other cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofort.

      +

      Mailbox.org doesn't accept Bitcoin or any other cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung.

      Account Security

      Mailbox.org supports two factor authentication for their webmail only. You can use either TOTP or a Yubikey via the Yubicloud. Web standards such as U2F and WebAuthn are not yet supported.

      -- 2.47.2 From cf8ab735145232b4fa0fe0a954385c4c6e778c3e Mon Sep 17 00:00:00 2001 From: nitrohorse <1514352+nitrohorse@users.noreply.github.com> Date: Mon, 2 Mar 2020 02:58:46 -0800 Subject: [PATCH 11/38] Remove Dnswarden - project unmaintained (#1746) approved, thanks for the PR nitro. --- _includes/sections/dns.html | 43 ------------------------------------- 1 file changed, 43 deletions(-) diff --git a/_includes/sections/dns.html b/_includes/sections/dns.html index c9c7f53e..50f17d15 100644 --- a/_includes/sections/dns.html +++ b/_includes/sections/dns.html @@ -191,49 +191,6 @@ Self - - - dnswarden - - - - - Germany - - - - - - - - Hobby Project - No - - - DoH, - - DoT , - - - DNSCrypt - - Yes - Yes - - - Based on server choice - - - ? - - - Hetzner Online GmbH - - - - Foundation for Applied Privacy -- 2.47.2 From e29266e53cc1fb05afd33e73ebc04fb7cc53e977 Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Mon, 2 Mar 2020 13:36:58 -0600 Subject: [PATCH 12/38] Add #dev:privacytools.io to README --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 906c72cd..e9156db9 100644 --- a/README.md +++ b/README.md @@ -10,9 +10,9 @@ _Encryption Against Global Mass Surveillance._ It's important for a website like PrivacyTools to be up-to-date. Keep an eye on software updates of the applications listed here. Follow recent news about providers that are recommended. We try our best to keep up but we're not perfect and the internet is changing fast. So if you find an error, or you think a provider should not be listed here, or a qualified service provider is missing or a browser plugin is not the best choice anymore or anything else... -**Talk to us please.** Join our [subreddit](https://www.reddit.com/r/privacytoolsIO/) or [our Discourse community](https://forum.privacytools.io/) and start a discussion. This is a community project and we're aiming to deliver the best information available for a better privacy. Thank you for participating. +**Talk to us!** If you want to help make privacytools.io the best website it can be, join our Matrix discussion chat at [`#dev:privacytools.io`](https://matrix.to/#/#dev:privacytools.io), where we talk about open issues and PRs in this repo, and changes to the site. You may submit any website suggestions here on GitHub [Issues](https://github.com/privacytoolsIO/privacytools.io/issues). Please refer to the [contribution guidelines](.github/CONTRIBUTING.md) and consider stopping by our chat room before submitting. Thank you. -You can submit your suggestions here on GitHub [(Issues)](https://github.com/privacytoolsIO/privacytools.io/issues) and also in our [subreddit](https://www.reddit.com/r/privacytoolsIO/). Please refer to the [Contributing Guidelines](.github/CONTRIBUTING.md) before submitting. Thank you. +If you want to discuss privacy in general, a new tool, or just something else, feel free to join [our Discourse community](https://forum.privacytools.io/) or our general Matrix room at [`#general:privacytools.io`](https://matrix.to/#/#general:privacytools.io) and start a discussion! This is a community project and we're aiming to deliver the best information available. Thank you for participating. ## Developing -- 2.47.2 From 952197e8da7e39a2a676f0da867d3f87d605f22d Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Tue, 3 Mar 2020 04:04:29 +0000 Subject: [PATCH 13/38] Minor email listing corrections (#1751) --- _includes/sections/email-providers.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index 6d488b34..a440790b 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -67,11 +67,11 @@

      Mailbox.org supports two factor authentication for their webmail only. You can use either TOTP or a Yubikey via the Yubicloud. Web standards such as U2F and WebAuthn are not yet supported.

      Data Security
      -

      Mailbox.org allows for encryption of incoming mail using their encrypted mailbox. New messages that you receive will then be immediately encrypted with your public key. This only protects message content while at rest so you should request that the sender encrypt the email message before sending in order to ensure confidentiality.

      +

      Mailbox.org allows for encryption of incoming mail using their encrypted mailbox. New messages that you receive will then be immediately encrypted with your public key.

      However, Open-Exchange, the software platform used by Mailbox.org, does not support the encryption of your address book and calendar. A standalone option may be more appropriate for that information.

      Email Encryption
      -

      Mailbox.org has integrated E2EE encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also allow remote recipients to decrypt an email on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.

      +

      Mailbox.org has integrated encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also allow remote recipients to decrypt an email on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.

      Mailbox.org also supports the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of Mailbox.org to find the OpenPGP keys of Mailbox.org users easily, for cross-provider E2EE.

      .onion Service
      -- 2.47.2 From 055457fe9c2e4ade0fc9668154a52a73e0fa34b3 Mon Sep 17 00:00:00 2001 From: PoorPockets McNewHold Date: Tue, 3 Mar 2020 21:26:28 +0100 Subject: [PATCH 14/38] Removal of Jive Search due to #1739 (#1756) Approved issue by @blacklight447-ptio https://github.com/privacytoolsIO/privacytools.io/issues/1739#issuecomment-593086290 --- _includes/sections/search-engines.html | 1 - 1 file changed, 1 deletion(-) diff --git a/_includes/sections/search-engines.html b/_includes/sections/search-engines.html index afdb78e2..ad710454 100644 --- a/_includes/sections/search-engines.html +++ b/_includes/sections/search-engines.html @@ -47,7 +47,6 @@ github="https://github.com/Qwant/"
      • YaCy - A free-software P2P search engine powered by its users.
      • -
      • Jive Search - A free-software search engine with a similar look and feel to Google.
      • MetaGer - An open-source metasearch engine, which is based in Germany. It focuses on protecting the user's privacy.
      • Mojeek - Independent and unbiased search results with no user tracking.
      -- 2.47.2 From 4c621018c6ac2b12df9b20d1822711a563d5a09a Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Tue, 3 Mar 2020 23:03:25 +0000 Subject: [PATCH 15/38] Remove emphasis, correct disroot badge (#1754) --- _includes/sections/email-providers.html | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index a440790b..21986d64 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -25,7 +25,7 @@

      Paid ProtonMail users can use their own domain with the service. Catch-all addresses are supported with custom domains for Professional and Visionary plans. ProtonMail also supports subaddressing, which is useful for users who don't want to purchase a domain.

