From 512b6edf243b423c8e090165510f9a6c752a484b Mon Sep 17 00:00:00 2001 From: "J. C" <73438877+1hiking@users.noreply.github.com> Date: Thu, 29 Apr 2021 11:12:20 -0500 Subject: [PATCH 1/6] Replace strong tags to b and em tags to i --- 404.html | 2 +- README.md | 2 +- _includes/footer.html | 6 +- _includes/sections/android-addons.html | 4 +- .../sections/android-operating-systems.html | 2 +- _includes/sections/browser-addons.html | 26 +++---- _includes/sections/browser-fingerprint.html | 2 +- _includes/sections/browser-tweaks.html | 2 +- _includes/sections/browser-webrtc.html | 2 +- .../sections/calendar-contacts-sync.html | 6 +- _includes/sections/cloud-storage.html | 4 +- _includes/sections/decentralized-video.html | 2 +- _includes/sections/dns.html | 8 +- _includes/sections/email-providers.html | 16 ++-- _includes/sections/email-warning.html | 2 +- _includes/sections/file-encryption.html | 8 +- _includes/sections/file-sync.html | 2 +- _includes/sections/instant-messenger.html | 4 +- _includes/sections/ios-addons.html | 4 +- _includes/sections/key-disclosure-law.html | 2 +- _includes/sections/notebooks.html | 2 +- _includes/sections/operating-systems.html | 4 +- _includes/sections/participate.html | 2 +- _includes/sections/password-managers.html | 8 +- _includes/sections/privacy-resources.html | 44 +++++------ _includes/sections/productivity-tools.html | 10 +-- _includes/sections/quotes.html | 2 +- _includes/sections/search-engines.html | 2 +- .../sections/self-contained-networks.html | 4 +- _includes/sections/selfhosted-cloud.html | 4 +- _includes/sections/social-networks.html | 2 +- .../sections/social-news-aggregator.html | 2 +- _includes/sections/teamchat.html | 2 +- _includes/sections/tor-operating-systems.html | 2 +- _includes/sections/video-frontends.html | 2 +- _includes/sections/voice-video-messenger.html | 2 +- _includes/sections/vpn.html | 14 ++-- _includes/sections/windows10.html | 12 +-- _includes/sponsors/silver.html | 8 +- pages/about/about.html | 6 +- pages/donate.html | 74 +++++++++---------- pages/providers/email.html | 34 ++++----- pages/providers/vpn.html | 56 +++++++------- pages/services/chat.html | 12 +-- pages/services/services.html | 6 +- pages/sponsors.html | 14 ++-- 46 files changed, 218 insertions(+), 218 deletions(-) diff --git a/404.html b/404.html index 6e8e7276..ce0722e9 100644 --- a/404.html +++ b/404.html @@ -5,7 +5,7 @@ active_page: 404
We couldn't find that :(
+We couldn't find that :(
Maybe you were looking for one of these pages?
- Encryption Against Global Mass Surveillance. + Encryption Against Global Mass Surveillance.
- No Ads, No Google Analytics, No Affiliates, No Cross-Site Requests. - {{ site.name }} is a socially motivated website that provides information for protecting your data security and privacy. Never trust any company with your privacy, always encrypt. + No Ads, No Google Analytics, No Affiliates, No Cross-Site Requests. + {{ site.name }} is a socially motivated website that provides information for protecting your data security and privacy. Never trust any company with your privacy, always encrypt.
- Tor v3: privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion + Tor v3: privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion (Learn More)
diff --git a/_includes/sections/android-addons.html b/_includes/sections/android-addons.html index 9220156f..a2762d39 100644 --- a/_includes/sections/android-addons.html +++ b/_includes/sections/android-addons.html @@ -8,7 +8,7 @@NetGuard provides simple and advanced methods to block certain apps from accessing the internet, without requiring root privileges. Applications and addresses can be individually allowed or denied access to your Wi-Fi and/or mobile connections, allowing you to control exactly which apps are able to phone home or not.
+NetGuard provides simple and advanced methods to block certain apps from accessing the internet, without requiring root privileges. Applications and addresses can be individually allowed or denied access to your Wi-Fi and/or mobile connections, allowing you to control exactly which apps are able to phone home or not.
Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world.
+Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world.
uBlock Origin is an efficient wide-spectrum blocker that is easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source. Advanced mode allows for dynamic filtering. Dynamic filtering allows for extended blocking similar to NoScript and uMatrix (E.g. medium or hard) blocking.
" + description="uBlock Origin is an efficient wide-spectrum blocker that is easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source. Advanced mode allows for dynamic filtering. Dynamic filtering allows for extended blocking similar to NoScript and uMatrix (E.g. medium or hard) blocking.
