-
+ {% include sections/header.html %}
--
2.47.2
From dfc38032500ecd4fe97668969c52c7e3a923fa33 Mon Sep 17 00:00:00 2001
From: Vincevrp
Date: Sun, 20 Jan 2019 01:22:09 +0100
Subject: [PATCH 012/858] Move fourteen eyes and KDL to separate file
---
_includes/sections/fourteen-eyes.html | 45 +++++++
_includes/sections/key-disclosure-law.html | 84 +++++++++++++
index.html | 139 +--------------------
3 files changed, 132 insertions(+), 136 deletions(-)
create mode 100644 _includes/sections/fourteen-eyes.html
create mode 100644 _includes/sections/key-disclosure-law.html
diff --git a/_includes/sections/fourteen-eyes.html b/_includes/sections/fourteen-eyes.html
new file mode 100644
index 00000000..8fe0acf3
--- /dev/null
+++ b/_includes/sections/fourteen-eyes.html
@@ -0,0 +1,45 @@
+ Global Mass Surveillance - The Fourteen Eyes
+
+
+
+The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.
+
+
+ {% include panel.html color="danger"
+ title="Five Eyes"
+ body='
+
+ - Australia
+ - Canada
+ - New Zealand
+ - United Kingdom
+ - United States of America
+
+ '
+ %}
+
+ {% include panel.html color="warning"
+ title="Nine Eyes"
+ body='
+
+ - Denmark
+ - France
+ - Netherlands
+ - Norway
+
+ '
+ %}
+
+ {% include panel.html color="secondary"
+ title="Fourteen Eyes"
+ body='
+
+ - Belgium
+ - Germany
+ - Italy
+ - Spain
+ - Sweden
+
+ '
+ %}
+
diff --git a/_includes/sections/key-disclosure-law.html b/_includes/sections/key-disclosure-law.html
new file mode 100644
index 00000000..b91b95d5
--- /dev/null
+++ b/_includes/sections/key-disclosure-law.html
@@ -0,0 +1,84 @@
+ Key Disclosure Law
+
+Who is required to hand over the encryption keys to authorities?
+
+Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
+
+
+
+ * (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)
+
+Related Information
+
+
+
+Why is it not recommended to choose a US-based service?
+
+
+
+Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
+
+An example of this is Lavabit – a discontinued secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access
+communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
+
+Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order.
+
+Related Information
+
+
diff --git a/index.html b/index.html
index b945286d..6a19bb51 100644
--- a/index.html
+++ b/index.html
@@ -5,144 +5,11 @@ layout: default
{% include sections/header.html %}
-
+ {% include sections/fourteen-eyes.html %}
- Global Mass Surveillance - The Fourteen Eyes
+ {% include sections/key-disclosure-law.html %}
-
-
- The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes,
- focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do
- spy on each other.
-
-
-
- {% include panel.html color="danger"
- title="Five Eyes"
- body='
-
- - Australia
- - Canada
- - New Zealand
- - United Kingdom
- - United States of America
-
- '
- %}
-
- {% include panel.html color="warning"
- title="Nine Eyes"
- body='
-
- - Denmark
- - France
- - Netherlands
- - Norway
-
- '
- %}
-
- {% include panel.html color="secondary"
- title="Fourteen Eyes"
- body='
-
- - Belgium
- - Germany
- - Italy
- - Spain
- - Sweden
-
- '
- %}
-
-
-
-
- Key Disclosure Law
Who is required to hand over the encryption keys to authorities?
- Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant
- is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an
- adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
-
-
-
-
- * (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)
-
- Related Information
-
-
-
-
- Why is it not recommended to choose a US-based service?
-
-
-
- Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which
- forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and
- transform the service into a tool of mass surveillance.
-
- An example of this is Lavabit – a discontinued secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access
- communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
-
- Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest,
- saying that shutting down the service was a violation of the court order.
Related Information
- VPN providers with extra layers of privacy
+ VPN providers with extra layers of privacy
All providers listed here are outside the US, use encryption, accept Bitcoin, support OpenVPN and have a no logging policy.