      Payment Methods
      -

      ProtonMail accepts Bitcoin in addition to accepting credit/debit cards and PayPal.

      +

      ProtonMail accepts Bitcoin in addition to accepting credit/debit cards and PayPal.

      Account Security

      ProtonMail supports TOTP two factor authentication only. The use of a U2F security key is not yet supported. ProtonMail is planning to implement U2F upon completion of their Single Sign On (SSO) code.

      @@ -61,7 +61,7 @@

      Mailbox.org lets users use their own domain and they support catch-all addresses. Mailbox.org also supports subaddressing, which is useful for users who don't want to purchase a domain.

      Payment Methods
      -

      Mailbox.org doesn't accept Bitcoin or any other cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung.

      +

      Mailbox.org doesn't accept Bitcoin or any other cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung.

      Account Security

      Mailbox.org supports two factor authentication for their webmail only. You can use either TOTP or a Yubikey via the Yubicloud. Web standards such as U2F and WebAuthn are not yet supported.

      @@ -134,7 +134,7 @@

      Soverin lets users use their own domain. Soverin users can also use catch-all and aliases for domains they own. Soverin also allows for subaddressing, which is useful for users who don't want to purchase a domain.

      Payment Methods
      -

      Soverin accepts Bitcoin as payment. They also accept credit/debit cards, PayPal, and the Netherlands-specific payment gateway iDEAL.

      +

      Soverin accepts Bitcoin as payment. They also accept credit/debit cards, PayPal, and the Netherlands-specific payment gateway iDEAL.

      Account Security

      Soverin supports TOTP two factor authentication for webmail only. They do not allow U2F security key authentication.

      @@ -170,7 +170,7 @@
      Domains and Aliases

      Disroot lets users use their own domain. They have aliases, however you must manually apply for them.

      -
      Payment Methods
      +
      Payment Methods

      Disroot accepts Bitcoin and Faircoin as payment methods. They also accept PayPal, direct bank deposit, and Patreon payments. Disroot is a not-for-profit organization that also accepts donations through Liberapay, Flattr, and Monero, but these payment methods cannot be used to purchase services.

      Account Security
      -- 2.47.2 From f65af998cc3f9b6ed90996ee5be296b800a68f99 Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Wed, 4 Mar 2020 16:32:03 -0600 Subject: [PATCH 16/38] Set security headers Honestly I can't remember why we have Access-Control-Allow-Origin set, so hopefully removing it does not break anything. --- nginx/010-headers.conf | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/nginx/010-headers.conf b/nginx/010-headers.conf index 95424841..619996b6 100644 --- a/nginx/010-headers.conf +++ b/nginx/010-headers.conf @@ -3,7 +3,7 @@ add_header X-XSS-Protection "1; mode=block" always; add_header X-Content-Type-Options nosniff always; add_header Content-Security-Policy "default-src 'none'; script-src 'self' https://stats.privacytools.io; style-src 'self'; img-src 'self' data: https://*.privacytools.io; object-src 'none'; frame-src https://stats.privacytools.io; font-src 'self'; base-uri 'none'; form-action 'self' https://search.privacytools.io; frame-ancestors 'none'; manifest-src 'self';" always; add_header Strict-Transport-Security "max-age=31557600; includeSubDomains; preload"; -add_header 'Access-Control-Allow-Origin' '*'; add_header Alt-Svc 'h2="privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion:443"; ma=86400; persist=1'; add_header Expect-CT 'max-age=86400, enforce'; add_header Referrer-Policy "strict-origin"; +add_header Feature-Policy "geolocation none;midi none;notifications none;push none;sync-xhr none;microphone none;camera none;magnetometer none;gyroscope none;speaker self;vibrate none;fullscreen self;payment none;"; -- 2.47.2 From cb130b6f6f7c67ddb5818f06f3f15af749eeffc8 Mon Sep 17 00:00:00 2001 From: zenithium <48525551+zenithium@users.noreply.github.com> Date: Fri, 6 Mar 2020 14:32:45 +0000 Subject: [PATCH 17/38] Grammar fix (#1766) * Grammar * Grammar fix --- _includes/sections/email-providers.html | 2 +- pages/providers/email.html | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index 21986d64..86c7c2aa 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -34,7 +34,7 @@

      ProtonMail has zero access encryption at rest for your emails, address book contacts, and calendars. This means the messages and other data stored in your account are only readable by you.

      Email Encryption
      -

      ProtonMail has integrated OpenPGP encryption in their webmail. Emails to other ProtonMail users are encrypted automatically, and encryption to non-ProtonMail users with a OpenPGP key can be enabled easily in your account settings. They also allow you to encrypt messages to non-ProtonMail users without the need for them to sign up for a ProtonMail account or use software like OpenPGP.

      +

      ProtonMail has integrated OpenPGP encryption in their webmail. Emails to other ProtonMail users are encrypted automatically, and encryption to non-ProtonMail users with an OpenPGP key can be enabled easily in your account settings. They also allow you to encrypt messages to non-ProtonMail users without the need for them to sign up for a ProtonMail account or use software like OpenPGP.

      ProtonMail also supports the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of ProtonMail to find the OpenPGP keys of ProtonMail users easily, for cross-provider E2EE.

      .onion Service
      diff --git a/pages/providers/email.html b/pages/providers/email.html index 2ba39b4f..39054276 100644 --- a/pages/providers/email.html +++ b/pages/providers/email.html @@ -12,7 +12,7 @@ description: "Find a secure email provider that will keep your privacy in mind.

      Our Email Provider Criteria

      -

      Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations. We have developed a clear set of requirements for any Email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing a Email provider, and conduct your own research to ensure the Email provider you choose is the right choice for you.

