Update other old badges and fix indenting (#1924)

This commit is contained in:
Daniel Nathan Gray 2020-05-21 02:50:05 +00:00 committed by GitHub
parent d4b86b25c9
commit c299f2f18c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
13 changed files with 580 additions and 539 deletions

View File

@ -5,56 +5,56 @@
</div>
{% include cardv2.html
title="uBlock Origin: Block Ads and Trackers"
image="/assets/img/svg/3rd-party/ublock_origin.svg"
description="<strong>uBlock Origin</strong> is an efficient <a href=https://github.com/gorhill/uBlock/wiki/Blocking-mode>wide-spectrum blocker</a> that is easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source."
website="https://addons.mozilla.org/firefox/addon/ublock-origin/"
privacy-policy="https://github.com/gorhill/uBlock/wiki/Privacy-policy"
forum="https://forum.privacytools.io/t/discussion-ublock-origin/266"
github="https://github.com/gorhill/uBlock/"
firefox="https://addons.mozilla.org/firefox/addon/ublock-origin/"
chrome="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm"
opera="https://addons.opera.com/en/extensions/details/ublock/"
edge="https://www.microsoft.com/en-us/p/ublock-origin/9nblggh444l4"
title="uBlock Origin: Block Ads and Trackers"
image="/assets/img/svg/3rd-party/ublock_origin.svg"
description="<strong>uBlock Origin</strong> is an efficient <a href=https://github.com/gorhill/uBlock/wiki/Blocking-mode>wide-spectrum blocker</a> that is easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and is completely open source."
website="https://addons.mozilla.org/firefox/addon/ublock-origin/"
privacy-policy="https://github.com/gorhill/uBlock/wiki/Privacy-policy"
forum="https://forum.privacytools.io/t/discussion-ublock-origin/266"
github="https://github.com/gorhill/uBlock/"
firefox="https://addons.mozilla.org/firefox/addon/ublock-origin/"
chrome="https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm"
opera="https://addons.opera.com/en/extensions/details/ublock/"
edge="https://www.microsoft.com/en-us/p/ublock-origin/9nblggh444l4"
%}
{% include cardv2.html
title="HTTPS Everywhere: Secure Connections"
image="/assets/img/svg/3rd-party/https_everywhere.svg"
description="<strong>HTTPS Everywhere</strong> enables encryption of your connections to many major websites, making your browsing more secure. It is a collaboration between The Tor Project and the Electronic Frontier Foundation."
website="https://www.eff.org/https-everywhere"
privacy-policy="https://www.eff.org/code/privacy/policy"
forum="https://forum.privacytools.io/t/discussion-https-everywhere/268"
github="https://github.com/EFForg/https-everywhere"
firefox="https://addons.mozilla.org/firefox/addon/https-everywhere"
chrome="https://chrome.google.com/webstore/detail/https-everywhere/gcbommkclmclpchllfjekcdonpmejbdp"
opera="https://addons.opera.com/en/extensions/details/https-everywhere"
title="HTTPS Everywhere: Secure Connections"
image="/assets/img/svg/3rd-party/https_everywhere.svg"
description="<strong>HTTPS Everywhere</strong> enables encryption of your connections to many major websites, making your browsing more secure. It is a collaboration between The Tor Project and the Electronic Frontier Foundation."
website="https://www.eff.org/https-everywhere"
privacy-policy="https://www.eff.org/code/privacy/policy"
forum="https://forum.privacytools.io/t/discussion-https-everywhere/268"
github="https://github.com/EFForg/https-everywhere"
firefox="https://addons.mozilla.org/firefox/addon/https-everywhere"
chrome="https://chrome.google.com/webstore/detail/https-everywhere/gcbommkclmclpchllfjekcdonpmejbdp"
opera="https://addons.opera.com/en/extensions/details/https-everywhere"
%}
{% include cardv2.html
title="Decentraleyes: Block Content Delivery Networks"
image="/assets/img/svg/3rd-party/decentraleyes.svg"
description="<strong>Decentraleyes</strong> emulates Content Delivery Networks locally by intercepting requests, finding the required resource, and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required."
website="https://decentraleyes.org/"
privacy-policy="https://decentraleyes.org/privacy-policy/"
forum="https://forum.privacytools.io/t/discussion-decentraleyes/269"
gitlab="https://git.synz.io/Synzvato/decentraleyes"
firefox="https://addons.mozilla.org/firefox/addon/decentraleyes"
chrome="https://chrome.google.com/webstore/detail/decentraleyes/ldpochfccmkkmhdbclfhpagapcfdljkj"
opera="https://addons.opera.com/extensions/details/decentraleyes"
title="Decentraleyes: Block Content Delivery Networks"
image="/assets/img/svg/3rd-party/decentraleyes.svg"
description="<strong>Decentraleyes</strong> emulates Content Delivery Networks locally by intercepting requests, finding the required resource, and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required."
website="https://decentraleyes.org/"
privacy-policy="https://decentraleyes.org/privacy-policy/"
forum="https://forum.privacytools.io/t/discussion-decentraleyes/269"
gitlab="https://git.synz.io/Synzvato/decentraleyes"
firefox="https://addons.mozilla.org/firefox/addon/decentraleyes"
chrome="https://chrome.google.com/webstore/detail/decentraleyes/ldpochfccmkkmhdbclfhpagapcfdljkj"
opera="https://addons.opera.com/extensions/details/decentraleyes"
%}
{% include cardv2.html
title="ClearURLs"
image="/assets/img/svg/3rd-party/clearurls.svg"
description="<strong>ClearURLs</strong> will automatically remove tracking elements from URLs to help protect your privacy when browse through the Internet."
website="https://gitlab.com/KevinRoebert/ClearUrls"
privacy-policy="https://gitlab.com/KevinRoebert/ClearUrls/-/blob/master/PRIVACY.md"
forum="https://forum.privacytools.io/t/discussion-clearurls/3353"
gitlab="https://gitlab.com/KevinRoebert/ClearUrls"
firefox="https://addons.mozilla.org/firefox/addon/clearurls/"
chrome="https://chrome.google.com/webstore/detail/clearurls/lckanjgmijmafbedllaakclkaicjfmnk"
edge="https://microsoftedge.microsoft.com/addons/detail/mdkdmaickkfdekbjdoojfalpbkgaddei"
title="ClearURLs"
image="/assets/img/svg/3rd-party/clearurls.svg"
description="<strong>ClearURLs</strong> will automatically remove tracking elements from URLs to help protect your privacy when browse through the Internet."
website="https://gitlab.com/KevinRoebert/ClearUrls"
privacy-policy="https://gitlab.com/KevinRoebert/ClearUrls/-/blob/master/PRIVACY.md"
forum="https://forum.privacytools.io/t/discussion-clearurls/3353"
gitlab="https://gitlab.com/KevinRoebert/ClearUrls"
firefox="https://addons.mozilla.org/firefox/addon/clearurls/"
chrome="https://chrome.google.com/webstore/detail/clearurls/lckanjgmijmafbedllaakclkaicjfmnk"
edge="https://microsoftedge.microsoft.com/addons/detail/mdkdmaickkfdekbjdoojfalpbkgaddei"
%}
<h2>Additional Functionality</h2>
@ -64,27 +64,27 @@ edge="https://microsoftedge.microsoft.com/addons/detail/mdkdmaickkfdekbjdoojfalp
</div>
{% include cardv2.html
title="Terms of Service; Didnt Read: Be Informed"
image="/assets/img/svg/3rd-party/terms_of_service_didnt_read.svg"
description='<strong>Terms of Service; Didnt Read</strong> is an addon that believes "I have read and agree to the Terms of Service" is the biggest lie on the web, and wants to fix it by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are published transparently by a community of reviewers.'