" website="https://addons.mozilla.org/firefox/addon/ublock-origin/" privacy-policy="https://github.com/gorhill/uBlock/wiki/Privacy-policy" forum="https://forum.privacytools.io/t/discussion-ublock-origin/266" @@ -21,7 +21,7 @@ {% include cardv2.html title="HTTPS Everywhere: Secure Connections" image="/assets/img/svg/3rd-party/https_everywhere.svg" - description="HTTPS Everywhere enables encryption of your connections to many major websites, making your browsing more secure. It is a collaboration between The Tor Project and the Electronic Frontier Foundation." + description="HTTPS Everywhere enables encryption of your connections to many major websites, making your browsing more secure. It is a collaboration between The Tor Project and the Electronic Frontier Foundation." website="https://www.eff.org/https-everywhere" privacy-policy="https://www.eff.org/code/privacy/policy" forum="https://forum.privacytools.io/t/discussion-https-everywhere/268" @@ -34,7 +34,7 @@ {% include cardv2.html title="Decentraleyes: Block Content Delivery Networks" image="/assets/img/svg/3rd-party/decentraleyes.svg" - description="Decentraleyes emulates Content Delivery Networks locally by intercepting requests, finding the required resource, and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required." + description="Decentraleyes emulates Content Delivery Networks locally by intercepting requests, finding the required resource, and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required." website="https://decentraleyes.org/" privacy-policy="https://decentraleyes.org/privacy-policy/" forum="https://forum.privacytools.io/t/discussion-decentraleyes/269" @@ -47,7 +47,7 @@ {% include cardv2.html title="ClearURLs" image="/assets/img/svg/3rd-party/clearurls.svg" - description="ClearURLs will automatically remove tracking elements from URLs to help protect your privacy when browsing through the Internet." + description="ClearURLs will automatically remove tracking elements from URLs to help protect your privacy when browsing through the Internet." website="https://gitlab.com/KevinRoebert/ClearUrls" privacy-policy="https://gitlab.com/KevinRoebert/ClearUrls/-/blob/master/PRIVACY.md" forum="https://forum.privacytools.io/t/discussion-clearurls/3353" @@ -60,7 +60,7 @@ {% include cardv2.html title="xBrowserSync" image="/assets/img/svg/3rd-party/xbrowsersync.svg" - description='xBrowserSync synchronizes bookmarks across devices and browsers with end-to-end encryption. Data is encrypted and decrypted on the device, no one but you can read it. No registration is needed, just enter a randomly generated id or QR code on all devices. Different servers are available, and it can also be self-hosted.' + description='xBrowserSync synchronizes bookmarks across devices and browsers with end-to-end encryption. Data is encrypted and decrypted on the device, no one but you can read it. No registration is needed, just enter a randomly generated id or QR code on all devices. Different servers are available, and it can also be self-hosted.' website="https://www.xbrowsersync.org/" privacy-policy="https://www.xbrowsersync.org/privacypolicy" github="https://github.com/xbrowsersync" @@ -84,7 +84,7 @@ {% include cardv2.html title="Terms of Service; Didn’t Read: Be Informed" image="/assets/img/svg/3rd-party/terms_of_service_didnt_read.svg" - description='Terms of Service; Didn’t Read is an addon that believes "I have read and agree to the Terms of Service" is the biggest lie on the web, and wants to fix it by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are published transparently by a community of reviewers.' + description='Terms of Service; Didn’t Read is an addon that believes "I have read and agree to the Terms of Service" is the biggest lie on the web, and wants to fix it by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are published transparently by a community of reviewers.' website="https://tosdr.org/" privacy-policy="https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/privacy/" forum="https://forum.privacytools.io/t/discussion-terms-of-service-didn-t-read/270" @@ -97,7 +97,7 @@ {% include cardv2.html title="Snowflake" image="/assets/img/svg/3rd-party/snowflake.svg" - description="Snowflake is a new pluggable transport from the Tor Project. If you have an uncensored connection, running this extension volunteers your connection to be used as a Snowflake proxy to help users unable to connect to the Tor network. Your IP will not be visible to the sites users visit using your proxy, as this extension will not make you an exit node. If your access to the Tor network is blocked, this extension will not assist you, and you should use the Tor Browser instead. Note: This add-on does not work with WebRTC disabled." + description="Snowflake is a new pluggable transport from the Tor Project. If you have an uncensored connection, running this extension volunteers your connection to be used as a Snowflake proxy to help users unable to connect to the Tor network. Your IP will not be visible to the sites users visit using your proxy, as this extension will not make you an exit node. If your access to the Tor network is blocked, this extension will not assist you, and you should use the Tor Browser instead. Note: This add-on does not work with WebRTC disabled." website="https://snowflake.torproject.org" forum="https://forum.privacytools.io/t/discussion-snowflake/1146" git="https://gitweb.torproject.org/pluggable-transports/snowflake.git" @@ -117,7 +117,7 @@ title="Temporary Containers" image="/assets/img/svg/3rd-party/temporary_containers.svg" image-dark="/assets/img/svg/3rd-party/temporary_containers-dark.svg" - description="Temporary Containers allow you to open tabs, websites, and links in automatically managed disposable containers. Containers isolate data websites store (cookies, storage, and more) from each other, enhancing your privacy and security while you browse: Enhance your privacy in Firefox with Temporary Containers." + description="Temporary Containers allow you to open tabs, websites, and links in automatically managed disposable containers. Containers isolate data websites store (cookies, storage, and more) from each other, enhancing your privacy and security while you browse: Enhance your privacy in Firefox with Temporary Containers." website="https://addons.mozilla.org/firefox/addon/temporary-containers/" privacy-policy="https://addons.mozilla.org/firefox/addon/temporary-containers/privacy/" forum="https://forum.privacytools.io/t/discussion-temporary-containers-multi-account-containers/3354" @@ -128,7 +128,7 @@ {% include cardv2.html title="Firefox Multi-Account Containers" image="/assets/img/svg/3rd-party/firefox_multi_account_containers.svg" - description="Firefox Multi-Account Containers allow you to create containers for specific websites. These containers are isolated from eachother. This add-on can be used in conjunctiuon with Temporary Containers to allow persistent logins to websites you specify." + description="Firefox Multi-Account Containers allow you to create containers for specific websites. These containers are isolated from eachother. This add-on can be used in conjunctiuon with Temporary Containers to allow persistent logins to websites you specify." website="https://support.mozilla.org/kb/containers" forum="https://forum.privacytools.io/t/discussion-temporary-containers-multi-account-containers/3354" github="https://github.com/mozilla/multi-account-containers" @@ -144,7 +144,7 @@ {% include cardv2.html title="ETag Stoppa" image="/assets/img/svg/3rd-party/etag_stoppa.svg" - description="ETag Stoppa Prevents Firefox from storing entity tags by removing ETag response headers unconditionally and without