--
2.47.2
From 4be9551177aaa81130c2b8f2cda3c7fb886bec9e Mon Sep 17 00:00:00 2001
From: Vincevrp
Date: Sun, 20 Jan 2019 13:39:59 +0100
Subject: [PATCH 013/858] Move VPN section to separate file
---
_includes/sections/vpn.html | 266 ++++++++++++++++++++++++++++++++++
index.html | 277 +-----------------------------------
2 files changed, 267 insertions(+), 276 deletions(-)
create mode 100644 _includes/sections/vpn.html
diff --git a/_includes/sections/vpn.html b/_includes/sections/vpn.html
new file mode 100644
index 00000000..598d9768
--- /dev/null
+++ b/_includes/sections/vpn.html
@@ -0,0 +1,266 @@
+ VPN providers with extra layers of privacy
+
+
+ All providers listed here are outside the US, use encryption, accept Bitcoin, support OpenVPN and have a no logging policy.
+
+
+{% assign eur_to_usd = 1.14 %}
+
+
+
+ Note: Using a VPN provider will not make you anonymous. But it will give you a better privacy. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.
+
+
+
+
+
+
+
+
+
Related VPN information
+
+
+
+
+
+
diff --git a/index.html b/index.html
index 6a19bb51..357a07ad 100644
--- a/index.html
+++ b/index.html
@@ -9,282 +9,7 @@ layout: default
{% include sections/key-disclosure-law.html %}
- VPN providers with extra layers of privacy
-
- All providers listed here are outside the US, use encryption, accept Bitcoin, support OpenVPN and have a no logging policy.
-
-
-
-
- {% assign eur_to_usd = 1.14 %}
-
-
-
-
- Note: Using a VPN provider will not make you anonymous. But it will give you a better privacy. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.
-
-
-
-
-
-
-
Related VPN information
-
-
-
-
+ {% include sections/vpn.html %}
What is a warrant canary?
--
2.47.2
From 9b84ebe4e56912797b54f7186b6c22e4f047353c Mon Sep 17 00:00:00 2001
From: Vincevrp
Date: Sun, 20 Jan 2019 13:43:53 +0100
Subject: [PATCH 014/858] Move warrant-canary to separate file
---
_includes/sections/warrant-canary.html | 23 +++++++++++++++++++++++
index.html | 21 ++-------------------
2 files changed, 25 insertions(+), 19 deletions(-)
create mode 100644 _includes/sections/warrant-canary.html
diff --git a/_includes/sections/warrant-canary.html b/_includes/sections/warrant-canary.html
new file mode 100644
index 00000000..b2cd7bb5
--- /dev/null
+++ b/_includes/sections/warrant-canary.html
@@ -0,0 +1,23 @@
+ What is a warrant canary?
+
+
+
+A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.
+
+Warrant Canary Examples:
+
+
+ - https://proxy.sh/canary
+ - https://www.ivpn.net/resources/canary.txt
+ - https://www.bolehvpn.net/canary.txt
+ - https://lokun.is/canary.txt
+ - https://www.ipredator.se/static/downloads/canary.txt
+
+
+Related Warrant Canary Information
+
+
diff --git a/index.html b/index.html
index 357a07ad..3263b4da 100644
--- a/index.html
+++ b/index.html
@@ -11,25 +11,8 @@ layout: default
{% include sections/vpn.html %}
-
- What is a warrant canary?
-
- A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has
- received such a subpoena and should stop using the service.
- Warrant Canary Examples:
-
- - https://proxy.sh/canary
- - https://www.ivpn.net/resources/canary.txt
- - https://www.bolehvpn.net/canary.txt
- - https://lokun.is/canary.txt
- - https://www.ipredator.se/static/downloads/canary.txt
-
- Related Warrant Canary Information
-
+ {% include sections/warrant-canary.html %}
+
Browser Recommendation
--
2.47.2
From c9b05461caf7b60dfafff8629386964d8a1b4525 Mon Sep 17 00:00:00 2001
From: Vincevrp
Date: Sun, 20 Jan 2019 13:48:59 +0100
Subject: [PATCH 015/858] Move browser recommendation to separate file
---
.../sections/browser-recommendation.html | 32 ++++++++++++
index.html | 50 +------------------
2 files changed, 33 insertions(+), 49 deletions(-)
create mode 100644 _includes/sections/browser-recommendation.html
diff --git a/_includes/sections/browser-recommendation.html b/_includes/sections/browser-recommendation.html
new file mode 100644
index 00000000..1a5fbea4
--- /dev/null
+++ b/_includes/sections/browser-recommendation.html
@@ -0,0 +1,32 @@
+ Browser Recommendation
+
+
+
+ {% include card.html color="success"
+ title="Tor Browser"
+ image="assets/img/tools/Tor-Project.png"
+ url="https://www.torproject.org/"
+ tor="http://expyuzz4wqqyqhjn.onion"
+ footer='OS: Windows, macOS, Linux,
iOS,
Android,
OpenBSD.'