      +

      Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations. We have developed a clear set of requirements for any Email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing an Email provider, and conduct your own research to ensure the Email provider you choose is the right choice for you.

      @@ -51,7 +51,7 @@ description: "Find a secure email provider that will keep your privacy in mind.
    • Encrypts account data at rest with zero-access encryption.
    • Allow users to use their own domain name. Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad, be acquired by another company which doesn't prioritize privacy etc.
    • Support for WKD to allow improved discovery of public OpenPGP keys via HTTP.
      GnuPG users can get a key by typing: gpg --locate-key example_user@example.com
    • -
    • Support for a temporary mailbox for external users. This is useful when you want to send a encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
    • +
    • Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
    • Availability of the email provider's services via an onion service.
    • Subaddressing support.
    • Catch all or aliases for users who own their own domains.
    • -- 2.47.2 From 0cde9d204a31a735591c3b3bd43c5348dd362d79 Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Fri, 6 Mar 2020 14:47:41 +0000 Subject: [PATCH 18/38] Update Posteo payment anonymization (#1762) --- _includes/sections/email-providers.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index 86c7c2aa..44b38c39 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -98,7 +98,7 @@

      Posteo does not allow the use of custom domains, however users may still make use of subaddressing.

      Payment Methods
      -

      Posteo does not accept Bitcoin or other cryptocurrencies as a form of payment, however they do accept cash-by-mail. They also accept credit/debit cards, bank transfers, and PayPal, and claim that PII (personally identifiable information) that they receive in connection with these payment methods is not linked to your account.

      +

      Posteo does not accept Bitcoin or other cryptocurrencies as a form of payment, however they do accept cash-by-mail. They also accept credit/debit cards, bank transfers, and PayPal, and remove PII (personally identifiable information) that they receive in connection with these payment methods.

      Account Security

      Posteo supports two factor authentication for their webmail only. You can use either TOTP a Yubikey with TOTP. Web standards such as U2F and WebAuthn are not yet supported.

      -- 2.47.2 From 8929918d5f07c6ca2aead86162e55c826b358b6d Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Fri, 6 Mar 2020 17:25:30 +0000 Subject: [PATCH 19/38] A New Path for DOJ to Finally Break Encryption (#1768) --- pages/software/real-time-communication.html | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/pages/software/real-time-communication.html b/pages/software/real-time-communication.html index ffca657d..180e45fe 100644 --- a/pages/software/real-time-communication.html +++ b/pages/software/real-time-communication.html @@ -14,6 +14,11 @@ description: "Discover secure and private ways to communicate with others online Recent news about breaking E2EE on centralized instant messengers +
      March 2020
      + +
      January 2020
      • The EARN IT Act: How to Ban End-to-End Encryption Without Actually Banning It
      • -- 2.47.2 From 0b5b9b53ad92be59bf0eb36fcb604b75723d1264 Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Fri, 6 Mar 2020 17:26:10 +0000 Subject: [PATCH 20/38] IVPN supports Wireguard, anchor links (#1767) --- _includes/sections/vpn.html | 17 +++++++++++++---- 1 file changed, 13 insertions(+), 4 deletions(-) diff --git a/_includes/sections/vpn.html b/_includes/sections/vpn.html index 9e077358..0defdacf 100644 --- a/_includes/sections/vpn.html +++ b/_includes/sections/vpn.html @@ -17,7 +17,10 @@ alt="Mullvad">
      -

      Mullvad EUR €60/Year

      +

      + Mullvad + EUR €60/Year +

      Mullvad.net is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since 2009. Mullvad is based in Sweden and does not have a free trial.

      35 Countries

      Mullvad has servers in 35 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.

      @@ -48,7 +51,11 @@ ProtonVPN
      -

      ProtonVPN Free USD $96/year

      +

      + ProtonVPN + Free + USD $96/year +

      ProtonVPN.com is a strong contender in the VPN space, and they have been in operation since 2016. ProtonVPN is based in Switzerland and offers a limited free pricing tier, as well as premium options.

      44 Countries

      ProtonVPN has servers in 44 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.

      @@ -72,8 +79,8 @@ IVPN
      -

      - IVPN +

      + IVPN Standard USD $60/Year Pro USD $100/Year

      @@ -87,6 +94,8 @@

      As of Feburary 2020 IVPN applications are now open source. Source code can be obtained from their GitHub organization.

      Accepts Bitcoin

      In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin and cash/local currency (on annual plans) as anonymous forms of payment.

      +
      WireGuard Support
      +

      In addition to standard OpenVPN connections, IVPN supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.

      Remote Port Forwarding

      Remote port forwarding is possible with a Pro plan. Port forwarding can be activated via the client area. Port forwarding is only available on IVPN when using OpenVPN and is disabled on US servers.

      Mobile Clients
      -- 2.47.2 From 79bc5e9a053ba3566fe9e11200c8e0e21fefa0bb Mon Sep 17 00:00:00 2001 From: zenithium <48525551+zenithium@users.noreply.github.com> Date: Tue, 10 Mar 2020 15:26:50 +0000 Subject: [PATCH 21/38] Fix PR template CoC link (#1777) --- .github/PULL_REQUEST_TEMPLATE.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/PULL_REQUEST_TEMPLATE.md b/.github/PULL_REQUEST_TEMPLATE.md index 35636740..19a53c5f 100644 --- a/.github/PULL_REQUEST_TEMPLATE.md +++ b/.github/PULL_REQUEST_TEMPLATE.md @@ -1,4 +1,4 @@ - + ## Description -- 2.47.2 From 76db0cf74214c7d6df1463c75a4319fe1201619e Mon Sep 17 00:00:00 2001 From: zenithium <48525551+zenithium@users.noreply.github.com> Date: Tue, 10 Mar 2020 15:30:50 +0000 Subject: [PATCH 22/38] Add link to CoC and correct Mastodon link (#1776) --- _includes/sections/participate.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/_includes/sections/participate.html b/_includes/sections/participate.html index 9d8ad2a6..dc5e936b 100644 --- a/_includes/sections/participate.html +++ b/_includes/sections/participate.html @@ -2,7 +2,7 @@

      Participate with suggestions and constructive criticism

      -

      It's important for a website like {{ site.name }} to stay up-to-date. Keep an eye on software updates for the applications listed on our site. Follow recent news about providers that we recommend. We try our best to keep up, but we're not perfect and the internet is changing fast. If you find an error, or you think a provider should not be listed here, or a qualified service provider is missing, or a browser plugin is not the best choice anymore, or anything else... Talk to us please. You can also find us on our own Mastodon instance or on Matrix at #general:privacytools.io.