exceptions." + description="ETag Stoppa Prevents Firefox from storing entity tags by removing ETag response headers unconditionally and without exceptions." website="https://addons.mozilla.org/firefox/addon/etag-stoppa/" forum="" github="https://github.com/claustromaniac/etag-stoppa" @@ -154,7 +154,7 @@ {% include cardv2.html title="Cookie AutoDelete: Automatically Delete Cookies" image="/assets/img/png/3rd-party/cookie_autodelete.png" - description="Cookie AutoDelete automatically removes cookies, lingering sessions, and other information that can be used to spy on you when they are no longer used by open browser tabs." + description="Cookie AutoDelete automatically removes cookies, lingering sessions, and other information that can be used to spy on you when they are no longer used by open browser tabs." website="https://addons.mozilla.org/firefox/addon/cookie-autodelete/" forum="https://forum.privacytools.io/t/discussion-cookie-autodelete/267" github="https://github.com/Cookie-AutoDelete/Cookie-AutoDelete" @@ -171,7 +171,7 @@ {% include cardv2.html title="uMatrix: Stop Cross-Site Requests" image="/assets/img/png/3rd-party/umatrix.png" - description="uMatrix gives you control over the requests that websites make to other websites. Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix allows 1st party scripts in its default configuration. If you want the default functionality of NoScript consider blocking 1st party scripts everywhere by default. This addon has been discontinued." + description="uMatrix gives you control over the requests that websites make to other websites. Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix allows 1st party scripts in its default configuration. If you want the default functionality of NoScript consider blocking 1st party scripts everywhere by default. This addon has been discontinued." website="https://addons.mozilla.org/firefox/addon/umatrix/" privacy-policy="https://github.com/gorhill/uMatrix/wiki/Privacy-policy" forum="https://forum.privacytools.io/t/discussion-umatrix/271" @@ -184,7 +184,7 @@ {% include cardv2.html title="CanvasBlocker" image="/assets/img/svg/3rd-party/canvasblocker.svg" - description="CanvasBlocker allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API." + description="CanvasBlocker allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API." website="https://github.com/kkapsner/CanvasBlocker/" privacy-policy="https://addons.mozilla.org/firefox/addon/canvasblocker/privacy/" forum="https://forum.privacytools.io/t/discussion-canvasblocker/3352" diff --git a/_includes/sections/browser-fingerprint.html b/_includes/sections/browser-fingerprint.html index 787075cb..d4c8e18d 100644 --- a/_includes/sections/browser-fingerprint.html +++ b/_includes/sections/browser-fingerprint.html @@ -12,7 +12,7 @@ -You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user-agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.
+You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user-agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.
Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins to regain control. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
diff --git a/_includes/sections/browser-tweaks.html b/_includes/sections/browser-tweaks.html index 9b69d737..bb7c2918 100644 --- a/_includes/sections/browser-tweaks.html +++ b/_includes/sections/browser-tweaks.html @@ -1,6 +1,6 @@In short: Set "media.peerconnection.enabled" to "false" in "about:config".
-Explained:
+Explained:
- In iOS, iPadOS, tvOS 14 and macOS 11, DoT and DoH were introduced. DoT and DoH are supported natively by installation of profiles (through mobileconfig files opened in Safari). - After installation, the encrypted DNS server can be selected in Settings → General → VPN and Network → DNS. + In iOS, iPadOS, tvOS 14 and macOS 11, DoT and DoH were introduced. DoT and DoH are supported natively by installation of profiles (through mobileconfig files opened in Safari). + After installation, the encrypted DNS server can be selected in Settings → General → VPN and Network → DNS.
ProtonMail.com is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. ProtonMail is based in Genève, Switzerland. Accounts start with 500 MB storage with their free plan.
+ProtonMail.com is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. ProtonMail is based in Genève, Switzerland. Accounts start with 500 MB storage with their free plan.
-Free accounts have some limitations and do not allow the use of the ProtonMail Bridge, which is required to use a recommended email client (e.g. Thunderbird) or to search email by body text. Paid accounts are available starting at €48/y which include features like ProtonMail Bridge, additional storage, custom domain support, and more. The webmail and mobile apps can only search To:
, From:
, Date:
and Subject:
(this is likely to change when v4.0 of ProtonMail is released).
Free accounts have some limitations and do not allow the use of the ProtonMail Bridge, which is required to use a recommended email client (e.g. Thunderbird) or to search email by body text. Paid accounts are available starting at €48/y which include features like ProtonMail Bridge, additional storage, custom domain support, and more. The webmail and mobile apps can only search To:
, From:
, Date:
and Subject:
(this is likely to change when v4.0 of ProtonMail is released).
Paid ProtonMail users can use their own domain with the service. Catch-all addresses are supported with custom domains for Professional and Visionary plans. ProtonMail also supports subaddressing, which is useful for users who don't want to purchase a domain.
@@ -55,7 +55,7 @@Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with 2 GB of storage, which can be upgraded as needed.
+Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with 2 GB of storage, which can be upgraded as needed.
Mailbox.org lets users use their own domain and they support catch-all addresses. Mailbox.org also supports subaddressing, which is useful for users who don't want to purchase a domain.
@@ -92,7 +92,7 @@Posteo.de is an email provider that focuses on anonymous, secure, and private email. Their servers are powered by 100% sustainable energy. They have been in operation since 2009. Posteo is based in Germany and has a free 14-day trial. Posteo comes with 2 GB for the monthly cost and an extra gigabyte can be purchased for €0.25 per month.
+Posteo.de is an email provider that focuses on anonymous, secure, and private email. Their servers are powered by 100% sustainable energy. They have been in operation since 2009. Posteo is based in Germany and has a free 14-day trial. Posteo comes with 2 GB for the monthly cost and an extra gigabyte can be purchased for €0.25 per month.
Posteo does not allow the use of custom domains, however users may still make use of subaddressing.
@@ -129,7 +129,7 @@Disroot offers email amongst other services. The service is maintained by volunteers and its community. They have been in operation since 2015. Disroot is based in Amsterdam. Disroot is free and uses open source software such as Rainloop to provide service. Users support the service through donations and buying extra storage. The mailbox limit is 1 GB, but extra storage can be purchased 0.15€ per GB per month paid yearly.
+Disroot offers email amongst other services. The service is maintained by volunteers and its community. They have been in operation since 2015. Disroot is based in Amsterdam. Disroot is free and uses open source software such as Rainloop to provide service. Users support the service through donations and buying extra storage. The mailbox limit is 1 GB, but extra storage can be purchased 0.15€ per GB per month paid yearly.