+ description="Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, it comes with pre-installed privacy add-ons, encryption and an advanced proxy."
+ %}
+
+ {% include card.html color="primary"
+ title="Mozilla Firefox"
+ image="assets/img/tools/Firefox.png"
+ url="https://www.firefox.com/"
+ footer="OS: Windows, macOS, Linux, Android, iOS, BSD."
+ description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our
+ recommendations:
WebRTC and
about:config and get the
privacy add-ons.'
+ %}
+
+ {% include card.html color="warning"
+ title="Brave"
+ labels="warning:experimental:Brave is a good choice if you want to use a Chromium-based browser. But at this point in Brave's development, it's not as good as Firefox with privacy addons."
+ image="assets/img/tools/Brave.png"
+ url="https://www.brave.com/"
+ footer="OS: Windows, macOS, Linux, Android, iOS."
+ description="The new open source browser \"Brave\" automatically blocks ads and trackers, making it faster and safer than your current browser. Brave is based on Chromium."
+ %}
+
+
diff --git a/index.html b/index.html
index 3263b4da..85f46442 100644
--- a/index.html
+++ b/index.html
@@ -13,55 +13,7 @@ layout: default
{% include sections/warrant-canary.html %}
-
-
- Browser Recommendation
-
-
-
- {% include card.html color="success"
- title="Tor Browser"
- image="assets/img/tools/Tor-Project.png"
- url="https://www.torproject.org/"
- tor="http://expyuzz4wqqyqhjn.onion"
- footer='OS: Windows, macOS, Linux,
iOS,
Android,
OpenBSD.'
- description="Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, it comes with pre-installed privacy add-ons, encryption and an advanced proxy."
- %}
-
- {% include card.html color="primary"
- title="Mozilla Firefox"
- image="assets/img/tools/Firefox.png"
- url="https://www.firefox.com/"
- footer="OS: Windows, macOS, Linux, Android, iOS, BSD."
- description='Firefox is fast, reliable, open source and respects your privacy. Don\'t forget to adjust the settings according to our
- recommendations:
WebRTC and
about:config and get the
privacy add-ons.'
- %}
-
- {% include card.html color="warning"
- title="Brave"
- labels="warning:experimental:Brave is a good choice if you want to use a Chromium-based browser. But at this point in Brave's development, it's not as good as Firefox with privacy addons."
- image="assets/img/tools/Brave.png"
- url="https://www.brave.com/"
- footer="OS: Windows, macOS, Linux, Android, iOS."
- description="The new open source browser \"Brave\" automatically blocks ads and trackers, making it faster and safer than your current browser. Brave is based on Chromium."
- %}
-
-
-
-
+ {% include sections/browser-recommendation.html %}
Browser Fingerprint - Is your browser configuration unique?
--
2.47.2
From d88d7d5b49c4e2c69b5c6f2610dd38b219c25df9 Mon Sep 17 00:00:00 2001
From: Vincevrp
Date: Sun, 20 Jan 2019 15:34:21 +0100
Subject: [PATCH 016/858] Move browser fingerprint to separate file
---
_includes/sections/browser-fingerprint.html | 28 +++++++++++++++
index.html | 40 +--------------------
2 files changed, 29 insertions(+), 39 deletions(-)
create mode 100644 _includes/sections/browser-fingerprint.html
diff --git a/_includes/sections/browser-fingerprint.html b/_includes/sections/browser-fingerprint.html
new file mode 100644
index 00000000..470a2442
--- /dev/null
+++ b/_includes/sections/browser-fingerprint.html
@@ -0,0 +1,28 @@
+ Browser Fingerprint - Is your browser configuration unique?