      +

      It's important for a website like {{ site.name }} to stay up-to-date. Keep an eye on software updates for the applications listed on our site. Follow recent news about providers that we recommend. We try our best to keep up, but we're not perfect and the internet is changing fast. If you find an error, or you think a provider should not be listed here, or a qualified service provider is missing, or a browser plugin is not the best choice anymore, or anything else... Talk to us please. You can also find us on Matrix at #general:privacytools.io. When using our services, users should follow our Code of Conduct.

      @@ -18,7 +18,7 @@ {% include card.html color="primary" title="Follow on Mastodon & Twitter" image="/assets/img/svg/3rd-party/mastodon.svg" - url="https://social.privacytools.io/" + url="https://social.privacytools.io/@privacytools" website="Mastodon" extra_button='Twitter' description="Get the latest privacy-related updates from our Mastodon Feed. Follow us today!" -- 2.47.2 From edd177f9a81c386828716402241bc9854093604a Mon Sep 17 00:00:00 2001 From: zenithium <48525551+zenithium@users.noreply.github.com> Date: Tue, 10 Mar 2020 16:15:14 +0000 Subject: [PATCH 23/38] Solve issues related to WebRTC (#1773) * Add explanation for disabling WebRTC in Safari * Add brief explanation of what disabling WebRTC does * Update _includes/sections/browser-webrtc.html Co-Authored-By: Jonah Aragon * Removed second test button * Add note about WebRTC with Snowflake * Grammar is hard Co-Authored-By: Jonah Aragon * Corrected iOS to macOS iOS is for phones Co-authored-by: Jonah Aragon --- _includes/sections/browser-addons.html | 2 +- _includes/sections/browser-webrtc.html | 17 ++++++++++++++--- 2 files changed, 15 insertions(+), 4 deletions(-) diff --git a/_includes/sections/browser-addons.html b/_includes/sections/browser-addons.html index 1ac7d914..a579591f 100644 --- a/_includes/sections/browser-addons.html +++ b/_includes/sections/browser-addons.html @@ -67,7 +67,7 @@ opera="https://addons.opera.com/en/extensions/details/terms-of-service-didnt-rea {% include cardv2.html title="Snowflake" image="/assets/img/svg/3rd-party/snowflake.svg" -description="Snowflake is a new pluggable transport from the Tor Project. If you have an uncensored connection, running this extension volunteers your connection to be used as a Snowflake proxy to help users unable to connect to the Tor network. Your IP will not be visible to the sites users visit using your proxy, as this extension will not make you an exit node. If your access to the Tor network is blocked, this extension will not assist you, and you should use the Tor Browser instead." +description="Snowflake is a new pluggable transport from the Tor Project. If you have an uncensored connection, running this extension volunteers your connection to be used as a Snowflake proxy to help users unable to connect to the Tor network. Your IP will not be visible to the sites users visit using your proxy, as this extension will not make you an exit node. If your access to the Tor network is blocked, this extension will not assist you, and you should use the Tor Browser instead. Note: This add-on does not work with WebRTC disabled." website="https://snowflake.torproject.org" forum="https://forum.privacytools.io/t/discussion-snowflake/1146" git="https://gitweb.torproject.org/pluggable-transports/snowflake.git" diff --git a/_includes/sections/browser-webrtc.html b/_includes/sections/browser-webrtc.html index 9271f5a3..be7c7a9a 100644 --- a/_includes/sections/browser-webrtc.html +++ b/_includes/sections/browser-webrtc.html @@ -4,7 +4,7 @@ WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.
      -

      While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.

      +

      While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe. Note: This disables browser-based call functionality that is used for webapps like Discord, Hangouts, Jitsi, etc.

      Test your Browser now @@ -38,10 +38,21 @@ Test your Browser again

      -

      How to fix the WebRTC Leak in Google Chrome?

      +

      How to disable WebRTC in Safari?

      + +

      Safari is far stricter with WebRTC than other major browsers, and it does not leak your IP address in its default configuration. If you'd like, you can follow these steps just to double-check your browser:

      + +
        +
      1. Choose "Preferences" under the Safari menu in your menu bar.
      2. +
      3. Select the Advanced tab and check the "Show Develop menu in menu bar" box.
      4. +
      5. Exit Preferences and open the Develop menu in your menu bar.
      6. +
      7. In the drop-down menu, open the "WebRTC" submenu and ensure "Enable Legacy WebRTC API" is unchecked. If it's grayed out, even better.
      8. +
      + +

      How to disable WebRTC in Google Chrome?

      WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).

      What about other browsers?

      -

      Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. But we recommend using Firefox on all devices.

      +

      Chrome on macOS and Internet Explorer do not implement WebRTC yet. But we recommend using Firefox on all devices.