website="https://tosdr.org/"
privacy-policy="https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/privacy/"
forum="https://forum.privacytools.io/t/discussion-terms-of-service-didn-t-read/270"
github="https://github.com/tosdr/"
firefox="https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/"
chrome="https://chrome.google.com/webstore/detail/terms-of-service-didn%E2%80%99t-r/hjdoplcnndgiblooccencgcggcoihigg"
opera="https://addons.opera.com/extensions/details/terms-of-service-didnt-read"
title="Terms of Service; Didnt Read: Be Informed"
image="/assets/img/svg/3rd-party/terms_of_service_didnt_read.svg"
description='<strong>Terms of Service; Didnt Read</strong> is an addon that believes "I have read and agree to the Terms of Service" is the biggest lie on the web, and wants to fix it by grading websites based on their terms of service agreements and privacy policies. It also gives short summaries of those agreements. The analysis and ratings are published transparently by a community of reviewers.'
website="https://tosdr.org/"
privacy-policy="https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/privacy/"
forum="https://forum.privacytools.io/t/discussion-terms-of-service-didn-t-read/270"
github="https://github.com/tosdr/"
firefox="https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/"
chrome="https://chrome.google.com/webstore/detail/terms-of-service-didn%E2%80%99t-r/hjdoplcnndgiblooccencgcggcoihigg"
opera="https://addons.opera.com/extensions/details/terms-of-service-didnt-read"
%}
{% include cardv2.html
title="Snowflake"
image="/assets/img/svg/3rd-party/snowflake.svg"
description="<strong>Snowflake</strong> is a new <a href=https://2019.www.torproject.org/docs/pluggable-transports.html.en>pluggable transport</a> from the Tor Project. If you have an uncensored connection, running this extension volunteers your connection to be used as a Snowflake proxy to help users unable to connect to the Tor network. Your IP will not be visible to the sites users visit using your proxy, as this extension will not make you an exit node. If your access to the Tor network is blocked, this extension will not assist you, and you should use the <a href=https://www.torproject.org>Tor Browser</a> instead. <b>Note:</b> This add-on does not work with WebRTC disabled."
website="https://snowflake.torproject.org"
forum="https://forum.privacytools.io/t/discussion-snowflake/1146"
git="https://gitweb.torproject.org/pluggable-transports/snowflake.git"
firefox="https://addons.mozilla.org/firefox/addon/torproject-snowflake"
chrome="https://chrome.google.com/webstore/detail/snowflake/mafpmfcccpbjnhfhjnllmmalhifmlcie"
title="Snowflake"
image="/assets/img/svg/3rd-party/snowflake.svg"
description="<strong>Snowflake</strong> is a new <a href=https://2019.www.torproject.org/docs/pluggable-transports.html.en>pluggable transport</a> from the Tor Project. If you have an uncensored connection, running this extension volunteers your connection to be used as a Snowflake proxy to help users unable to connect to the Tor network. Your IP will not be visible to the sites users visit using your proxy, as this extension will not make you an exit node. If your access to the Tor network is blocked, this extension will not assist you, and you should use the <a href=https://www.torproject.org>Tor Browser</a> instead. <b>Note:</b> This add-on does not work with WebRTC disabled."
website="https://snowflake.torproject.org"
forum="https://forum.privacytools.io/t/discussion-snowflake/1146"
git="https://gitweb.torproject.org/pluggable-transports/snowflake.git"
firefox="https://addons.mozilla.org/firefox/addon/torproject-snowflake"
chrome="https://chrome.google.com/webstore/detail/snowflake/mafpmfcccpbjnhfhjnllmmalhifmlcie"
%}
<h2>Persistent storage management</h2>
@ -96,25 +96,25 @@ chrome="https://chrome.google.com/webstore/detail/snowflake/mafpmfcccpbjnhfhjnll
</div>
{% include cardv2.html
title="Temporary Containers"
image="/assets/img/svg/3rd-party/temporary_containers.svg"
image-dark="/assets/img/svg/3rd-party/temporary_containers-dark.svg"
description="<strong>Temporary Containers</strong> allow you to open tabs, websites, and links in automatically managed disposable containers. Containers isolate data websites store (cookies, storage, and more) from each other, enhancing your privacy and security while you browse: <a href=https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21>Enhance your privacy in Firefox with Temporary Containers.</a>"
website="https://addons.mozilla.org/firefox/addon/temporary-containers/"
privacy-policy="https://addons.mozilla.org/firefox/addon/temporary-containers/privacy/"
forum="https://forum.privacytools.io/t/discussion-temporary-containers-multi-account-containers/3354"
github="https://github.com/stoically/temporary-containers"
firefox="https://addons.mozilla.org/firefox/addon/temporary-containers/"
title="Temporary Containers"
image="/assets/img/svg/3rd-party/temporary_containers.svg"
image-dark="/assets/img/svg/3rd-party/temporary_containers-dark.svg"
description="<strong>Temporary Containers</strong> allow you to open tabs, websites, and links in automatically managed disposable containers. Containers isolate data websites store (cookies, storage, and more) from each other, enhancing your privacy and security while you browse: <a href=https://medium.com/@stoically/enhance-your-privacy-in-firefox-with-temporary-containers-33925cd6cd21>Enhance your privacy in Firefox with Temporary Containers.</a>"
website="https://addons.mozilla.org/firefox/addon/temporary-containers/"
privacy-policy="https://addons.mozilla.org/firefox/addon/temporary-containers/privacy/"
forum="https://forum.privacytools.io/t/discussion-temporary-containers-multi-account-containers/3354"
github="https://github.com/stoically/temporary-containers"
firefox="https://addons.mozilla.org/firefox/addon/temporary-containers/"
%}
{% include cardv2.html
title="Firefox Multi-Account Containers"
image="/assets/img/svg/3rd-party/firefox_multi_account_containers.svg"
description="<strong>Firefox Multi-Account Containers</strong> allow you to create containers for specific websites. These containers are isolated from eachother. This add-on can be used in conjunctiuon with Temporary Containers to allow persistent logins to websites you specify."
website="https://support.mozilla.org/kb/containers"
forum="https://forum.privacytools.io/t/discussion-temporary-containers-multi-account-containers/3354"
github="https://github.com/mozilla/multi-account-containers"
firefox="https://addons.mozilla.org/firefox/addon/multi-account-containers/"
title="Firefox Multi-Account Containers"
image="/assets/img/svg/3rd-party/firefox_multi_account_containers.svg"
description="<strong>Firefox Multi-Account Containers</strong> allow you to create containers for specific websites. These containers are isolated from eachother. This add-on can be used in conjunctiuon with Temporary Containers to allow persistent logins to websites you specify."
website="https://support.mozilla.org/kb/containers"
forum="https://forum.privacytools.io/t/discussion-temporary-containers-multi-account-containers/3354"
github="https://github.com/mozilla/multi-account-containers"
firefox="https://addons.mozilla.org/firefox/addon/multi-account-containers/"
%}
<h3>Android</h3>
@ -124,24 +124,24 @@ firefox="https://addons.mozilla.org/firefox/addon/multi-account-containers/"
</div>
{% include cardv2.html
title="ETag Stoppa"
image="/assets/img/svg/3rd-party/etag_stoppa.svg"
description="<strong>ETag Stoppa</strong> Prevents Firefox from storing entity tags by removing ETag response headers unconditionally and without exceptions."