+
+
+ Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.
+
+
+
+
+When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.
+
+
+
+ Test your Browser now
+
+
+
+You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.
+
+Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger, uBlock Origin and Disconnect. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
+
+Related Information
+
+
diff --git a/index.html b/index.html
index 85f46442..17d13982 100644
--- a/index.html
+++ b/index.html
@@ -15,45 +15,7 @@ layout: default
{% include sections/browser-recommendation.html %}
-
- Browser Fingerprint - Is your browser configuration unique?
-
-
-
- Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.
-
-
-
-
-
-
- When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using
- cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.
-
-
-
-
- Test your Browser now
-
-
-
-
- You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should
- have a spoofed user agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to
- look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.
-
-
- Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger, uBlock Origin and Disconnect.
- They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
-
-
- Related Information
-
+ {% include sections/browser-fingerprint.html %}
WebRTC IP Leak Test - Is your IP address leaking?
--
2.47.2
From e9f17c8be49c25c0b6c8382bdf173b465c91c2bd Mon Sep 17 00:00:00 2001
From: Vincevrp
Date: Sun, 20 Jan 2019 15:34:42 +0100
Subject: [PATCH 017/858] Move browser webrtc to separate file
---
_includes/sections/browser-webrtc.html | 47 ++++++++++++++++++++++++
index.html | 50 +-------------------------
2 files changed, 48 insertions(+), 49 deletions(-)
create mode 100644 _includes/sections/browser-webrtc.html
diff --git a/_includes/sections/browser-webrtc.html b/_includes/sections/browser-webrtc.html
new file mode 100644
index 00000000..19fd4dc2
--- /dev/null
+++ b/_includes/sections/browser-webrtc.html
@@ -0,0 +1,47 @@
+ WebRTC IP Leak Test - Is your IP address leaking?
+
+
+ WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.
+
+
+While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.
+
+
+Test your Browser now
+
+
+How to disable WebRTC in Firefox?
+
+In short: Set "media.peerconnection.enabled" to "false" in "about:config".
+Explained:
+
+
+ - Enter "about:config" in the firefox address bar and press enter.
+ - Press the button "I'll be careful, I promise!"
+ - Search for "media.peerconnection.enabled"
+ - Double click the entry, the column "Value" should now be "false"
+ - Done. Do the WebRTC leak test again.
+
+
+If you want to make sure every single WebRTC related setting is really disabled change these settings:
+
+
+ - media.peerconnection.turn.disable = true
+ - media.peerconnection.use_document_iceservers = false
+ - media.peerconnection.video.enabled = false
+ - media.peerconnection.identity.timeout = 1
+
+
+Now you can be 100% sure WebRTC is disabled.
+
+
+Test your Browser again
+
+
+How to fix the WebRTC Leak in Google Chrome?
+
+WebRTC cannot be fully disabled in Chrome, however it is possible to change its routing settings (and prevent leaks) using an extension. Two open source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).
+
+What about other browsers?
+
+Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. But we recommend using Firefox on all devices.
diff --git a/index.html b/index.html
index 17d13982..48fadeaf 100644
--- a/index.html
+++ b/index.html
@@ -17,56 +17,8 @@ layout: default
{% include sections/browser-fingerprint.html %}
-
- WebRTC IP Leak Test - Is your IP address leaking?
+ {% include sections/browser-webrtc.html %}
-
-
- WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.
-
-
-
- While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.
-
-
-
- Test your Browser now
-
-
-
- How to disable WebRTC in Firefox?
-
-
- In short: Set "media.peerconnection.enabled" to "false" in "about:config".
- Explained:
-
- - Enter "about:config" in the firefox address bar and press enter.
- - Press the button "I'll be careful, I promise!"
- - Search for "media.peerconnection.enabled"
- - Double click the entry, the column "Value" should now be "false"
- - Done. Do the WebRTC leak test again.