Disroot lets users use their own domain. They have aliases, however you must manually apply for them.
@@ -166,7 +166,7 @@Tutanota.com is an email service with a focus on security and privacy through the use of encryption. Tutanota has been in operation since 2011 and is based in Hanover, Germany. Accounts start with 1GB storage with their free plan.
+Tutanota.com is an email service with a focus on security and privacy through the use of encryption. Tutanota has been in operation since 2011 and is based in Hanover, Germany. Accounts start with 1GB storage with their free plan.
Tutanota doesn't allow the use of third-party email clients. There are plans to allow Tutanota pull email from external email accounts using the IMAP protocol. Email import is currently not possible.
Emails can be exported individually or by bulk selection. Tutanota does not allow for subfolders as you might expect with other email providers.
Tutanota is working on a desktop client and they have an app available in F-Droid. They also have their app in conventional stores such as App Store on iOS and Google Play for Android.
@@ -208,7 +208,7 @@StartMail.com is an email service with a focus on security and privacy through the use of standard OpenPGP encryption. StartMail has been in operation since 2014 and is based in Boulevard 11, Zeist Netherlands. Accounts start with 10GB. They offer a 30-day trial.
+StartMail.com is an email service with a focus on security and privacy through the use of standard OpenPGP encryption. StartMail has been in operation since 2014 and is based in Boulevard 11, Zeist Netherlands. Accounts start with 10GB. They offer a 30-day trial.
Personal accounts can use Custom or Generated aliases. Business accounts can use Domain aliases.
diff --git a/_includes/sections/email-warning.html b/_includes/sections/email-warning.html index ac524a13..6e9f5bf1 100644 --- a/_includes/sections/email-warning.html +++ b/_includes/sections/email-warning.html @@ -3,7 +3,7 @@When using end-to-end encryption (E2EE) technology like OpenPGP, email will still have some metadata that is not encrypted in the header of the email. Read more about email metadata.
-OpenPGP also does not support Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. How do I protect my private keys?
+OpenPGP also does not support Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. How do I protect my private keys?
Rather than use email for prolonged conversations, consider using a medium that does support Forward secrecy.
Recommended Instant MessengersWe only recommend instant messenger programs or apps that support end-to-end encryption (E2EE). When E2EE is used, all transmissions (messages, voice, video, etc.) are encrypted before they are sent from your device. E2EE protects both the authenticity and confidentiality of the transmission as they pass through any part of the network (servers, etc.).
+We only recommend instant messenger programs or apps that support end-to-end encryption (E2EE). When E2EE is used, all transmissions (messages, voice, video, etc.) are encrypted before they are sent from your device. E2EE protects both the authenticity and confidentiality of the transmission as they pass through any part of the network (servers, etc.).
All the client programs/apps we chose are free and open-source software unless otherwise mentioned. This to ensure that the code can be independently verified by experts now and in the future.
diff --git a/_includes/sections/ios-addons.html b/_includes/sections/ios-addons.html index 6e9da956..5eb07d15 100644 --- a/_includes/sections/ios-addons.html +++ b/_includes/sections/ios-addons.html @@ -8,7 +8,7 @@Passepartout is a free, open-source, and user friendly OpenVPN app with presets for multiple providers (including Mullvad and ProtonVPN, two PrivacyTools recommended providers) and easy configurability.
+Passepartout is a free, open-source, and user friendly OpenVPN app with presets for multiple providers (including Mullvad and ProtonVPN, two PrivacyTools recommended providers) and easy configurability.
AdGuard for iOS is a free (and open-source) content-blocking app that allows you to set filters within Safari. As required by iOS, it uses the native Content Blocker API for even greater privacy.
+AdGuard for iOS is a free (and open-source) content-blocking app that allows you to set filters within Safari. As required by iOS, it uses the native Content Blocker API for even greater privacy.
* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)
+* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)
It's important for a website like {{ site.name }} to stay up-to-date. Keep an eye on software updates for the applications listed on our site. Follow recent news about providers that we recommend. We try our best to keep up, but we're not perfect and the internet is changing fast. If you find an error, or you think a provider should not be listed here, or a qualified service provider is missing, or a browser plugin is not the best choice anymore, or anything else... Talk to us please. You can also find us on several Matrix rooms, primarily #general:privacytools.io
. XMPP users can join there via #general#privacytools.io@matrix.org. When using our services, users should follow our Code of Conduct.
It's important for a website like {{ site.name }} to stay up-to-date. Keep an eye on software updates for the applications listed on our site. Follow recent news about providers that we recommend. We try our best to keep up, but we're not perfect and the internet is changing fast. If you find an error, or you think a provider should not be listed here, or a qualified service provider is missing, or a browser plugin is not the best choice anymore, or anything else... Talk to us please. You can also find us on several Matrix rooms, primarily #general:privacytools.io
. XMPP users can join there via #general#privacytools.io@matrix.org. When using our services, users should follow our Code of Conduct.
Note: Just being open source does not make software secure!