      -- 2.47.2 From c5a303ca5617d4aedabc2372d88874ef3b6fedee Mon Sep 17 00:00:00 2001 From: zenithium <48525551+zenithium@users.noreply.github.com> Date: Wed, 11 Mar 2020 12:19:19 +0000 Subject: [PATCH 24/38] Add new browser tweaks and remove deprecated info (#1772) --- _includes/sections/browser-tweaks.html | 29 ++++++++++++++++++-------- 1 file changed, 20 insertions(+), 9 deletions(-) diff --git a/_includes/sections/browser-tweaks.html b/_includes/sections/browser-tweaks.html index cae460c8..00fdb762 100644 --- a/_includes/sections/browser-tweaks.html +++ b/_includes/sections/browser-tweaks.html @@ -26,14 +26,11 @@
      [FF67+] Blocks CryptoMining
      privacy.trackingprotection.enabled = true
      -
      This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.
      +
      This is Mozilla's new built-in tracking protection. One of it's benefits is blocking tracking (i.e. Google Analytics) on privileged pages where add-ons that usually do that are disabled.
      browser.send_pings = false
      The attribute would be useful for letting websites track visitors' clicks.
      -
      browser.sessionstore.max_tabs_undo = 0
      -
      Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.
      -
      browser.urlbar.speculativeConnect.enabled = false
      Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. Source
      @@ -85,9 +82,6 @@
    -
    Looking for TRR, DoH or ESNI?
    -
    They have moved to our DNS page.
    -
    webgl.disabled = true
    WebGL is a potential security risk. Source
    @@ -101,14 +95,32 @@ +
    beacon.enabled = false
    +
    Disables sending additional analytics to web servers. Details
    + +
    browser.safebrowsing.downloads.remote.enabled = false
    +
    Prevents Firefox from sending information about downloaded executable files to Google Safe Browsing to determine whether it should be blocked for safety reasons. Details
    + +
    Disable Firefox prefetching pages it thinks you will visit next:
    +
    + Prefetching causes cookies from the prefetched site to be loaded and other potentially unwanted behavior. Details here and here. +
      +
    • network.dns.disablePrefetch = true
    • +
    • network.dns.disablePrefetchFromHTTPS = true
    • +
    • network.predictor.enabled = false
    • +
    • network.predictor.enable-prefetch = false
    • +
    • network.prefetch-next = false
    • +
    network.IDN_show_punycode = true
    Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. Source
    +
    Looking for TRR, DoH or ESNI?
    +
    They have moved to our DNS page.

    Firefox user.js Templates

      -
    • ghacks-user.js - An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting.
    • +
    • ghacks-user.js - An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting.
    @@ -117,7 +129,6 @@ -- 2.47.2 From 06758605f30c4b7781c59754ed5f016518b5716f Mon Sep 17 00:00:00 2001 From: nitrohorse <1514352+nitrohorse@users.noreply.github.com> Date: Wed, 11 Mar 2020 07:50:51 -0700 Subject: [PATCH 25/38] Update nitrohorse's key (#1778) --- .../hu/zt71pstaerw1jpa5ru3borqmfsnbwnf6 | Bin 2269 -> 4177 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/.well-known/openpgpkey/hu/zt71pstaerw1jpa5ru3borqmfsnbwnf6 b/.well-known/openpgpkey/hu/zt71pstaerw1jpa5ru3borqmfsnbwnf6 index 07d40720bdaae18ed1ce0f743acc3367b1efd177..eb0bd0f7e0ae2d5b8c2615a41ec547a8eb3b7e78 100755 GIT binary patch delta 1871 zcmZ9~XIPU50s!FTgM_eTgsmb=6Us)zG68}jL$+)I3B!by0AWSI4^Tu}hBPt+8f8>L zKv2TAM5dxp5>%uV5{4i{L573fyXWq?-qXMD?{`vyqtqY)fM`59C_0!xRk9#ZW20jz zN?5{wz?>Ws6HOseqN%~!fs_c-Ou&dA2}M9OVSsnqnFc{|ie9YS)wpmLaF`D!sE9Oz z0P;|NVF5utm^4BN;NzEpKmiCOoG5m1cJ-NRFE9|MnH|7Tz;B*|ypBJd>>PCjUP%V6 zOgpumOqvI1Fw(OCBcY!ztNM?Hj5=p}7hLsr5t7ipvr%?>^BA5#Bs(&_<#a-Z&9cXv zmE#0r_MOu8X;49t>*&d#)tfmKj-Bm8&xVjBaQ!PCF9#aixVTeb~Tx1M7?VsY!Bn3Uo zeF{IHOJk3C&ig9Ac`0!P#xLLb{=$)Z2eo0mGU?GBH#u`7cWDd-mGQPNRCn*Ng#!BkUqE$qvnvYaOerA}Gv3I8Ld@Aok`DK?13u|Jc3U z!qk{V3+dh-TI`?86>XLhT7^4rXdNc71w7nFpc-bzVwsJ62)-(MqS_D4UKkfHF7PJi zqy#Q5m22g-?Xg>z5hvrY>d1^kLnGVUykCbLMru?tot^Y&*=9yFKR7WZaBkvHoGT16 zx#yoq@oC!`lpPsWiu%*tbE~!11vt1#0&;cvw}Hm%PHPw47jy=IWMU7m4Jk9YMU8(4cYbg5o(P5w2QvA{{NT5i)d`?cgQ zsrAa%$i(F9;XKy287aGX^O{zdh@r;v_W0;o(QM()guB!Hxr2iOb$i3-a33KG!kN33 zb+?-qdJ;wGmwwA*Ok6AZ5eqIN*9m9bQY;;ls#&vF+%@`}lVTCQE@I@Vz^Gwa z1vVb4dNmb$!VRr^#tf}1uhxJgp_hIyEg4IF`&8M1cS|xx?mFY}D@mvWE9)+r@w!_- zAc7eo7p9^(G&kGyqM66?&C~E%LWUhw*;eI3lXyw+gSh06{z0JW(!N75vj1gc%fJU$ zZyjM6yL8%5Og5`52#>wPn5`IYAkmRLPEV2{0nbG^)06k85|toU*ZA zauBIRVVsm*`#s+GY|F7#P*W1}aVnUWjT|o{#y9}XJZ&-A-Sw(|=wlSB?8F__ z&F<^5lRdfzDOY+kJtA*FXJ4GnHsHY@GiDYzk8tn>fxN}Uuf#RC2$~`LN@CHcey;lV z>XSUt#Y%;O+5*Y;J2UbO8kd!TBG%n`(n33 zXOlPQ-4q%K`5;%?Cn+r^UhLN1a=Vb_ Date: Thu, 12 Mar 2020 15:26:47 +0000 Subject: [PATCH 26/38] Correct mistake from VPN page (#1781) --- pages/providers/email.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pages/providers/email.html b/pages/providers/email.html index 39054276..685ff5c3 100644 --- a/pages/providers/email.html +++ b/pages/providers/email.html @@ -120,7 +120,7 @@ description: "Find a secure email provider that will keep your privacy in mind.