website="https://addons.mozilla.org/firefox/addon/etag-stoppa/"
forum=""
github="https://github.com/claustromaniac/etag-stoppa"
firefox="https://addons.mozilla.org/firefox/addon/etag-stoppa/"
title="ETag Stoppa"
image="/assets/img/svg/3rd-party/etag_stoppa.svg"
description="<strong>ETag Stoppa</strong> Prevents Firefox from storing entity tags by removing ETag response headers unconditionally and without exceptions."
website="https://addons.mozilla.org/firefox/addon/etag-stoppa/"
forum=""
github="https://github.com/claustromaniac/etag-stoppa"
firefox="https://addons.mozilla.org/firefox/addon/etag-stoppa/"
%}
{% include cardv2.html
title="Cookie AutoDelete: Automatically Delete Cookies"
image="/assets/img/png/3rd-party/cookie_autodelete.png"
description="<strong>Cookie AutoDelete</strong> automatically removes cookies, lingering sessions, and other information that can be used to spy on you when they are no longer used by open browser tabs."
website="https://addons.mozilla.org/firefox/addon/cookie-autodelete/"
forum="https://forum.privacytools.io/t/discussion-cookie-autodelete/267"
github="https://github.com/Cookie-AutoDelete/Cookie-AutoDelete"
firefox="https://addons.mozilla.org/firefox/addon/cookie-autodelete"
chrome="https://chrome.google.com/webstore/detail/cookie-autodelete/fhcgjolkccmbidfldomjliifgaodjagh"
title="Cookie AutoDelete: Automatically Delete Cookies"
image="/assets/img/png/3rd-party/cookie_autodelete.png"
description="<strong>Cookie AutoDelete</strong> automatically removes cookies, lingering sessions, and other information that can be used to spy on you when they are no longer used by open browser tabs."
website="https://addons.mozilla.org/firefox/addon/cookie-autodelete/"
forum="https://forum.privacytools.io/t/discussion-cookie-autodelete/267"
github="https://github.com/Cookie-AutoDelete/Cookie-AutoDelete"
firefox="https://addons.mozilla.org/firefox/addon/cookie-autodelete"
chrome="https://chrome.google.com/webstore/detail/cookie-autodelete/fhcgjolkccmbidfldomjliifgaodjagh"
%}
<h2>For Advanced Users</h2>
@ -151,25 +151,25 @@ chrome="https://chrome.google.com/webstore/detail/cookie-autodelete/fhcgjolkccmb
</div>
{% include cardv2.html
title="uMatrix: Stop Cross-Site Requests"
image="/assets/img/png/3rd-party/umatrix.png"
description="<strong>uMatrix</strong> gives you control over the requests that websites make to other websites. Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix allows 1st party scripts in its default configuration. If you want the default functionality of NoScript consider <a href=https://github.com/gorhill/uMatrix/wiki/How-to-block-1st-party-scripts-everywhere-by-default>blocking 1st party scripts everywhere by default</a>."
website="https://addons.mozilla.org/firefox/addon/umatrix/"
privacy-policy="https://github.com/gorhill/uMatrix/wiki/Privacy-policy"
forum="https://forum.privacytools.io/t/discussion-umatrix/271"
github="https://github.com/gorhill/uMatrix"
firefox="https://addons.mozilla.org/firefox/addon/umatrix"
chrome="https://chrome.google.com/webstore/detail/umatrix/ogfcmafjalglgifnmanfmnieipoejdcf"
opera="https://addons.opera.com/extensions/details/umatrix"
title="uMatrix: Stop Cross-Site Requests"
image="/assets/img/png/3rd-party/umatrix.png"
description="<strong>uMatrix</strong> gives you control over the requests that websites make to other websites. Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix allows 1st party scripts in its default configuration. If you want the default functionality of NoScript consider <a href=https://github.com/gorhill/uMatrix/wiki/How-to-block-1st-party-scripts-everywhere-by-default>blocking 1st party scripts everywhere by default</a>."
website="https://addons.mozilla.org/firefox/addon/umatrix/"
privacy-policy="https://github.com/gorhill/uMatrix/wiki/Privacy-policy"
forum="https://forum.privacytools.io/t/discussion-umatrix/271"
github="https://github.com/gorhill/uMatrix"
firefox="https://addons.mozilla.org/firefox/addon/umatrix"
chrome="https://chrome.google.com/webstore/detail/umatrix/ogfcmafjalglgifnmanfmnieipoejdcf"
opera="https://addons.opera.com/extensions/details/umatrix"
%}
{% include cardv2.html
title="CanvasBlocker"
image="/assets/img/svg/3rd-party/canvasblocker.svg"
description="<strong>CanvasBlocker</strong> allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API."
website="https://github.com/kkapsner/CanvasBlocker/"
privacy-policy="https://addons.mozilla.org/firefox/addon/canvasblocker/privacy/"
forum="https://forum.privacytools.io/t/discussion-canvasblocker/3352"
github="https://github.com/kkapsner/CanvasBlocker/"
firefox="https://addons.mozilla.org/firefox/addon/canvasblocker/"
title="CanvasBlocker"
image="/assets/img/svg/3rd-party/canvasblocker.svg"
description="<strong>CanvasBlocker</strong> allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API."
website="https://github.com/kkapsner/CanvasBlocker/"
privacy-policy="https://addons.mozilla.org/firefox/addon/canvasblocker/privacy/"
forum="https://forum.privacytools.io/t/discussion-canvasblocker/3352"
github="https://github.com/kkapsner/CanvasBlocker/"
firefox="https://addons.mozilla.org/firefox/addon/canvasblocker/"
%}

View File

@ -4,34 +4,34 @@
</h1>
{% include cardv2.html
title="Firefox"
image="/assets/img/svg/3rd-party/firefox_browser.svg"
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our
recommendations: <a href="#addons"><i class="fas fa-link"></i> Privacy Add-ons</a> <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> <a href="#about_config"><i class="fas fa-link"></i> about:config tweaks</a>.'
website="https://firefox.com"
privacy-policy="https://www.mozilla.org/en-US/privacy/firefox/"
forum="https://forum.privacytools.io/t/discussion-firefox/279"
source="https://hg.mozilla.org/mozilla-central/"
windows="https://www.mozilla.org/firefox/windows/"
mac="https://www.mozilla.org/firefox/mac/"
linux="https://www.mozilla.org/firefox/linux/"
freebsd="https://www.freshports.org/www/firefox"
openbsd="http://openports.se/www/mozilla-firefox"
netbsd="http://pkgsrc.se/www/firefox"
title="Firefox"
image="/assets/img/svg/3rd-party/firefox_browser.svg"
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our
recommendations: <a href="#addons"><i class="fas fa-link"></i> Privacy Add-ons</a> <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> <a href="#about_config"><i class="fas fa-link"></i> about:config tweaks</a>.'