diff --git a/_includes/sections/productivity-tools.html b/_includes/sections/productivity-tools.html index 41c4feb3..c8378cc1 100644 --- a/_includes/sections/productivity-tools.html +++ b/_includes/sections/productivity-tools.html @@ -4,7 +4,7 @@ include cardv2.html title="CryptPad" image="/assets/img/svg/3rd-party/cryptpad.svg" - description="CryptPad is a private-by-design alternative to popular office tools and cloud services. All content is end-to-end encrypted. It is free and open-source, enabling anyone to verify its security by auditing the code. The development team is supported by donations and grants. No registration is required, and it can be used anonymously via Tor Browser." + description="CryptPad is a private-by-design alternative to popular office tools and cloud services. All content is end-to-end encrypted. It is free and open-source, enabling anyone to verify its security by auditing the code. The development team is supported by donations and grants. No registration is required, and it can be used anonymously via Tor Browser." website="https://cryptpad.fr/" privacy-policy="https://cryptpad.fr/privacy.html" forum="https://forum.privacytools.io/t/discussion-cryptpad-productivity-tools/1537" @@ -16,7 +16,7 @@ include cardv2.html title="Etherpad" image="/assets/img/svg/3rd-party/etherpad.svg" - description="Etherpad is a highly customizable open-source online editor providing collaborative editing in real time. Here are a list of sites that run Etherpad." + description="Etherpad is a highly customizable open-source online editor providing collaborative editing in real time. Here are a list of sites that run Etherpad." website="https://etherpad.org/" forum="https://forum.privacytools.io/t/discussion-etherpad-productivity-tools/1538" github="https://github.com/ether/etherpad-lite" @@ -34,7 +34,7 @@ title="Write.as" image="/assets/img/svg/3rd-party/writeas.svg" image-dark="/assets/img/svg/3rd-party/writeas-dark.svg" - description="Write.as is a cross-platform, privacy-oriented blogging platform. It's anonymous by default, letting you publish without signing up. If you create an account, it doesn't require any personal information. No ads, distraction-free, and built on a sustainable business model." + description="Write.as is a cross-platform, privacy-oriented blogging platform. It's anonymous by default, letting you publish without signing up. If you create an account, it doesn't require any personal information. No ads, distraction-free, and built on a sustainable business model." website="https://write.as/" privacy-policy="https://write.as/privacy" forum="https://forum.privacytools.io/t/discussion-write-as-productivity-tools/1539" @@ -71,7 +71,7 @@ include cardv2.html title="MAT2" image="/assets/img/svg/3rd-party/mat2.svg" - description="MAT2 is free software, which allows the removal of metadata of image, audio, torrent, and document file types. It provides both a command line tool and a graphical user interface via an extension for Nautilus, the default file manager of GNOME." + description="MAT2 is free software, which allows the removal of metadata of image, audio, torrent, and document file types. It provides both a command line tool and a graphical user interface via an extension for Nautilus, the default file manager of GNOME." website="https://0xacab.org/jvoisin/mat2" forum="https://forum.privacytools.io/t/discussion-mat/1559" gitlab="https://0xacab.org/jvoisin/mat2" @@ -87,7 +87,7 @@ include cardv2.html title="ExifCleaner" image="/assets/img/svg/3rd-party/exifcleaner.svg" - description='ExifCleaner is a freeware, open source graphical app that uses ExifTool to remove exif metadata from images, videos, and PDF documents using a simple drag and drop interface. It supports multi-core batch processing and dark mode.' + description='ExifCleaner is a freeware, open source graphical app that uses ExifTool to remove exif metadata from images, videos, and PDF documents using a simple drag and drop interface. It supports multi-core batch processing and dark mode.' website="https://exifcleaner.com" forum="https://forum.privacytools.io/t/discussion-mat/TODOADDTHIS" github="https://github.com/szTheory/exifcleaner" diff --git a/_includes/sections/quotes.html b/_includes/sections/quotes.html index 49f8bcb5..3268d1c3 100644 --- a/_includes/sections/quotes.html +++ b/_includes/sections/quotes.html @@ -5,7 +5,7 @@
Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a
pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I
- want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
Mullvad.net is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since 2009. Mullvad is based in Sweden and does not have a free trial.
+Mullvad.net is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since 2009. Mullvad is based in Sweden and does not have a free trial.
Mullvad has servers in 35 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.
We also think it's better for the security of the VPN provider's private keys if they use dedicated servers, instead of cheaper shared solutions (with other customers) such as virtual private servers.
@@ -34,7 +34,7 @@Mullvad provides the source code for their desktop and mobile clients in their GitHub organization.
Mullvad in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, and cash/local currency as anonymous forms of payment. They also accept Swish and bank wire transfers.
+Mullvad in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, and cash/local currency as anonymous forms of payment. They also accept Swish and bank wire transfers.
In addition to standard OpenVPN connections, Mullvad supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
ProtonVPN.com is a strong contender in the VPN space, and they have been in operation since 2016. ProtonVPN is based in Switzerland and offers a limited free pricing tier, as well as premium options. They offer a further 14% discount for buying a 2 year subscription.
+ProtonVPN.com is a strong contender in the VPN space, and they have been in operation since 2016. ProtonVPN is based in Switzerland and offers a limited free pricing tier, as well as premium options. They offer a further 14% discount for buying a 2 year subscription.
ProtonVPN has servers in 44 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.
We also think it's better for the security of the VPN provider's private keys if they use dedicated servers, instead of cheaper shared solutions (with other customers) such as virtual private servers.
@@ -86,7 +86,7 @@ {% include badge.html color="info" text="Standard USD $60/y" %} {% include badge.html color="secondary" text="Pro USD $100/y" %} -IVPN.net is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar.
+IVPN.net is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar.
IVPN has servers in 32 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.
We also think it's better for the security of the VPN provider's private keys if they use dedicated servers, instead of cheaper shared solutions (with other customers) such as virtual private servers.
@@ -95,7 +95,7 @@As of Feburary 2020 IVPN applications are now open source. Source code can be obtained from their GitHub organization.
In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin and cash/local currency (on annual plans) as anonymous forms of payment.
+In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin and cash/local currency (on annual plans) as anonymous forms of payment.
In addition to standard OpenVPN connections, IVPN supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities.
-At PrivacyTools, we provide services, tools, and knowledge to protect your privacy against global mass surveillance, and moderate a thriving community of privacy-minded individuals like yourself to discuss and learn about new advances in protecting your online data. This website serves as the centerpiece of our organization, where we research and recommend various software solutions for our community.
-Transparency is our strongest value, and it's what sets us apart from the rest of the "privacy recommendations" community. Editorial changes to this website and the products we recommend are always discussed on our extensive issue tracker, drafted in a public pull request open for further discussion, and logged in a comprehensive commit log dating back to our original founding date in 2015. The core team members listed below are responsible for most of the edits and final decisions to changes on this website and across our services, but this website is truly the work of hundreds contributors and fact checkers working to make sure our recommendations are solid and trustworthy.
+You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities.