    Trust

    -

    You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.

    +

    You wouldn't trust your finances to someone with a fake identity, so why trust them with your email? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.

    Minimum to Qualify:

    -- 2.47.2 From c9886ae9604773ff91c84adc210a17e69b0bcdd5 Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Thu, 12 Mar 2020 15:28:03 +0000 Subject: [PATCH 27/38] Mention mailbox.org supports Exchange ActiveSync (#1780) --- _includes/sections/email-providers.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index 44b38c39..8d9a4984 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -78,7 +78,7 @@

    You can access your Mailbox.org account via IMAP/SMTP using their .onion service. However, their webmail interface cannot be accessed via their .onion service, and users may experience TLS certificate errors.

    Extra Functionality
    -

    All accounts come with limited cloud storage that can be encrypted. Mailbox.org also offers the alias @secure.mailbox.org, which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all.

    +

    All accounts come with limited cloud storage that can be encrypted. Mailbox.org also offers the alias @secure.mailbox.org, which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports Exchange ActiveSync in addition to standard access protocols like IMAP and POP3.

    -- 2.47.2 From 10c679d6879f3d311dffa5d30d3945ac4343a219 Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Thu, 12 Mar 2020 10:28:53 -0500 Subject: [PATCH 28/38] Add a note on self-hosting (#1732) * Add a note on self-hosting * Use for our matrix room Co-Authored-By: Mikaela Suomalainen * Update services.html Recommend that people should also seek out other hosters. * Update services.html fix the librehosters link * Update services.html * Reworded Don't use idioms like "eggs in basket", as they don't translate well. * 2 spaces * Missing closed paragraph * As Always, sounds better than long story short Co-authored-by: Daniel Nathan Gray Co-authored-by: Mikaela Suomalainen Co-authored-by: blacklight447 --- pages/services.html | 17 ++++++++++++++++- 1 file changed, 16 insertions(+), 1 deletion(-) diff --git a/pages/services.html b/pages/services.html index 58a190ce..a3c40e44 100644 --- a/pages/services.html +++ b/pages/services.html @@ -9,7 +9,7 @@ description: "The PrivacyTools team is proud to introduce a suite of privacy-cen

    More services are on the way. If there's something that would be super beneficial for us to run, don't hesitate to reach out and ask. And of course, if you like our services, please consider donating to support our server costs, any donation helps!

    + +

    A brief note

    + +

    We are providing these services because we believe in decentralized and federated networks, and free and open source software. The tools we host are a great and convenient entry-point to these services like Matrix, Mastodon, and WriteFreely. We hope that we are able to spur the adoption of these alternative networks, and we strongly believe all of our services are far better than traditional providers, such as Twitter, Facebook, and Google.

    +

    However, as with any hosted, online service, remember that using our services involves risks that may or may not be acceptable to you. Using online services requires trust in the service provider. We don't know of any surefire way to evaluate a provider for privacy, or provide a service that we can guarantee is operating in a privacy-respecting way. Of course we strive to provide the best services possible for our community, but at the end of the day this involves you trusting us and the system administrators that host our services.

    +

    As always, never trust a service provider with sensitive information, even if they are trustworthy.

    +

    We also recommend you don't centralize all your online activity around a single provider's services (such as ours). This is because it is not a good idea to give a single party control over everything you do online.

    +

    We highly recommend hosting your own services whenever possible. Not only is it a fantastic learning experience, but it allows you to have services entirely in your control. There are a number of great resources available, including...

    + +

    You can also join us on Matrix at #general:privacytools.io and ask around! We are always happy to help you start hosting your own services.

    +

    The services we provide here are for the benefit of our community, and we collect as little data as possible. But it is a convenience more than a recommendation. You should always avoid trusting others with your information, and always encrypt.

    -- 2.47.2 From 481bc432469615706dac1e6ed48094b2a2fd65cd Mon Sep 17 00:00:00 2001 From: Mikaela Suomalainen Date: Sun, 22 Mar 2020 09:11:36 +0200 Subject: [PATCH 29/38] VoIP: Jitsi Meet: warn about E2EE, GA & link public instances list (#1793) --- _includes/sections/voice-video-messenger.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/voice-video-messenger.html b/_includes/sections/voice-video-messenger.html index 0887cff5..51db578a 100644 --- a/_includes/sections/voice-video-messenger.html +++ b/_includes/sections/voice-video-messenger.html @@ -36,7 +36,7 @@ ios="https://apps.apple.com/us/app/mumble/id443472808?ls=1"