website="https://firefox.com"
privacy-policy="https://www.mozilla.org/en-US/privacy/firefox/"
forum="https://forum.privacytools.io/t/discussion-firefox/279"
source="https://hg.mozilla.org/mozilla-central/"
windows="https://www.mozilla.org/firefox/windows/"
mac="https://www.mozilla.org/firefox/mac/"
linux="https://www.mozilla.org/firefox/linux/"
freebsd="https://www.freshports.org/www/firefox"
openbsd="http://openports.se/www/mozilla-firefox"
netbsd="http://pkgsrc.se/www/firefox"
%}
{% include cardv2.html
title="Tor Browser - Provides Anonymity"
image="/assets/img/svg/3rd-party/tor_browser.svg"
description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy. <a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor">How does Tor work?</a>'
website="https://www.torproject.org/"
privacy-policy="https://support.torproject.org/tbb/tbb-3/"
tor="http://expyuzz4wqqyqhjn.onion/"
forum="https://forum.privacytools.io/t/discussion-tor-browser/278"
git="https://trac.torproject.org/projects/tor"
windows="https://www.torproject.org/download/"
mac="https://www.torproject.org/download/"
linux="https://www.torproject.org/download/"
title="Tor Browser - Provides Anonymity"
image="/assets/img/svg/3rd-party/tor_browser.svg"
description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy. <a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor">How does Tor work?</a>'
website="https://www.torproject.org/"
privacy-policy="https://support.torproject.org/tbb/tbb-3/"
tor="http://expyuzz4wqqyqhjn.onion/"
forum="https://forum.privacytools.io/t/discussion-tor-browser/278"
git="https://trac.torproject.org/projects/tor"
windows="https://www.torproject.org/download/"
mac="https://www.torproject.org/download/"
linux="https://www.torproject.org/download/"
%}
<h1 id="browser-android" class="anchor">
@ -40,42 +40,42 @@ linux="https://www.torproject.org/download/"
</h1>
{% include cardv2.html
title="Firefox"
image="/assets/img/svg/3rd-party/firefox_browser.svg"
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our
recommendations: <a href="#addons"><i class="fas fa-link"></i> Privacy Add-ons</a> <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> <a href="#about_config"><i class="fas fa-link"></i> about:config tweaks</a>.'
website="https://www.mozilla.org/en-US/firefox/mobile/"
privacy-policy="https://www.mozilla.org/en-US/privacy/firefox/"
forum="https://forum.privacytools.io/t/discussion-firefox/279"
source="https://github.com/mozilla-mobile"
fdroid="https://f-droid.org/en/packages/org.mozilla.fennec_fdroid/"
googleplay="https://play.google.com/store/apps/details?id=org.mozilla.firefox"
android="https://www.mozilla.org/firefox/all/#product-android-release"
title="Firefox"
image="/assets/img/svg/3rd-party/firefox_browser.svg"
description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our
recommendations: <a href="#addons"><i class="fas fa-link"></i> Privacy Add-ons</a> <a href="#webrtc"><i class="fas fa-link"></i> WebRTC</a> <a href="#about_config"><i class="fas fa-link"></i> about:config tweaks</a>.'
website="https://www.mozilla.org/en-US/firefox/mobile/"
privacy-policy="https://www.mozilla.org/en-US/privacy/firefox/"
forum="https://forum.privacytools.io/t/discussion-firefox/279"
source="https://github.com/mozilla-mobile"
fdroid="https://f-droid.org/en/packages/org.mozilla.fennec_fdroid/"
googleplay="https://play.google.com/store/apps/details?id=org.mozilla.firefox"
android="https://www.mozilla.org/firefox/all/#product-android-release"
%}
{% include cardv2.html
title="Tor Browser - Provides Anonymity"
image="/assets/img/svg/3rd-party/tor_browser.svg"
description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption and an advanced proxy. <a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor">How does Tor work?</a>'
website="https://www.torproject.org/"
privacy-policy="https://support.torproject.org/tbb/tbb-3/"
tor="http://expyuzz4wqqyqhjn.onion/"
forum="https://forum.privacytools.io/t/discussion-tor-browser-for-android-browsers/1522"
git="https://gitweb.torproject.org/tor-browser.git/"
android="https://www.torproject.org/download/#android"
fdroid="https://guardianproject.info/fdroid/"
googleplay="https://play.google.com/store/apps/details?id=org.torproject.torbrowser"
title="Tor Browser - Provides Anonymity"
image="/assets/img/svg/3rd-party/tor_browser.svg"
description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption and an advanced proxy. <a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor">How does Tor work?</a>'
website="https://www.torproject.org/"
privacy-policy="https://support.torproject.org/tbb/tbb-3/"
tor="http://expyuzz4wqqyqhjn.onion/"
forum="https://forum.privacytools.io/t/discussion-tor-browser-for-android-browsers/1522"
git="https://gitweb.torproject.org/tor-browser.git/"
android="https://www.torproject.org/download/#android"
fdroid="https://guardianproject.info/fdroid/"
googleplay="https://play.google.com/store/apps/details?id=org.torproject.torbrowser"
%}
{% include cardv2.html
title="Bromite"
image="/assets/img/svg/3rd-party/bromite.svg"
description='Bromite is a Chromium-based browser with privacy and security enhancements, built-in adblocking and DNS over HTTPS support; it includes patches from ungoogled-chromium and other privacy-focused projects. More info can be found <a href="https://www.bromite.org/#main-features">on the official website</a>.'
website="https://www.bromite.org/"
forum="https://forum.privacytools.io/t/discussion-bromite-browsers/1521"
github="https://github.com/bromite/bromite"
fdroid="https://www.bromite.org/fdroid"
android="https://www.bromite.org/#download-bromite"
title="Bromite"
image="/assets/img/svg/3rd-party/bromite.svg"
description='Bromite is a Chromium-based browser with privacy and security enhancements, built-in adblocking and DNS over HTTPS support; it includes patches from ungoogled-chromium and other privacy-focused projects. More info can be found <a href="https://www.bromite.org/#main-features">on the official website</a>.'
website="https://www.bromite.org/"
forum="https://forum.privacytools.io/t/discussion-bromite-browsers/1521"
github="https://github.com/bromite/bromite"
fdroid="https://www.bromite.org/fdroid"
android="https://www.bromite.org/#download-bromite"
%}
<h3>Worth Mentioning for Android</h3>
@ -83,13 +83,14 @@ android="https://www.bromite.org/#download-bromite"
<ul>
<li>
<a href="https://www.stoutner.com/privacy-browser/">Privacy Browser</a>
- An open-source web browser focused on user privacy. Features include integrated ad blocking with <a href="https://easylist.to/">EasyList</a>, <a href="https://www.stoutner.com/privacy-browser-2-5/">SSL certificate pinning</a>, and <a href='https://guardianproject.info/apps/orbot/'>Tor Orbot proxy support.</a>
<a href="https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US">
<span class="badge badge-warning" data-toggle="tooltip" title="Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid.">
<span class="fas fa-exclamation-triangle"></span>
Keep Android WebView up-to-date
</span>
</a>
- An open-source web browser focused on user privacy. Features include integrated ad blocking with <a href="https://easylist.to/">EasyList</a>, <a href="https://www.stoutner.com/privacy-browser-2-5/">SSL certificate pinning</a>, and <a href='https://guardianproject.info/apps/orbot/'>Tor Orbot proxy support.</a>
{% include badge.html
color="warning"
icon="fas fa-exclamation-triangle"
link="https://play.google.com/store/apps/details?id=com.google.android.webview"
tooltip="Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid."