+At PrivacyTools, we provide services, tools, and knowledge to protect your privacy against global mass surveillance, and moderate a thriving community of privacy-minded individuals like yourself to discuss and learn about new advances in protecting your online data. This website serves as the centerpiece of our organization, where we research and recommend various software solutions for our community.
+Transparency is our strongest value, and it's what sets us apart from the rest of the "privacy recommendations" community. Editorial changes to this website and the products we recommend are always discussed on our extensive issue tracker, drafted in a public pull request open for further discussion, and logged in a comprehensive commit log dating back to our original founding date in 2015. The core team members listed below are responsible for most of the edits and final decisions to changes on this website and across our services, but this website is truly the work of hundreds contributors and fact checkers working to make sure our recommendations are solid and trustworthy.
Additionally, we are a not-for-profit organization. We do not utilize paid recommendations or affiliate programs to make the recommendations on this website. Unfortunately this practice is very common elsewhere online, which makes it difficult to trust other review sites. We are unique in this area, in that all of our research is conducted independently, and we will never accept payments to modify, add, or remove any of our reviews or recommendations. Our finances are provided entirely by our community donors and sponsors, and are handled by the Open Collective Foundation 501(c)(3). Because we are operating as a charity in the United States, we are legally obligated to only use our funding to further our mission of spreading privacy education and promoting online services like Mastodon, Matrix, and WriteFreely. This website is a public resource, not a profit generator. To that regard, all our financial transactions (incoming and outgoing) are logged and made available to the public via our page at opencollective.com/privacytools.
We take the operation of our various services very seriously, and require all participants to adhere to our Code of Conduct. For any questions or to report abuse, please see our CoC’s Enforcement section.
If you are able, please consider contributing to our development and outreach programs. Contributions via OpenCollective to {{ site.name }} are tax deductible for US taxpayers. These funds are transparently and primarily used to cover server costs.
+If you are able, please consider contributing to our development and outreach programs. Contributions via OpenCollective to {{ site.name }} are tax deductible for US taxpayers. These funds are transparently and primarily used to cover server costs.
Contribute More InfoPlease note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations. We have developed a clear set of requirements for any Email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing an Email provider, and conduct your own research to ensure the Email provider you choose is the right choice for you.
+Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations. We have developed a clear set of requirements for any Email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing an Email provider, and conduct your own research to ensure the Email provider you choose is the right choice for you.
Operating outside the five/nine/fourteen-eyes countries is not necessarily a guarantee of privacy, and there are other factors to consider. However, we believe that avoiding these countries is important if you wish to avoid mass government dragnet surveillance, especially from the United States. Read our page on global mass surveillance and avoiding the US and UK to learn more about why we feel this is important.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
We regard these features as important in order to provide a safe and optimal service to users. Users should consider the provider which has the features they require.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
We prefer our recommended providers to collect as little data as possible.
Minimum to Qualify:
+Minimum to Qualify:
Received
header field.Best Case:
+Best Case:
Email servers deal with a lot of very sensitive data. We expect that providers will adopt best industry practices in order to protect their users.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
You wouldn't trust your finances to someone with a fake identity, so why trust them with your email? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
With the email providers we recommend we like to see responsible marketing.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
AnonAddy lets users create aliases that forward to their email address. Can be self-hosted. Source code on GitHub.
+AnonAddy lets users create aliases that forward to their email address. Can be self-hosted. Source code on GitHub.
SimpleLogin allows you to easily create aliases for your email. Can be self-hosted. Source code on GitHub.
+SimpleLogin allows you to easily create aliases for your email. Can be self-hosted. Source code on GitHub.
Mail-in-a-Box is an automated setup script for deploying a mail server on Ubuntu. Its goal is to make it easier for users to set up their own mail server.
+Mail-in-a-Box is an automated setup script for deploying a mail server on Ubuntu. Its goal is to make it easier for users to set up their own mail server.
Mailcow is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mailserver with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. Mailcow Dockerized docs
+Mailcow is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mailserver with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. Mailcow Dockerized docs
For a more manual approach we've picked out these two articles.
Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
-If you are looking for anonymity, you should use the Tor Browser instead of a VPN.
-If you're looking for added security, you should always ensure you're connecting to websites using encrypted DNS and HTTPS. A VPN is not a replacement for good security practices.
-If you're looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved.
+Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
+If you are looking for anonymity, you should use the Tor Browser instead of a VPN.
+If you're looking for added security, you should always ensure you're connecting to websites using encrypted DNS and HTTPS. A VPN is not a replacement for good security practices.
+If you're looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved.
Download Tor Tor Myths & FAQ More Info @@ -24,7 +24,7 @@ breadcrumb: "VPN"Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations. We have developed a clear set of requirements for any VPN provider wishing to be recommended, including strong encryption, independent security audits, modern technology, and more. We suggest you familiarize yourself with this list before choosing a VPN provider, and conduct your own research to ensure the VPN provider you choose is as trustworthy as possible.
+Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations. We have developed a clear set of requirements for any VPN provider wishing to be recommended, including strong encryption, independent security audits, modern technology, and more. We suggest you familiarize yourself with this list before choosing a VPN provider, and conduct your own research to ensure the VPN provider you choose is as trustworthy as possible.
Operating outside the five/nine/fourteen-eyes countries is not a guarantee of privacy necessarily, and there are other factors to consider. However, we believe that avoiding these countries is important if you wish to avoid mass government dragnet surveillance, especially from the United States. Read our page on global mass surveillance and avoiding the US and UK to learn more about why we feel this is important.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. If a VPN provides their own custom client, we require a killswitch to block network data leaks when disconnected.
+We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. If a VPN provides their own custom client, we require a killswitch to block network data leaks when disconnected.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
We prefer our recommended providers to collect as little data as possible. Not collecting personal information on registration, and accepting anonymous forms of payment are required.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards for their OpenVPN connections. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security, ideally in a very comprehensive manner and on a repeated (yearly) basis.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
With the VPN providers we recommend we like to see responsible marketing.