    Worth Mentioning

    Related Information

    -- 2.47.2 From 3539fc3f14d0eed1cf01df445af99a3b24597e3f Mon Sep 17 00:00:00 2001 From: Stephen Karl Larroque Date: Sun, 22 Mar 2020 11:30:33 +0100 Subject: [PATCH 30/38] add partial centralization warning for Jami (#1752) --- _includes/sections/instant-messenger.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/_includes/sections/instant-messenger.html b/_includes/sections/instant-messenger.html index ad70a863..88779ff5 100644 --- a/_includes/sections/instant-messenger.html +++ b/_includes/sections/instant-messenger.html @@ -163,8 +163,8 @@ include cardv2.html title="Jami" image="/assets/img/svg/3rd-party/jami.svg" - description="Encrypted instant messaging and video calling software. Uses TLS 1.3 for encryption." - labels="success:VoIP" + description="Encrypted instant messaging and video calling software. All communications are E2EE using TLS 1.3 and never stored elsewhere than on user's devices, even when TURN servers are used." + labels="warning:Warning:This software is partially centralized but can be self-hosted.|success:VoIP" website="https://jami.net/" forum="https://forum.privacytools.io/t/discussion-jami/2116" gitlab="https://git.jami.net/savoirfairelinux" -- 2.47.2 From bd50e952b5068de9061284ab8036f60ba8c9095b Mon Sep 17 00:00:00 2001 From: blacklight447 Date: Thu, 26 Mar 2020 14:26:11 +0100 Subject: [PATCH 31/38] remove bad vpn link (#1798) removes a link on the vpn page which spread miss information about Tor. --- pages/providers/vpn.html | 1 - 1 file changed, 1 deletion(-) diff --git a/pages/providers/vpn.html b/pages/providers/vpn.html index e19b1215..6cf05899 100644 --- a/pages/providers/vpn.html +++ b/pages/providers/vpn.html @@ -230,7 +230,6 @@ breadcrumb: "VPN"
    {% include cardv2.html -title="Nextcloud - Choose your hoster" -image="/assets/img/svg/3rd-party/nextcloud.svg" -description="Nextcloud is a suite of client-server software for creating your own file hosting services on a private server you control. Nextcloud is free and open-source, and supports end-to-end encryption with many of its clients. The only limits on storage and bandwidth are the limits on the server provider you choose." -website="https://nextcloud.com/" -forum="https://forum.privacytools.io/t/discussion-nextcloud/287" -github="https://github.com/nextcloud" -windows="https://nextcloud.com/install/#install-clients" -mac="https://nextcloud.com/install/#install-clients" -linux="https://nextcloud.com/install/#install-clients" -freebsd="https://www.freshports.org/www/nextcloud/" -openbsd="http://openports.se/www/nextcloud" -netbsd="http://pkgsrc.se/www/php-nextcloud" -ios="https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8" -fdroid="https://f-droid.org/packages/com.nextcloud.client/" -googleplay="https://play.google.com/store/apps/details?id=com.nextcloud.client" + title="Nextcloud - Choose your hoster" + image="/assets/img/svg/3rd-party/nextcloud.svg" + description="Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. The only limits on storage and bandwidth are the limits on the server provider you choose." + labels="warning:Experimental E2EE:Regarding E2EE their description states 'End-to-end encryption is still in alpha state, don't use this in production and only with test data!'." + website="https://nextcloud.com/" + forum="https://forum.privacytools.io/t/discussion-nextcloud/287" + windows="https://nextcloud.com/install/#install-clients" + mac="https://nextcloud.com/install/#install-clients" + linux="https://nextcloud.com/install/#install-clients" + freebsd="https://www.freshports.org/www/nextcloud/" + openbsd="http://openports.se/www/nextcloud" + netbsd="http://pkgsrc.se/www/php-nextcloud" + fdroid="https://f-droid.org/packages/com.nextcloud.client/" + googleplay="https://play.google.com/store/apps/details?id=com.nextcloud.client" + ios="https://itunes.apple.com/us/app/nextcloud/id1125420102" + github="https://github.com/nextcloud" %} diff --git a/_includes/sections/selfhosted-cloud.html b/_includes/sections/selfhosted-cloud.html index 79626244..fc4a0418 100644 --- a/_includes/sections/selfhosted-cloud.html +++ b/_includes/sections/selfhosted-cloud.html @@ -5,35 +5,36 @@ {% include cardv2.html -title="Nextcloud" -image="/assets/img/svg/3rd-party/nextcloud.svg" -description="Nextcloud is a suite of client-server software for creating your own file hosting services on a private server you control. Nextcloud is free and open-source, and supports end-to-end encryption with many of its clients. The only limits on storage and bandwidth are the limits on the server provider you choose." -website="https://nextcloud.com/" -forum="https://forum.privacytools.io/t/discussion-nextcloud/287" -windows="https://nextcloud.com/install/#install-clients" -mac="https://nextcloud.com/install/#install-clients" -linux="https://nextcloud.com/install/#install-clients" -freebsd="https://www.freshports.org/www/nextcloud/" -openbsd="http://openports.se/www/nextcloud" -netbsd="http://pkgsrc.se/www/php-nextcloud" -fdroid="https://f-droid.org/packages/com.nextcloud.client/" -googleplay="https://play.google.com/store/apps/details?id=com.nextcloud.client" -ios="https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8" -github="https://github.com/nextcloud" + title="Nextcloud" + image="/assets/img/svg/3rd-party/nextcloud.svg" + description="Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. The only limits on storage and bandwidth are the limits on the server provider you choose." + labels="warning:Experimental E2EE:Regarding E2EE their description states 'End-to-end encryption is still in alpha state, don't use this in production and only with test data!'." + website="https://nextcloud.com/" + forum="https://forum.privacytools.io/t/discussion-nextcloud/287" + windows="https://nextcloud.com/install/#install-clients" + mac="https://nextcloud.com/install/#install-clients" + linux="https://nextcloud.com/install/#install-clients" + freebsd="https://www.freshports.org/www/nextcloud/" + openbsd="http://openports.se/www/nextcloud" + netbsd="http://pkgsrc.se/www/php-nextcloud" + fdroid="https://f-droid.org/packages/com.nextcloud.client/" + googleplay="https://play.google.com/store/apps/details?id=com.nextcloud.client" + ios="https://itunes.apple.com/us/app/nextcloud/id1125420102" + github="https://github.com/nextcloud" %} {% include cardv2.html -title="Tahoe-LAFS" -image="/assets/img/svg/3rd-party/tahoe-lafs.svg" -image-dark="/assets/img/svg/3rd-party/tahoe-lafs-dark.svg" -website="https://www.tahoe-lafs.org/" -forum="https://forum.privacytools.io/t/discussion-tahoe-lafs/1662" -description="Tahoe-LAFS is a free and open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security." -windows="https://github.com/tahoe-lafs/tahoe-lafs#via-pip" -mac="https://github.com/tahoe-lafs/tahoe-lafs#via-pip" -linux="https://github.com/tahoe-lafs/tahoe-lafs#using-os-packages" -netbsd="http://pkgsrc.se/filesystems/tahoe-lafs" -git="https://www.tahoe-lafs.org/trac/tahoe-lafs/browser" + title="Tahoe-LAFS" + image="/assets/img/svg/3rd-party/tahoe-lafs.svg" + image-dark="/assets/img/svg/3rd-party/tahoe-lafs-dark.svg" + website="https://www.tahoe-lafs.org/" + forum="https://forum.privacytools.io/t/discussion-tahoe-lafs/1662" + description="Tahoe-LAFS is a free and open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security." + windows="https://github.com/tahoe-lafs/tahoe-lafs#via-pip" + mac="https://github.com/tahoe-lafs/tahoe-lafs#via-pip" + linux="https://github.com/tahoe-lafs/tahoe-lafs#using-os-packages" + netbsd="http://pkgsrc.se/filesystems/tahoe-lafs" + git="https://www.tahoe-lafs.org/trac/tahoe-lafs/browser" %}