text="Keep WebView up-to-date"
%}
</li>
</ul>
@ -97,39 +98,39 @@ android="https://www.bromite.org/#download-bromite"
<h1 id="browser-ios" class="anchor"><a href="#browser-ios"><i class="fas fa-link anchor-icon"></i></a> Browser Recommendations For iOS</h1>
{% include cardv2.html
title="Firefox"
image="/assets/img/svg/3rd-party/firefox_browser.svg"
description='Firefox is fast, reliable, open-source, and respects your privacy. Note: Because of limitations set by Apple in iOS, our recommended tweaks cannot be applied. However, Firefox for iOS has an <a href="https://support.mozilla.org/en-US/kb/enhanced-tracking-protection-firefox-ios">Enhanced Tracking Protection</a> feature that uses a list provided by <a href="https://disconnect.me/trackerprotection">Disconnect</a> to identify and block ad, social, and analytics trackers, as well as cryptominers and fingerprinters.'
website="https://www.mozilla.org/en-US/firefox/mobile/"
privacy-policy="https://www.mozilla.org/en-US/privacy/firefox/"
forum="https://forum.privacytools.io/t/discussion-firefox/279"
source="https://github.com/mozilla-mobile/firefox-ios"
ios="https://apps.apple.com/us/app/firefox-private-safe-browser/id989804926"
title="Firefox"
image="/assets/img/svg/3rd-party/firefox_browser.svg"
description='Firefox is fast, reliable, open-source, and respects your privacy. Note: Because of limitations set by Apple in iOS, our recommended tweaks cannot be applied. However, Firefox for iOS has an <a href="https://support.mozilla.org/en-US/kb/enhanced-tracking-protection-firefox-ios">Enhanced Tracking Protection</a> feature that uses a list provided by <a href="https://disconnect.me/trackerprotection">Disconnect</a> to identify and block ad, social, and analytics trackers, as well as cryptominers and fingerprinters.'
website="https://www.mozilla.org/en-US/firefox/mobile/"
privacy-policy="https://www.mozilla.org/en-US/privacy/firefox/"
forum="https://forum.privacytools.io/t/discussion-firefox/279"
source="https://github.com/mozilla-mobile/firefox-ios"
ios="https://apps.apple.com/us/app/firefox-private-safe-browser/id989804926"
%}
{% include cardv2.html
title="Onion Browser"
image="/assets/img/svg/3rd-party/onion_browser.svg"
description='Onion Browser is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the Tor Project. Warning: there are certain anonymity-related <a href="https://onionbrowser.com/#security-advisories">issues</a> with Onion Browser due to iOS limitations.'
website="https://onionbrowser.com/"
privacy-policy="https://onionbrowser.com/privacy-policy"
forum="https://forum.privacytools.io/t/discussion-onion-browser-browsers/1523"
github="https://github.com/OnionBrowser/OnionBrowser"
ios="https://apps.apple.com/us/app/onion-browser/id519296448"
title="Onion Browser"
image="/assets/img/svg/3rd-party/onion_browser.svg"
description='Onion Browser is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the Tor Project. Warning: there are certain anonymity-related <a href="https://onionbrowser.com/#security-advisories">issues</a> with Onion Browser due to iOS limitations.'
website="https://onionbrowser.com/"
privacy-policy="https://onionbrowser.com/privacy-policy"
forum="https://forum.privacytools.io/t/discussion-onion-browser-browsers/1523"
github="https://github.com/OnionBrowser/OnionBrowser"
ios="https://apps.apple.com/us/app/onion-browser/id519296448"
%}
{% include cardv2.html
title="DuckDuckGo Privacy Browser"
image="/assets/img/svg/3rd-party/duckduckgo.svg"
description='DuckDuckGo Privacy Browser is an open-source web browser that has built-in ad and tracker blocking and utilizes <a href="https://tosdr.org/">ToS;DR</a> to rate the privacy policies of the sites you visit.'
website="https://duckduckgo.com/app"
privacy-policy="https://duckduckgo.com/privacy"
tor="https://3g2upl4pq6kufc4m.onion/app"
forum="https://forum.privacytools.io/t/discussion-duckduckgo-privacy-browser-browsers/1524"
github="https://github.com/duckduckgo/iOS"
ios="https://apps.apple.com/us/app/duckduckgo-privacy-browser/id663592361"
title="DuckDuckGo Privacy Browser"
image="/assets/img/svg/3rd-party/duckduckgo.svg"
description='DuckDuckGo Privacy Browser is an open-source web browser that has built-in ad and tracker blocking and utilizes <a href="https://tosdr.org/">ToS;DR</a> to rate the privacy policies of the sites you visit.'
website="https://duckduckgo.com/app"
privacy-policy="https://duckduckgo.com/privacy"
tor="https://3g2upl4pq6kufc4m.onion/app"
forum="https://forum.privacytools.io/t/discussion-duckduckgo-privacy-browser-browsers/1524"
github="https://github.com/duckduckgo/iOS"
ios="https://apps.apple.com/us/app/duckduckgo-privacy-browser/id663592361"
%}
<h3>Worth Mentioning for iOS</h3>

View File

@ -1,34 +1,34 @@
<h1 id="clients" class="anchor"><a href="#clients"><i class="fas fa-link anchor-icon"></i></a> Email Clients</h1>
{% include cardv2.html
title="Thunderbird"
image="/assets/img/svg/3rd-party/thunderbird.svg"
description="Thunderbird is a free, open source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Twitter) client developed by the Thunderbird community, and previously by the Mozilla Foundation."
website="https://www.thunderbird.net/"
privacy-policy="https://www.mozilla.org/en-US/privacy/thunderbird/"
forum="https://forum.privacytools.io/t/discussion-thunderbird/659"
source="https://hg.mozilla.org/comm-central/"
windows="https://www.thunderbird.net/en-US/"
mac="https://www.thunderbird.net/en-US/"
linux="https://www.thunderbird.net/en-US/"
freebsd="https://www.freshports.org/mail/thunderbird/"
openbsd="http://openports.se/mail/mozilla-thunderbird"
netbsd="http://pkgsrc.se/mail/thunderbird"
title="Thunderbird"
image="/assets/img/svg/3rd-party/thunderbird.svg"
description="Thunderbird is a free, open source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Twitter) client developed by the Thunderbird community, and previously by the Mozilla Foundation."
website="https://www.thunderbird.net/"
privacy-policy="https://www.mozilla.org/en-US/privacy/thunderbird/"
forum="https://forum.privacytools.io/t/discussion-thunderbird/659"
source="https://hg.mozilla.org/comm-central/"
windows="https://www.thunderbird.net/en-US/"
mac="https://www.thunderbird.net/en-US/"
linux="https://www.thunderbird.net/en-US/"
freebsd="https://www.freshports.org/mail/thunderbird/"
openbsd="http://openports.se/mail/mozilla-thunderbird"
netbsd="http://pkgsrc.se/mail/thunderbird"
%}
{% include cardv2.html
title="Claws Mail"
image="/assets/img/png/3rd-party/claws_mail.png"
description="Claws Mail is a free and open source, GTK-based email and news client. It offers easy configuration and an abundance of features. It is included with Gpg4win, an encryption suite for Windows."