-
-
- If you want to make sure every single WebRTC related setting is really disabled change these settings:
-
- - media.peerconnection.turn.disable = true
- - media.peerconnection.use_document_iceservers = false
- - media.peerconnection.video.enabled = false
- - media.peerconnection.identity.timeout = 1
-
- Now you can be 100% sure WebRTC is disabled.
-
-
-
- Test your Browser again
-
-
-
- How to fix the WebRTC Leak in Google Chrome?
- WebRTC cannot be fully disabled in Chrome, however it is possible to change its routing settings (and prevent leaks) using an extension. Two open source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).
-
- What about other browsers?
- Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. But we recommend using Firefox on all devices.
Excellent Firefox Privacy Add-ons
--
2.47.2
From ffff8ad4cf138adaa02c131cf0b46a6125af99bc Mon Sep 17 00:00:00 2001
From: Vincevrp
Date: Sun, 20 Jan 2019 15:34:59 +0100
Subject: [PATCH 018/858] Move and rework browser addons section
---
_includes/sections/browser-addons.html | 93 ++++++++++++++++++++++++++
index.html | 74 +-------------------
2 files changed, 94 insertions(+), 73 deletions(-)
create mode 100644 _includes/sections/browser-addons.html
diff --git a/_includes/sections/browser-addons.html b/_includes/sections/browser-addons.html
new file mode 100644
index 00000000..3a7113bc
--- /dev/null
+++ b/_includes/sections/browser-addons.html
@@ -0,0 +1,93 @@
+ Excellent Firefox Privacy Add-ons
+
+
+ Improve your privacy with these excellent Firefox add-ons.
+
+
+
+
+
+

+
+
+
+
Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. Privacy Badger learns about trackers as you browse by inspecting external resources websites request. Please be aware that Google Analytics is considered first-party by Privacy Badger, which means that Google Analytics will not be blocked if you do not use another blocker, such as uBlock Origin.
+
+
+
+
+
+
+
+

+
+
+
Block Ads and Trackers with uBlock Origin
+
An efficient wide-spectrum-blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source. We recommend Firefox but uBlock Origin also works in other browsers such as Safari, Opera, and Chromium. Unlike AdBlock Plus, uBlock does not allow so-called "acceptable ads".
+
+
+
+
+
+
+
+

+
+
+
+
Automatically removes cookies when they are no longer used by open browser tabs. With the cookies, lingering sessions, as well as information used to spy on you, will be expunged.
+
+
+
+
+
+
+
+

+
+
+
+
A Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation.
+
+
+
+
+
+
+
+

+
+
+
Block Content Delivery Networks with Decentraleyes
+
Emulates Content Delivery Networks locally by intercepting requests, finding the required resource and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required. Source code: GitLab (self-hosted).
+
+
+
+
+
+ The following add-ons require quite a lot of interaction from the user to get things working. Some sites will not work properly until you have configured the add-ons.
+
+
+
+
+
+

+
+
+
Stop cross-site requests with uMatrix
+
Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix gives you control over the requests that websites make to other websites. This gives you greater and more fine-grained control over the information that you leak online.
+
+
+
+
+
+
+
+

+
+
+
+
Highly customizable plugin to selectively allow JavaScript, Java, and Flash to run only on websites you trust. Not for casual users, it requires technical knowledge to configure.
+
+
+
diff --git a/index.html b/index.html
index 48fadeaf..87510fba 100644
--- a/index.html
+++ b/index.html
@@ -19,80 +19,8 @@ layout: default
{% include sections/browser-webrtc.html %}
- Excellent Firefox Privacy Add-ons
+ {% include sections/browser-addons.html %}
-
- Improve your privacy with these excellent Firefox add-ons.
-
- Stop Tracking with "Privacy Badger"
-
- Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. Privacy Badger learns about trackers as you browse by inspecting external resources websites request. Please be aware that Google Analytics is considered first-party by Privacy Badger, which means that Google Analytics will not be blocked if you do not use another blocker, such as uBlock Origin.
-
- https://www.eff.org/privacybadger/
-
- Block Ads and Trackers with "uBlock Origin"
-
- An efficient wide-spectrum-blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and
- is completely open source. We recommend Firefox but uBlock Origin also works in other browsers such as Safari, Opera, and Chromium. Unlike AdBlock Plus, uBlock does not allow so-called "acceptable ads".