    Worth Mentioning

    -- 2.47.2 From d3e809404cd74f84e90ac403cdd623bd13866e93 Mon Sep 17 00:00:00 2001 From: szTheory Date: Thu, 26 Mar 2020 14:05:30 -0400 Subject: [PATCH 33/38] ExifCleaner logo: Convert PNG to SVG with vectorizer.io and export as optimized SVG using Inkscape. --- assets/img/svg/3rd-party/exifcleaner.svg | 3592 +--------------------- 1 file changed, 2 insertions(+), 3590 deletions(-) diff --git a/assets/img/svg/3rd-party/exifcleaner.svg b/assets/img/svg/3rd-party/exifcleaner.svg index 36396542..e811cf4b 100644 --- a/assets/img/svg/3rd-party/exifcleaner.svg +++ b/assets/img/svg/3rd-party/exifcleaner.svg @@ -1,3590 +1,2 @@ - - - - + + -- 2.47.2 From 167dbb47bf3d5c371debad5ac6a5b18a2eb3fa34 Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Fri, 27 Mar 2020 04:12:54 +0000 Subject: [PATCH 34/38] Remove redundent text --- _includes/sections/productivity-tools.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/productivity-tools.html b/_includes/sections/productivity-tools.html index 0bb13b08..e746ff29 100644 --- a/_includes/sections/productivity-tools.html +++ b/_includes/sections/productivity-tools.html @@ -85,7 +85,7 @@ include cardv2.html title="ExifCleaner" image="/assets/img/svg/3rd-party/exifcleaner.svg" - description="ExifCleaner is a freeware, open source GUI app that removes exif metadata from images, videos, and PDF documents using a simple drag and drop interface. It supports multi-core batch processing and dark mode. It's an Electron app built on top of the open source ExifTool library, and is available for Linux, Windows, and Mac." + description="ExifCleaner is a freeware, open source GUI app that removes exif metadata from images, videos, and PDF documents using a simple drag and drop interface. It supports multi-core batch processing and dark mode." website="https://exifcleaner.com" forum="https://forum.privacytools.io/t/discussion-mat/TODOADDTHIS" github="https://github.com/szTheory/exifcleaner" -- 2.47.2 From e7ec83ac0231ab5733d7a8982c3708038c92b439 Mon Sep 17 00:00:00 2001 From: Daniel Nathan Gray Date: Fri, 27 Mar 2020 04:53:24 +0000 Subject: [PATCH 35/38] Mention ExifTool --- _includes/sections/productivity-tools.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/productivity-tools.html b/_includes/sections/productivity-tools.html index e746ff29..71623595 100644 --- a/_includes/sections/productivity-tools.html +++ b/_includes/sections/productivity-tools.html @@ -85,7 +85,7 @@ include cardv2.html title="ExifCleaner" image="/assets/img/svg/3rd-party/exifcleaner.svg" - description="ExifCleaner is a freeware, open source GUI app that removes exif metadata from images, videos, and PDF documents using a simple drag and drop interface. It supports multi-core batch processing and dark mode." + description='ExifCleaner is a freeware, open source graphical app that uses ExifTool to remove Date: Fri, 27 Mar 2020 04:56:10 +0000 Subject: [PATCH 36/38] Oops missing " --- _includes/sections/productivity-tools.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_includes/sections/productivity-tools.html b/_includes/sections/productivity-tools.html index 71623595..a3c5522d 100644 --- a/_includes/sections/productivity-tools.html +++ b/_includes/sections/productivity-tools.html @@ -85,7 +85,7 @@ include cardv2.html title="ExifCleaner" image="/assets/img/svg/3rd-party/exifcleaner.svg" - description='ExifCleaner is a freeware, open source graphical app that uses ExifTool to remove ExifTool to remove exif metadata from images, videos, and PDF documents using a simple drag and drop interface. It supports multi-core batch processing and dark mode.' website="https://exifcleaner.com" forum="https://forum.privacytools.io/t/discussion-mat/TODOADDTHIS" github="https://github.com/szTheory/exifcleaner" -- 2.47.2 From 443048feeda3d0406dbed5470f4f628f58370aa1 Mon Sep 17 00:00:00 2001 From: Dawid Potocki Date: Fri, 27 Mar 2020 20:57:46 +1300 Subject: [PATCH 37/38] Replace svg with one that isn't retarded --- assets/img/svg/3rd-party/exifcleaner.svg | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/assets/img/svg/3rd-party/exifcleaner.svg b/assets/img/svg/3rd-party/exifcleaner.svg index e811cf4b..20836c0f 100644 --- a/assets/img/svg/3rd-party/exifcleaner.svg +++ b/assets/img/svg/3rd-party/exifcleaner.svg @@ -1,2 +1,2 @@ - + -- 2.47.2 From f7404bf78458162694cbe07a87e25e082c719eaf Mon Sep 17 00:00:00 2001 From: Dawid Potocki Date: Fri, 27 Mar 2020 21:42:21 +1300 Subject: [PATCH 38/38] Change canvas to 128x128 px --- assets/img/svg/3rd-party/exifcleaner.svg | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/assets/img/svg/3rd-party/exifcleaner.svg b/assets/img/svg/3rd-party/exifcleaner.svg index 20836c0f..4c0d59d5 100644 --- a/assets/img/svg/3rd-party/exifcleaner.svg +++ b/assets/img/svg/3rd-party/exifcleaner.svg @@ -1,2 +1,2 @@ - + -- 2.47.2