website="https://www.claws-mail.org/"
forum="https://forum.privacytools.io/t/discussion-claws-mail/660"
git="https://git.claws-mail.org/"
windows="https://www.claws-mail.org/win32/"
mac="https://www.claws-mail.org/faq/index.php/Installation_and_Configuration#What_do_I_need_to_compile_Claws_Mail.3F"
linux="https://www.claws-mail.org/downloads.php?section=downloads"
freebsd="https://www.freshports.org/mail/claws-mail/"
openbsd="http://openports.se/mail/claws-mail"
netbsd="http://pkgsrc.se/mail/claws-mail"
title="Claws Mail"
image="/assets/img/png/3rd-party/claws_mail.png"
description="Claws Mail is a free and open source, GTK-based email and news client. It offers easy configuration and an abundance of features. It is included with Gpg4win, an encryption suite for Windows."
website="https://www.claws-mail.org/"
forum="https://forum.privacytools.io/t/discussion-claws-mail/660"
git="https://git.claws-mail.org/"
windows="https://www.claws-mail.org/win32/"
mac="https://www.claws-mail.org/faq/index.php/Installation_and_Configuration#What_do_I_need_to_compile_Claws_Mail.3F"
linux="https://www.claws-mail.org/downloads.php?section=downloads"
freebsd="https://www.freshports.org/mail/claws-mail/"
openbsd="http://openports.se/mail/claws-mail"
netbsd="http://pkgsrc.se/mail/claws-mail"
%}

View File

@ -16,31 +16,31 @@
alt="ProtonMail">
</div>
<div class="col">
<h2 id="protonmail" class="anchor"><a href="#protonmail"><i class="fas fa-link anchor-icon"></i></a> ProtonMail <span class="badge badge-info">Free</span></h2>
<h2 id="protonmail" class="anchor"><a href="#protonmail"><i class="fas fa-link anchor-icon"></i></a> ProtonMail {% include badge.html color="info" text="Free" %}</h2>
<p><strong><a href="https://protonmail.com">ProtonMail.com</a></strong> is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since <strong>2013</strong>. ProtonMail is based in Genève, <span class="flag-icon flag-icon-ch"></span> Switzerland. Accounts start with 500 MB storage with their free plan.</p>
<p>Free accounts have some limitations and do not allow the use of the <a href="https://protonmail.com/bridge">ProtonMail Bridge</a>, which is required to use a <a href="/software/email">recommended email client</a> (e.g. Thunderbird) or to search email by body text. Paid accounts are available starting at <strong>€48/y</strong> which include features like ProtonMail Bridge, additional storage, custom domain support, and more. The webmail and mobile apps can only search <code>To:</code>, <code>From:</code>, <code>Date:</code> and <code>Subject:</code> (this is likely to change when <a href="https://reddit.com/comments/cqwk2a/comment/ex21b4e">v4.0</a> of ProtonMail is released).</p>
<h5><span class="badge badge-success">Domains and Aliases</span></h5>
<h5>{% include badge.html color="success" text="Domains and Aliases" %}</h5>
<p>Paid ProtonMail users can use their own domain with the service. <a href="https://protonmail.com/support/knowledge-base/catch-all/">Catch-all</a> addresses are supported with custom domains for Professional and Visionary plans. ProtonMail also supports <a href="https://protonmail.com/support/knowledge-base/creating-aliases/">subaddressing</a>, which is useful for users who don't want to purchase a domain.</p>
<h5><span class="badge badge-success">Payment Methods</span></h5>
<h5>{% include badge.html color="success" text="Payment Methods" %}</h5>
<p>ProtonMail accepts Bitcoin in addition to accepting credit/debit cards and PayPal.</p>
<h5><span class="badge badge-success">Account Security</span></h5>
<h5>{% include badge.html color="success" text="Account Security" %}</h5>
<p>ProtonMail supports <a href="https://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm">TOTP</a> <a href="https://protonmail.com/support/knowledge-base/two-factor-authentication/">two factor authentication</a> only. The use of a <a href="https://en.wikipedia.org/wiki/Universal_2nd_Factor">U2F</a> security key is not yet supported. ProtonMail is planning to implement U2F upon completion of their <a href="https://reddit.com/comments/cheoy6/comment/feh2lw0/">Single Sign On (SSO)</a> code.</p>
<h5><span class="badge badge-success">Data Security</span></h5>
<h5>{% include badge.html color="success" text="Data Security" %}</h5>
<p>ProtonMail has <a href="https://protonmail.com/blog/zero-access-encryption">zero access encryption at rest</a> for your emails, <a href="https://protonmail.com/blog/encrypted-contacts-manager">address book contacts</a>, and <a href="https://protonmail.com/blog/protoncalendar-security-model">calendars</a>. This means the messages and other data stored in your account are only readable by you. </p>
<h5><span class="badge badge-success">Email Encryption</span></h5>
<h5>{% include badge.html color="success" text="Email Encryption" %}</h5>
<p>ProtonMail has <a href="https://protonmail.com/support/knowledge-base/how-to-use-pgp">integrated OpenPGP encryption</a> in their webmail. Emails to other ProtonMail users are encrypted automatically, and encryption to non-ProtonMail users with an OpenPGP key can be enabled easily in your account settings. They also allow you to <a href="https://protonmail.com/support/knowledge-base/encrypt-for-outside-users">encrypt messages to non-ProtonMail users</a> without the need for them to sign up for a ProtonMail account or use software like OpenPGP.</p>
<p>ProtonMail also supports the discovery of public keys via HTTP from their <a href="https://wiki.gnupg.org/WKD">Web Key Directory (WKD)</a>. This allows users outside of ProtonMail to find the OpenPGP keys of ProtonMail users easily, for cross-provider E2EE.</p>
<h5><span class="badge badge-success">.onion Service</span></h5>
<h5>{% include badge.html color="success" text=".onion Service" %}</h5>
<p>ProtonMail is accessible via Tor at <a href="https://protonirockerxow.onion/">protonirockerxow.onion</a>.</p>
<h5><span class="badge badge-info">Extra Functionality</span></h5>
<h5>{% include badge.html color="info" text="Extra Functionality" %}</h5>
<p>ProtonMail offers a "Visionary" account for €24/Month, which also enables access to ProtonVPN in addition to providing multiple accounts, domains, aliases, and extra storage.</p>
</div>
</div>
@ -54,30 +54,30 @@
alt="Mailbox">
</div>
<div class="col">
<h2 id="mailbox" class="anchor"><a href="#mailbox"><i class="fas fa-link anchor-icon"></i></a> Mailbox.org <span class="badge badge-info">€12/y</span></h2>
<h2 id="mailbox" class="anchor"><a href="#mailbox"><i class="fas fa-link anchor-icon"></i></a> Mailbox.org {% include badge.html color="info" text="€12/y" %}</h2>
<p><strong><a href="https://mailbox.org">Mailbox.org</a></strong> is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since <strong>2014</strong>. Mailbox.org is based in Berlin, <span class="flag-icon flag-icon-de"></span> Germany. Accounts start with 2 GB of storage, which can be upgraded as needed.</p>
<h5><span class="badge badge-success">Domains and Aliases</span></h5>
<h5>{% include badge.html color="success" text="Domains and Aliases" %}</h5>
<p>Mailbox.org lets users use their own domain and they support <a href="https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain">catch-all</a> addresses. Mailbox.org also supports <a href="https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it">subaddressing</a>, which is useful for users who don't want to purchase a domain.</p>
<h5><span class="badge badge-warning">Payment Methods</span></h5>
<h5>{% include badge.html color="warning" text="Payment Methods" %}</h5>
<p>Mailbox.org doesn't accept Bitcoin or any other cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung.</p>