-
- https://addons.mozilla.org/firefox/addon/ublock-origin/
-
-
-
-
- Automatically Delete Cookies with "Cookie AutoDelete"
-
- Automatically removes cookies when they are no longer used by open browser tabs. With the cookies, lingering sessions, as well as information used to spy on you, will be expunged.
-
- https://addons.mozilla.org/firefox/addon/cookie-autodelete/
Encryption with "HTTPS Everywhere"
-
- A Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation.
-
- https://www.eff.org/https-everywhere
-
- Block Content Delivery Networks with "Decentraleyes"
-
- Emulates Content Delivery Networks locally by intercepting requests, finding the required resource and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required. Source code: GitLab (self-hosted).
-
- https://addons.mozilla.org/firefox/addon/decentraleyes/
-
-
- The following add-ons require quite a lot of interaction from the user to get things working. Some sites will not work properly until you have configured the add-ons.
-
-
- Stop cross-site requests with "uMatrix"
-
- Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix gives you control over the requests that websites make to other websites. This gives you greater and more fine-grained control
- over the information that you leak online.
-
- https://addons.mozilla.org/firefox/addon/umatrix/
-
-
- Be in total control with "NoScript Security Suite"
-
-
- Highly customizable plugin to selectively allow JavaScript, Java, and Flash to run only on websites you trust. Not for casual users, it requires technical knowledge to configure.
-
- https://addons.mozilla.org/firefox/addon/noscript/
-
Firefox: Privacy Related "about:config" Tweaks
This is a collection of privacy-related about:config tweaks. We'll show you how to enhance the privacy of your Firefox browser.
--
2.47.2
From 75ef7a1b1a84a22617ddf0b44c868123731d661e Mon Sep 17 00:00:00 2001
From: Vincevrp
Date: Sun, 20 Jan 2019 17:11:06 +0100
Subject: [PATCH 019/858] Move and rework firefox tweaks
---
_includes/sections/browser-tweaks.html | 144 +++++++++++++++++++
index.html | 191 +------------------------
2 files changed, 145 insertions(+), 190 deletions(-)
create mode 100644 _includes/sections/browser-tweaks.html
diff --git a/_includes/sections/browser-tweaks.html b/_includes/sections/browser-tweaks.html
new file mode 100644
index 00000000..33d21af3
--- /dev/null
+++ b/_includes/sections/browser-tweaks.html
@@ -0,0 +1,144 @@
+ Firefox: Privacy Related "about:config" Tweaks
+
+This is a collection of privacy-related about:config tweaks. We'll show you how to enhance the privacy of your Firefox browser.
+
+Preparation:
+
+
+ - Enter "about:config" in the firefox address bar and press enter.
+ - Press the button "I'll be careful, I promise!"
+ - Follow the instructions below...
+
+
+Getting started:
+
+
+ - privacy.firstparty.isolate = true
+ - A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
+
+ - privacy.resistFingerprinting = true
+ - A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.
+
+ - privacy.trackingprotection.enabled = true
+ - This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.
+
+ - browser.cache.offline.enable = false
+ - Disables offline cache.
+
+ - browser.safebrowsing.malware.enabled = false
+ - Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.
+
+ - browser.safebrowsing.phishing.enabled = false
+ - Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.
+
+ - browser.send_pings = false
+ - The attribute would be useful for letting websites track visitors' clicks.
+
+ - browser.sessionstore.max_tabs_undo = 0
+ - Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.
+
+ - browser.urlbar.speculativeConnect.enabled = false
+ - Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. Source
+
+ - dom.battery.enabled = false
+ - Website owners can track the battery status of your device. Source
+
+ - dom.event.clipboardevents.enabled = false
+ - Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
+
+ - geo.enabled = false
+ - Disables geolocation.
+
+ - media.eme.enabled = false
+ -
+
Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. Details
+ DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.
+
+
+ - media.gmp-widevinecdm.enabled = false
+ - Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. Details
+
+ - media.navigator.enabled = false
+ - Websites can track the microphone and camera status of your device.