Minimum to Qualify:
+Minimum to Qualify:
Best Case:
+Best Case:
Responsible marketing that is both educational and useful to the consumer could include:
The answer to this question is not a particularly helpful one: It depends. It depends on what you're expecting a VPN to do for you, who you're trying to hide your traffic from, and what applications you're using.
-In most cases, VPNs do little to protect your privacy or enhance your security, unless paired with other changes.
+The answer to this question is not a particularly helpful one: It depends. It depends on what you're expecting a VPN to do for you, who you're trying to hide your traffic from, and what applications you're using.
+In most cases, VPNs do little to protect your privacy or enhance your security, unless paired with other changes.
VPNs cannot encrypt data outside of the connection between your device and the VPN server. VPN providers can see and modify your traffic the same way your ISP could. And there is no way to verify a VPN provider's "no logging" policies in any way.
In most cases, most of your traffic is already encrypted! Over 98% of the top 3000 websites offer HTTPS, meaning your non-DNS traffic is safe regardless of using a VPN. It is incredibly rare for applications that handle personal data to not support HTTPS in 2019, especially with services like Let's Encrypt offering free HTTPS certificates to any website operator.
+In most cases, most of your traffic is already encrypted! Over 98% of the top 3000 websites offer HTTPS, meaning your non-DNS traffic is safe regardless of using a VPN. It is incredibly rare for applications that handle personal data to not support HTTPS in 2019, especially with services like Let's Encrypt offering free HTTPS certificates to any website operator.
Even if a site you visit doesn't support HTTPS, a VPN will not protect you, because a VPN cannot magically encrypt the traffic between the VPN's servers and the website's servers. Installing an extension like HTTPS Everywhere and making sure every site you visit uses HTTPS is far more helpful than using a VPN.
The answer to this question is also not very helpful: it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.
-However you shouldn't use encrypted DNS with Tor. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.
+The answer to this question is also not very helpful: it depends. Your VPN provider may have their own DNS servers, but if they don't, the traffic between your VPN provider and the DNS server isn't encrypted. You need to trust the encrypted DNS provider in addition to the VPN provider and unless your client and target server support encrypted SNI, the VPN provider can still see which domains you are visiting.
+However you shouldn't use encrypted DNS with Tor. This would direct all of your DNS requests through a single circuit, and would allow the encrypted DNS provider to deanonymize you.
VPNs cannot provide strong anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data.
The idea that your IP address is sensitive information, or that your location is given away with all your internet traffic is fearmongering on the part of VPN providers and their marketing. Your IP address is an insignificant amount of personal data tracking companies use to identify you, because many users' IP addresses change very frequently (Dynamic IP addresses, switching networks, switching devices, etc.). Your IP address also does not give away more than the very generalized location of your Internet Service Provider. It does not give away your home address, for example, despite common perception.
-The idea that your IP address is sensitive information, or that your location is given away with all your internet traffic is fearmongering on the part of VPN providers and their marketing. Your IP address is an insignificant amount of personal data tracking companies use to identify you, because many users' IP addresses change very frequently (Dynamic IP addresses, switching networks, switching devices, etc.). Your IP address also does not give away more than the very generalized location of your Internet Service Provider. It does not give away your home address, for example, despite common perception.
+By using a VPN with Tor, you're creating essentially a permanent entry node, often with a money trail attached. This provides 0 additional benefit to you, while increasing the attack surface of your connection dramatically. If you wish to hide your Tor usage from your ISP or your government, Tor has a built-in solution for that: Tor bridges. Read more about Tor bridges and why using a VPN is not necessary.
A VPN may still be useful to you in a variety of scenarios, such as:
For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're trusting the provider. In pretty much any other scenario you should be using a secure-by-design tool such as Tor.
+For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're trusting the provider. In pretty much any other scenario you should be using a secure-by-design tool such as Tor.
Sources and Further Reading: +
Sources and Further Reading:
To register on or connect to our homeserver, simply use https://chat.privacytools.io
as the homeserver in your Matrix client.
To register on or connect to our homeserver, simply use https://chat.privacytools.io
as the homeserver in your Matrix client.
You must read and accept our community code of conduct before joining our rooms or using our services.
{% @@ -41,14 +41,14 @@ description: "chat.privacytools.io is our official Matrix homeserver. You can re web="https://app.element.io" %} -If you're asked to enter a custom homeserver URL in a Matrix client, enter https://chat.privacytools.io
, not privacytools.io or element.privacytools.io. You do not need to change your identity server, in fact https://vector.im
is the only functional one, by design.
If you're asked to enter a custom homeserver URL in a Matrix client, enter https://chat.privacytools.io
, not privacytools.io or element.privacytools.io. You do not need to change your identity server, in fact https://vector.im
is the only functional one, by design.
These details will be autofilled for you in most clients if you enter your full username (e.g. @alice:privacytools.io rather than alice) into the username field. In general it is preferable to do that rather than trying to remember what the homeserver URL is.
No. Messages sent to the #general chat are encrypted from with client-to-server encryption, i.e. HTTPS. This means that your messages can't be viewed by an attacker on your network, or your ISP, etc. However, because this is a public chat room anybody can view your messages if they are a member, and newcomers will be able to see all message history. Do not say anything in rooms that don't use End-to-End (E2E) encryption that you wouldn't want tied to you personally.
+No. Messages sent to the #general chat are encrypted from with client-to-server encryption, i.e. HTTPS. This means that your messages can't be viewed by an attacker on your network, or your ISP, etc. However, because this is a public chat room anybody can view your messages if they are a member, and newcomers will be able to see all message history. Do not say anything in rooms that don't use End-to-End (E2E) encryption that you wouldn't want tied to you personally.
The default matrix.org homeserver is behind Cloudflare. The PrivacyTools homeserver is not. @@ -56,7 +56,7 @@ description: "chat.privacytools.io is our official Matrix homeserver. You can re
It can be, for some! Due to the trememdous amount of people registering on the matrix.org homeserver, it is often overloaded and occasionally slow to respond. Therefore, users on that homeserver occasionally report a less than ideal chat experience. If that's you, you can fix this problem by switching to another homeserver. Good alternatives include...