<h5><span class="badge badge-success">Account Security</span></h5>
<h5>{% include badge.html color="success" text="Account Security" %}</h5>
<p>Mailbox.org supports <a href="https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA">two factor authentication</a> for their webmail only. You can use either <a href="https://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm">TOTP</a> or a <a href="https://en.wikipedia.org/wiki/YubiKey">Yubikey</a> via the <a href="https://www.yubico.com/products/services-software/yubicloud">Yubicloud</a>. Web standards such as <a href="https://en.wikipedia.org/wiki/Universal_2nd_Factor">U2F</a> and <a href="https://en.wikipedia.org/wiki/WebAuthn">WebAuthn</a> are not yet supported.</p>
<h5><span class="badge badge-warning">Data Security</span></h5>
<h5>{% include badge.html color="warning" text="Data Security" %}</h5>
<p>Mailbox.org allows for encryption of incoming mail using their <a href="https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox">encrypted mailbox</a>. New messages that you receive will then be immediately encrypted with your public key.</p>
<p>However, <a href="https://en.wikipedia.org/wiki/Open-Xchange">Open-Exchange</a>, the software platform used by Mailbox.org, <a href="https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book">does not support</a> the encryption of your address book and calendar. A <a href="/software/calendar-contacts/">standalone option</a> may be more appropriate for that information.</p>
<h5><span class="badge badge-success">Email Encryption</span></h5>
<h5>{% include badge.html color="success" text="Email Encryption" %}</h5>
<p>Mailbox.org has <a href="https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard">integrated encryption</a> in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also allow <a href="https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP">remote recipients to decrypt an email</a> on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.</p>
<p>Mailbox.org also supports the discovery of public keys via HTTP from their <a href="https://wiki.gnupg.org/WKD">Web Key Directory (WKD)</a>. This allows users outside of Mailbox.org to find the OpenPGP keys of Mailbox.org users easily, for cross-provider E2EE.</p>
<h5><span class="badge badge-warning">.onion Service</span></h5>
<h5>{% include badge.html color="warning" text=".onion Service" %}</h5>
<p>You can access your Mailbox.org account via IMAP/SMTP using <a href="https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org">their .onion service</a>. However, their webmail interface cannot be accessed via their .onion service, and users may experience TLS certificate errors.</p>
<h5><span class="badge badge-info">Extra Functionality</span></h5>
<h5>{% include badge.html color="info" text="Extra Functionality" %}</h5>
<p>All accounts come with limited cloud storage that <a href="https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive">can be encrypted</a>. Mailbox.org also offers the alias <a href="https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely">@secure.mailbox.org</a>, which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports <a href="https://en.wikipedia.org/wiki/Exchange_ActiveSync">Exchange ActiveSync</a> in addition to standard access protocols like IMAP and POP3.</p>
</div>
</div>
@ -91,29 +91,29 @@
alt="Posteo">
</div>
<div class="col">
<h2 id="posteo" class="anchor"><a href="#posteo"><i class="fas fa-link anchor-icon"></i></a> Posteo <span class="badge badge-info">€12/y</span></h2>
<h2 id="posteo" class="anchor"><a href="#posteo"><i class="fas fa-link anchor-icon"></i></a> Posteo {% include badge.html color="info" text="€12/y" %}</h2>
<p><strong><a href="https://posteo.de">Posteo.de</a></strong> is an email provider that focuses on anonymous, secure, and private email. Their servers are powered by 100% sustainable energy. They have been in operation since <strong>2009</strong>. Posteo is based in <span class="flag-icon flag-icon-de"></span> Germany and has a free 14-day trial. Posteo comes with 2 GB for the monthly cost and an extra gigabyte can be purchased for €0.25 per month.</p>
<h5><span class="badge badge-warning">Domains and Aliases</span></h5>
<h5>{% include badge.html color="warning" text="Domains and Aliases" %}</h5>
<p>Posteo does <a href="https://posteo.de/en/site/faq">not allow the use of custom domains</a>, however users may still make use of <a href="https://posteo.de/en/help/what-is-an-email-alias">subaddressing</a>.</p>
<h5><span class="badge badge-warning">Payment Methods</span></h5>
<h5>{% include badge.html color="warning" text="Payment Methods" %}</h5>
<p>Posteo does not accept Bitcoin or other cryptocurrencies as a form of payment, however they do accept cash-by-mail. They also accept credit/debit cards, bank transfers, and PayPal, and remove PII (personally identifiable information) <a href="https://posteo.de/en/site/payment">that they receive</a> in connection with these payment methods.</p>
<h5><span class="badge badge-success">Account Security</span></h5>
<h5>{% include badge.html color="success" text="Account Security" %}</h5>
<p>Posteo supports <a href="https://posteo.de/en/help/what-is-two-factor-authentication-and-how-do-i-set-it-up">two factor authentication</a> for their webmail only. You can use either <a href="https://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm">TOTP</a> a <a href="https://en.wikipedia.org/wiki/YubiKey">Yubikey</a> with TOTP. Web standards such as <a href="https://en.wikipedia.org/wiki/Universal_2nd_Factor">U2F</a> and <a href="https://en.wikipedia.org/wiki/WebAuthn">WebAuthn</a> are not yet supported.</p>
<h5><span class="badge badge-warning">Data Security</span></h5>
<h5>{% include badge.html color="warning" text="Data Security" %}</h5>
<p>Posteo has <a href="https://posteo.de/en/site/encryption#cryptomailstorage">zero access encryption</a> for email storage. This means the messages stored in your account are only readable by you.</p>
<p>Posteo also supports the encryption of your <a href="https://posteo.de/en/site/features#featuresaddressbook">address book contacts</a> and <a href="https://posteo.de/en/site/features#featurescalendar">calendars</a> at rest. However, Posteo still uses standard <a href="https://en.wikipedia.org/wiki/CalDAV">CalDAV</a> and <a href="https://en.wikipedia.org/wiki/CardDAV">CardDAV</a> for calendars and contacts. These protocols do not support <a href="https://en.wikipedia.org/wiki/End-to-end_encryption">E2EE (End-To-End Encryption)</a>. A <a href="/software/calendar-contacts/">standalone option</a> may be more appropiate.</p>
<h5><span class="badge badge-success">Email Encryption</span></h5>
<h5>{% include badge.html color="success" text="Email Encryption" %}</h5>
<p>Posteo has <a href="https://posteo.de/en/site/encryption#pgp_webmailer">integrated encryption</a> in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also support the discovery of public keys via HTTP from their <a href="https://wiki.gnupg.org/WKD">Web Key Directory (WKD)</a>. This allows users outside of Posteo to find the OpenPGP keys of Posteo users easily, for cross-provider E2EE.</p>
<h5><span class="badge badge-danger">.onion Service</span></h5>
<h5>{% include badge.html color="danger" text=".onion Service" %}</h5>
<p>Posteo does not operate a .onion service.</p>
<h5><span class="badge badge-info">Extra Functionality</span></h5>
<h5>{% include badge.html color="info" text="Extra Functionality" %}</h5>
<p>Posteo allows users to <a href="https://posteo.de/en/help/does-posteo-offer-mailing-lists">set up their own mailing lists</a>. Each account can create one list for free.</p>