+
+ - network.cookie.cookieBehavior = 1
+ -
+ Disable cookies
+
+ - 0 = Accept all cookies by default
+ - 1 = Only accept from the originating site (block third-party cookies)
+ - 2 = Block all cookies by default
+
+
+ - network.cookie.lifetimePolicy = 2
+ -
+ cookies are deleted at the end of the session
+
+ - 0 = Accept cookies normally
+ - 1 = Prompt for each cookie
+ - 2 = Accept for current session only
+ - 3 = Accept for N days
+
+
+
+ - network.http.referer.trimmingPolicy = 2
+ -
+ Send only the scheme, host, and port in the
Referer
header
+
+ - 0 = Send the full URL in the
Referer
header
+ - 1 = Send the URL without its query string in the
Referer
header
+ - 2 = Send only the scheme, host, and port in the
Referer
header
+
+
+
+ - network.http.referer.XOriginPolicy = 2
+ -
+ Only send
Referer
header when the full hostnames match. (Note: if you notice significant breakage, you might try 1
combined with an XOriginTrimmingPolicy
tweak below.) Source
+
+ - 0 = Send
Referer
in all cases
+ - 1 = Send
Referer
to same eTLD sites
+ - 2 = Send
Referer
only when the full hostnames match
+
+
+
+ - network.http.referer.XOriginTrimmingPolicy = 2
+ -
+ When sending
Referer
across origins, only send scheme, host, and port in the Referer
header of cross-origin requests. Source
+
+ - 0 = Send full url in
Referer
+ - 1 = Send url without query string in
Referer
+ - 2 = Only send scheme, host, and port in
Referer
+
+
+
+ - webgl.disabled = true
+ - WebGL is a potential security risk. Source
+
+ - browser.sessionstore.privacy_level = 2
+ -
+ This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. Details
+
+ - 0 = Store extra session data for any site. (Default starting with Firefox 4.)
+ - 1 = Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.)
+ - 2 = Never store extra session data.
+
+
+
+ - network.IDN_show_punycode = true
+ - Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. Source
+
+ - extensions.blocklist.url = https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%20/%20/
+ -
+
Limit the amount of identifiable information sent when requesting the Mozilla harmful extension blocklist.
+
Optionally, the blocklist can be disabled entirely by setting extensions.blocklist.enabled
to false for increased privacy, but decreased security. Source
+
+
+
+Related Information
+
+
+ - ffprofile.com - Helps you to create a Firefox profile with the defaults you like.
+ - mozillazine.org - Security and privacy-related preferences.
+ - user.js Firefox hardening stuff - This is a user.js configuration file for Mozilla Firefox that's supposed to harden Firefox's settings and make it more secure.
+ - Privacy Settings - A Firefox add-on to alter built-in privacy settings easily with a toolbar panel.
+
diff --git a/index.html b/index.html
index 87510fba..975ccb8c 100644
--- a/index.html
+++ b/index.html
@@ -21,196 +21,7 @@ layout: default
{% include sections/browser-addons.html %}
- Firefox: Privacy Related "about:config" Tweaks
-
- This is a collection of privacy-related about:config tweaks. We'll show you how to enhance the privacy of your Firefox browser.
-
-
- Preparation:
-
- - Enter "about:config" in the firefox address bar and press enter.
- - Press the button "I'll be careful, I promise!"
- - Follow the instructions below...
-
-
-
- Getting started:
-
-
- - privacy.firstparty.isolate = true
-
- - A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
-
-
-
- - privacy.resistFingerprinting = true
-
- - A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.
-
-
-
- - privacy.trackingprotection.enabled = true
-
- - This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.
-
-
-
- - browser.cache.offline.enable = false
-
- - Disables offline cache.
-
-
-
- - browser.safebrowsing.malware.enabled = false
-
- - Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.
-
-
-
- - browser.safebrowsing.phishing.enabled = false
-
- - Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.
-
-
-
- - browser.send_pings = false
-
- - The attribute would be useful for letting websites track visitors' clicks.
-
-
-
- - browser.sessionstore.max_tabs_undo = 0
-
- - Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.
-
-
-
- - browser.urlbar.speculativeConnect.enabled = false
-
- - Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. Source
-
-
-
- - dom.battery.enabled = false
-
- - Website owners can track the battery status of your device. Source
-
-
-
- - dom.event.clipboardevents.enabled = false
-
- - Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
-
-
-
- - geo.enabled = false
-
- - Disables geolocation.