#dev:privacytools.io
: Discussions relating to building www.privacytools.io.#forum:privacytools.io
: All PrivacyTools Forum updates (Automated).#general:privacytools.io
: Main discussion room.#general:privacytools.io
: Main discussion room.#github:privacytools.io
: GitHub updates for @privacytools (Automated).#guides:privacytools.io
: Privacy Guides development work.#privacy:privacytools.io
: On-topic privacy, security, opsec discussion and support.#privacy:privacytools.io
: On-topic privacy, security, opsec discussion and support.#wiki:privacytools.io
: Wiki-building discussion room.If you're looking for more things to chat about, check out these rooms as well:
diff --git a/pages/services/services.html b/pages/services/services.html index fe374139..ac0be47c 100644 --- a/pages/services/services.html +++ b/pages/services/services.html @@ -19,7 +19,7 @@ description: "The PrivacyTools team is proud to introduce a suite of privacy-cenMore services are on the way. If there's something that would be super beneficial for us to run, don't hesitate to reach out and ask. And of course, if you like our services, please consider donating to support our server costs, any donation helps!
+More services are on the way. If there's something that would be super beneficial for us to run, don't hesitate to reach out and ask. And of course, if you like our services, please consider donating to support our server costs, any donation helps!
We are providing these services because we believe in decentralized and federated networks, and free and open source software. The tools we host are a great and convenient entry-point to these services like Matrix, Mastodon, and WriteFreely. We hope that we are able to spur the adoption of these alternative networks, and we strongly believe all of our services are far better than traditional providers, such as Twitter, Facebook, and Google.
-However, as with any hosted, online service, remember that using our services involves risks that may or may not be acceptable to you. Using online services requires trust in the service provider. We don't know of any surefire way to evaluate a provider for privacy, or provide a service that we can guarantee is operating in a privacy-respecting way. Of course we strive to provide the best services possible for our community, but at the end of the day this involves you trusting us and the system administrators that host our services.
-As always, never trust a service provider with sensitive information, even if they are trustworthy.
+However, as with any hosted, online service, remember that using our services involves risks that may or may not be acceptable to you. Using online services requires trust in the service provider. We don't know of any surefire way to evaluate a provider for privacy, or provide a service that we can guarantee is operating in a privacy-respecting way. Of course we strive to provide the best services possible for our community, but at the end of the day this involves you trusting us and the system administrators that host our services.
+As always, never trust a service provider with sensitive information, even if they are trustworthy.
We also recommend you don't centralize all your online activity around a single provider's services (such as ours). This is because it is not a good idea to give a single party control over everything you do online.
We highly recommend hosting your own services whenever possible. Not only is it a fantastic learning experience, but it allows you to have services entirely in your control. There are a number of great resources available, including...
A massive thank you to the following organization-level sponsors of {{ site.name }}, who pledge $250+:
+A massive thank you to the following organization-level sponsors of {{ site.name }}, who pledge $250+:
The {{ site.name }} website and services are a community project. There is no advertising, affiliate links, or other forms of monetization.
Your donations here directly support hosting this website and compensating contributors to this project.
The {{ site.name }} website and services are a community project. There is no advertising, affiliate links, or other forms of monetization.
Your donations here directly support hosting this website and compensating contributors to this project.
Become a Sponsor Donate Directly @@ -40,15 +40,15 @@ permalink: /sponsors/
With this exposure and sponsorship, your customers will recognize your intrinsic understanding and commitment to user privacy. Moreover, you'll directly contribute to our mission of spreading privacy-respecting tools and knowledge worldwide!
At PrivacyTools, we believe in...
We reserve the right or deny all sponsors from receiving the benefits detailed below if we believe that your organization or product is not aligned with our key values. Therefore, if you are interested in sponsoring our project, please first email sponsors@privacytools.io so we may discuss further.
As a sponsor of {{ site.name }}, your company will be widely recognized in a variety of ways, some of which we've detailed below.
This website receives well over 250,000 pageviews on a monthly basis and is highly ranked for privacy-related keywords. In addition to the benefits below your contribution will be featured on our OpenCollective page and we will thank you via social media for your contribution.
-Please note that this page is updated manually, and while we're generally on top of things, please don't hesitate to reach out to sponsors@privacytools.io if you think we've missed something :)
+Please note that this page is updated manually, and while we're generally on top of things, please don't hesitate to reach out to sponsors@privacytools.io if you think we've missed something :)
We pride ourselves on our integrity and commitment to spreading unbiased and fact-based information regarding privacy and privacy-respecting tools. All tools we recommend throughout our website are subject to strict criteria as judged by our team and the community across our various platforms. Your sponsorship will not grant your organization any special consideration when choosing our recommendations throughout the website, a process which we make clear via our transparent ledger on OpenCollective and our public discussions on GitHub. Your sponsorship benefits are limited to those outlined above.
Your contribution to {{ site.name }} will be handled by the Open Collective Foundation 501(c)(3). For US companies and taxpayers, this means your contribution is likely tax deductible, but you should consult with your accountant regarding your specific circumstances. As a non-profit, your sponsorship contribution will not be used for private profit and will only be used to cover expenses incurred by the project. All of our transactions (donations and expenses) are published transparently on OpenCollective. For the benefit of our readership, anonymous contributions will not be eligible for the sponsorship opportunities outlined above.
+Your contribution to {{ site.name }} will be handled by the Open Collective Foundation 501(c)(3). For US companies and taxpayers, this means your contribution is likely tax deductible, but you should consult with your accountant regarding your specific circumstances. As a non-profit, your sponsorship contribution will not be used for private profit and will only be used to cover expenses incurred by the project. All of our transactions (donations and expenses) are published transparently on OpenCollective. For the benefit of our readership, anonymous contributions will not be eligible for the sponsorship opportunities outlined above.
If you are interested and have further questions, you are welcome to reach out to us directly at sponsors@privacytools.io.
If you believe you reached this page in error, please contact us!
+If you believe you reached this page in error, please contact us!