diff --git a/README.md b/README.md index 9d86dea2..2976aa25 100644 --- a/README.md +++ b/README.md @@ -16,7 +16,16 @@ Please read this before contributing. ##Quality over Quantity -We're trying to keep it simple and promote the best tools not all of them. Maximum are three software choices, but it's possible to add more under "Worth Mentioning" headlines. ([example](https://www.privacytools.io/#im)) +We're trying to keep it simple and promote the best tools, not all of them. Maximum are three software choices, but it's possible to add more under "Worth Mentioning" headlines. ([example](https://www.privacytools.io/#im)) + +##Software Criteria + +- Open Source +- Cross-platform +- Easy to use +- Privacy respecting + +There can be exeptions if no software is available that meet the criteria. ##Images diff --git a/img/flags/4x3/ag.svg b/img/flags/4x3/ag.svg new file mode 100755 index 00000000..05bf052f --- /dev/null +++ b/img/flags/4x3/ag.svg @@ -0,0 +1,15 @@ + diff --git a/img/flags/4x3/fi.svg b/img/flags/4x3/fi.svg new file mode 100755 index 00000000..4100a4d0 --- /dev/null +++ b/img/flags/4x3/fi.svg @@ -0,0 +1,5 @@ + diff --git a/img/flags/4x3/in.svg b/img/flags/4x3/in.svg new file mode 100755 index 00000000..97ca2b93 --- /dev/null +++ b/img/flags/4x3/in.svg @@ -0,0 +1,25 @@ + diff --git a/img/flags/4x3/pl.svg b/img/flags/4x3/pl.svg new file mode 100755 index 00000000..2350e5c6 --- /dev/null +++ b/img/flags/4x3/pl.svg @@ -0,0 +1,6 @@ + diff --git a/img/flags/4x3/za.svg b/img/flags/4x3/za.svg new file mode 100755 index 00000000..29cd9935 --- /dev/null +++ b/img/flags/4x3/za.svg @@ -0,0 +1,17 @@ + diff --git a/img/provider/Nextcloud.png b/img/provider/Nextcloud.png new file mode 100644 index 00000000..862952c9 Binary files /dev/null and b/img/provider/Nextcloud.png differ diff --git a/img/tools/Brave.png b/img/tools/Brave.png new file mode 100644 index 00000000..ec0fc2cc Binary files /dev/null and b/img/tools/Brave.png differ diff --git a/img/tools/Tor-Project.png b/img/tools/Tor-Project.png new file mode 100644 index 00000000..cd663ccd Binary files /dev/null and b/img/tools/Tor-Project.png differ diff --git a/index.html b/index.html index 3af682f8..f34b10be 100644 --- a/index.html +++ b/index.html @@ -9,31 +9,31 @@ - + -
The new open source browser "Brave" automatically blocks ads and trackers, making it faster and safer than your current browser. Brave is based on Chromium.
+ + + +
+OS: Windows, Mac, Linux, Android, iOS.
+
+ Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. Privacy Badger automatically blocks that advertiser from loading any more content in your browser.
+
+ https://addons.mozilla.org/firefox/addon/privacy-badger-firefox/
Founded in 2011 by former Google engineers and a consumer-and privacy-rights attorney. The addon is open source and loads the pages you go to 27% faster and stops tracking by 2,000+ third-party sites. It also keeps your searches private. If you are planning to install "uBlock Origin" make sure to install "Disconnect" first. Alternative to Disconnect: Privacy Badger by EFF
- https://addons.mozilla.org/firefox/addon/disconnect/
+ https://addons.mozilla.org/firefox/addon/disconnect/
An efficient wide-spectrum-blocker that's easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and
- is completely open source. We recommend FireFox but uBlock Origin also works in other browsers such as Safari, Opera, and Chromium. Unlike AdBlock Plus, uBlock does not allow so-called "acceptable ads".
+ is completely open source. We recommend Firefox but uBlock Origin also works in other browsers such as Safari, Opera, and Chromium. Unlike AdBlock Plus, uBlock does not allow so-called "acceptable ads".
https://addons.mozilla.org/firefox/addon/ublock-origin/
@@ -910,7 +937,7 @@
OS: iOS, Android, other OTR Clients.
+OS: Android, iOS.
Similar functionally to the widely used Dropbox, with the difference being that ownCloud is free and open-source, and thereby allowing anyone to install and
- operate it without charge on a private server, with no limits on storage space or the number of connected clients.
Similar functionally to the widely used Dropbox, with the difference being that Nextcloud is free and open-source, and thereby allowing anyone to install and operate it without charge on a private server, with no limits on storage space or the number of connected clients.
Client OS: Windows, Mac, Linux, BSD, Unix, iOS, Android, Fire OS. Server: Linux.
@@ -1667,7 +1700,6 @@Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant +
Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an - adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
- + adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data). + +Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an + adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
+
The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Tor is an effective censorship circumvention tool.
+ + + +
+ +OS: Windows, Mac, Linux, Android, F-Droid.
GNUnet is a free software framework for decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery,
- resource allocation, communication over many transports (such as tcp, udp, http, https, wlan and bluetooth) and various basic peer-to-peer algorithms for routing, multicast and network size estimation.
-
- - - -
-OS: GNU/Linux, FreeBSD, NetBSD, OpenBSD, Mac, Windows.
-An australian based security focused DNS provider. Features: DNSCrypt Support to provide confidentially and message integrity, complete trust validation of DNSSEC enabled names, namecoin resolution of .bit domain names and no domain manipulation - or logging.
-- - - -
-OS: Cross-platform.
-
ProtectedText is an open source web application. It encrypts and decrypts text in the browser, and password (or it's hash) is never sent to the server
+
ProtectedText is an open source web application. It encrypts and decrypts text in the browser, and password (or its hash) is never sent to the server
- so that text can't be decrypted even if requested by authorities. No cookies, no sessions, no registration, no users tracking.
@@ -2570,9 +2651,6 @@
- Source: propakistani.pk
-
-
@@ -2608,9 +2686,9 @@
-
+
For easy copy and paste. Share this text snippet.
More bad news
+
@@ -2677,6 +2755,7 @@
Copy URL and Description
Use this online tool to generate a strong and random password. The available characters in each set are user friendly - there are no ambiguous characters such as i, l, 1, o, 0, etc. Password generation is done on the client-side meaning no one has access to the passwords you generate here, period.
+Use this online tool to generate a strong and random password. The available characters in each set are user friendly - there are no ambiguous characters such as i, l, 1, o, 0, etc. Password generation is done on the client-side meaning no one has access to the passwords you generate here.