-
-
-
- - media.eme.enabled = false
-
- - Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. Details
- - DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.
-
-
-
- - media.gmp-widevinecdm.enabled = false
-
- - Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. Details
-
-
-
- - media.navigator.enabled = false
-
- - Websites can track the microphone and camera status of your device.
-
-
-
- - network.cookie.cookieBehavior = 1
-
- - Disable cookies
- - 0 = Accept all cookies by default
- - 1 = Only accept from the originating site (block third-party cookies)
- - 2 = Block all cookies by default
-
-
-
- - network.cookie.lifetimePolicy = 2
-
- - cookies are deleted at the end of the session
- - 0 = Accept cookies normally
- - 1 = Prompt for each cookie
- - 2 = Accept for current session only
- - 3 = Accept for N days
-
-
-
- - network.http.referer.trimmingPolicy = 2
-
- - Send only the scheme, host, and port in the
Referer
header
- - 0 = Send the full URL in the
Referer
header
- - 1 = Send the URL without its query string in the
Referer
header
- - 2 = Send only the scheme, host, and port in the
Referer
header
-
-
-
- - network.http.referer.XOriginPolicy = 2
-
- - Only send
Referer
header when the full hostnames match. (Note: if you notice significant breakage, you might try 1
combined with an XOriginTrimmingPolicy
tweak below.) Source
- - 0 = Send
Referer
in all cases
- - 1 = Send
Referer
to same eTLD sites
- - 2 = Send
Referer
only when the full hostnames match
-
-
-
- - network.http.referer.XOriginTrimmingPolicy = 2
-
- - When sending
Referer
across origins, only send scheme, host, and port in the Referer
header of cross-origin requests. Source
- - 0 = Send full url in
Referer
- - 1 = Send url without query string in
Referer
- - 2 = Only send scheme, host, and port in
Referer
-
-
-
- - webgl.disabled = true
-
- - WebGL is a potential security risk. Source
-
-
-
- - browser.sessionstore.privacy_level = 2
-
- - This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. Details
- - 0 = Store extra session data for any site. (Default starting with Firefox 4.)
- - 1 = Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.)
- - 2 = Never store extra session data.
-
-
-
- - network.IDN_show_punycode = true
-
- - Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. Source
-
-
-
- - extensions.blocklist.url = https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%20/%20/
-
- - Limit the amount of identifiable information sent when requesting the Mozilla harmful extension blocklist.
- - Optionally, the blocklist can be disabled entirely by setting
extensions.blocklist.enabled
to false for increased privacy, but decreased security. Source
-
-
-
-
-
- Related Information
-
- - ffprofile.com - Helps you to create a Firefox profile with the defaults you like.
- - mozillazine.org - Security and privacy-related preferences.
- - user.js Firefox hardening stuff - This is a user.js configuration file for Mozilla Firefox that's supposed to harden Firefox's settings and make it more secure.
- - Privacy Settings - A Firefox add-on to alter built-in privacy settings easily with a toolbar panel.
-
+ {% include sections/browser-tweaks.html %}
Privacy-Conscious Email Providers - No Affiliates
--
2.47.2
From 678aac92e98e4e641f7866e14bab490d9713ee27 Mon Sep 17 00:00:00 2001
From: Vincevrp
Date: Sun, 20 Jan 2019 17:14:22 +0100
Subject: [PATCH 020/858] Remove unnecessary containers in browser-addons
---
_includes/sections/browser-addons.html | 10 ----------
1 file changed, 10 deletions(-)
diff --git a/_includes/sections/browser-addons.html b/_includes/sections/browser-addons.html
index 3a7113bc..f30545c7 100644
--- a/_includes/sections/browser-addons.html
+++ b/_includes/sections/browser-addons.html
@@ -14,9 +14,7 @@
Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. Privacy Badger learns about trackers as you browse by inspecting external resources websites request. Please be aware that Google Analytics is considered first-party by Privacy Badger, which means that Google Analytics will not be blocked if you do not use another blocker, such as uBlock Origin.