</div>
</div>
@ -127,29 +127,29 @@
alt="Soverin">
</div>
<div class="col">
<h2 id="soverin" class="anchor"><a href="#soverin"><i class="fas fa-link anchor-icon"></i></a> Soverin <span class="badge badge-info">€29/y</span></h2>
<h2 id="soverin" class="anchor"><a href="#soverin"><i class="fas fa-link anchor-icon"></i></a> Soverin {% include badge.html color="info" text="€29/y" %}</h2>
<p><strong><a href="https://soverin.net">Soverin.net</a></strong> is an email provider which focuses on being private, ad-free, and powered by sustainable energy. They have been in operation since <strong>2015</strong>. Soverin is based in <span class="flag-icon flag-icon-nl"></span> Amsterdam and does not have a free trial. Accounts start at 25 GB.</p>
<h5><span class="badge badge-success">Domains and Aliases</span></h5>
<h5>{% include badge.html color="success" text="Domains and Aliases" %}</h5>
<p>Soverin lets users use their own domain. Soverin users can also use <a href="https://support.soverin.net/hc/en-us/articles/115004811093-How-can-I-setup-a-catch-all-on-my-domain-">catch-all</a> and <a href="https://support.soverin.net/hc/en-us/articles/115004811073-How-can-I-add-an-alias-to-my-domain-">aliases</a> for domains they own. Soverin also allows for <a href="https://support.soverin.net/hc/en-us/articles/115004811033-Do-support-the-plus-syntax-subaddressing-">subaddressing</a>, which is useful for users who don't want to purchase a domain.</p>
<h5><span class="badge badge-success">Payment Methods</span></h5>
<h5>{% include badge.html color="success" text="Payment Methods" %}</h5>
<p>Soverin accepts Bitcoin as payment. They also accept credit/debit cards, PayPal, and the Netherlands-specific payment gateway iDEAL.</p>
<h5><span class="badge badge-success">Account Security</span></h5>
<h5>{% include badge.html color="success" text="Account Security" %}</h5>
<p>Soverin supports <a href="https://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm">TOTP</a> two factor authentication <a href="https://support.soverin.net/hc/en-us/articles/360008819553-Setting-up-2-Factor-Authentication-2FA-Webmail-only">for webmail only</a>. They do not allow <a href="https://en.wikipedia.org/wiki/Universal_2nd_Factor">U2F</a> security key authentication.</p>
<h5><span class="badge badge-warning">Data Security</span></h5>
<h5>{% include badge.html color="warning" text="Data Security" %}</h5>
<p>Soverin has <a href="https://support.soverin.net/hc/en-us/articles/115004810713-Technical-details-about-Soverin">encryption at rest</a> however it doesn't appear to be "zero access", meaning it is technically possible for them to decrypt the data they have.</p>
<p>Soverin also uses the standard <a href="https://en.wikipedia.org/wiki/CalDAV">CalDAV</a> and <a href="https://en.wikipedia.org/wiki/CardDAV">CardDAV</a> protocols for calendars and contacts, which do not support E2EE. A <a href="/software/calendar-contacts/">standalone option</a> may be more appropriate.</p>
<h5><span class="badge badge-success">Email Encryption</span></h5>
<h5>{% include badge.html color="success" text="Email Encryption" %}</h5>
<p>Soverin has integrated encryption in their webmail, which simplifies sending messages to users. However, Soverin has not integrated a <a href="https://wiki.gnupg.org/WKD">Web Key Directory (WKD)</a> for users on their platform.<p>
<h5><span class="badge badge-danger">.onion Service</span></h5>
<h5>{% include badge.html color="danger" text=".onion Service" %}</h5>
<p>Soverin does not operate a .onion service.</p>
<h5><span class="badge badge-info">Extra Functionality</span></h5>
<h5>{% include badge.html color="info" text="Extra Functionality" %}</h5>
<p>Soverin also providers users with space for a personal webpage.</p>
</div>
</div>
@ -164,29 +164,29 @@
alt="Disroot">
</div>
<div class="col">
<h2 id="disroot" class="anchor"><a href="#disroot"><i class="fas fa-link anchor-icon"></i></a> Disroot <span class="badge badge-info">Free</span></h2>
<h2 id="disroot" class="anchor"><a href="#disroot"><i class="fas fa-link anchor-icon"></i></a> Disroot {% include badge.html color="info" text="Free" %}</h2>
<p><strong><a href="https://disroot.org/en/services/email">Disroot</a></strong> offers email amongst <a href="https://disroot.org/en/#services">other services</a>. The service is maintained by volunteers and its community. They have been in operation since <strong>2015</strong>. Disroot is based in <span class="flag-icon flag-icon-nl"></span> Amsterdam. Disroot is free and uses open source software such as Rainloop to provide service. Users support the service through donations and buying extra storage. The mailbox limit is 1 GB, but extra storage can be purchased 0.15€ per GB per month paid yearly.</p>
<h5><span class="badge badge-success">Domains and Aliases</span></h5>
<h5>{% include badge.html color="success" text="Domains and Aliases" %}</h5>
<p>Disroot lets users use their own domain. They have aliases, however you must <a href="https://disroot.org/en/forms/alias-request-form">manually apply</a> for them.</p>
<h5><span class="badge badge-success">Payment Methods</span></h5>
<h5>{% include badge.html color="success" text="Payment Methods" %}</h5>
<p>Disroot accepts Bitcoin and Faircoin as payment methods. They also accept PayPal, direct bank deposit, and Patreon payments. Disroot is a not-for-profit organization that also accepts donations through Liberapay, Flattr, and Monero, but these payment methods cannot be used to purchase services.</p>
<h5><span class="badge badge-success">Account Security</span></h5>
<h5>{% include badge.html color="success" text="Account Security" %}</h5>
<p>Disroot supports <a href="https://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm">TOTP</a> two factor authentication for webmail only. They do not allow <a href="https://en.wikipedia.org/wiki/Universal_2nd_Factor">U2F</a> security key authentication.</p>
<h5><span class="badge badge-warning">Data Security</span></h5>
<h5>{% include badge.html color="warning" text="Data Security" %}</h5>
<p>Disroot uses full disk encryption. However, it doesn't appear to be "zero access", meaning it is technically possible for them to decrypt the data they have.</p>
<p>Disroot also uses the standard <a href="https://en.wikipedia.org/wiki/CalDAV">CalDAV</a> and <a href="https://en.wikipedia.org/wiki/CardDAV">CardDAV</a> protocols for calendars and contacts, which do not support E2EE. A <a href="/software/calendar-contacts/">standalone option</a> may be more appropriate.</p>
<h5><span class="badge badge-success">Email Encryption</span></h5>
<h5>{% include badge.html color="success" text="Email Encryption" %}</h5>
<p>Disroot allows for encrypted emails to be sent from their webmail application using OpenPGP. However, Disroot has not integrated a <a href="https://wiki.gnupg.org/WKD">Web Key Directory (WKD)</a> for users on their platform.</p>
<h5><span class="badge badge-danger">.onion Service</span></h5>
<h5>{% include badge.html color="danger" text=".onion Service" %}</h5>
<p>Disroot does not operate a .onion service.</p>
<h5><span class="badge badge-info">Extra Functionality</span></h5>
<h5>{% include badge.html color="info" text="Extra Functionality" %}</h5>
<p>They offer <a href="https://disroot.org/en/#services">other services</a> such as NextCloud, XMPP Chat, Etherpad, Ethercalc, Pastebin, Online polls and a Gitea instance. They also have an app <a href="https://f-droid.org/packages/org.disroot.disrootapp/">available in F-Droid</a>.</p>
</div>
</div>
@ -201,32 +201,32 @@
alt="Tutanota">
</div>
<div class="col">
<h2 id="tutanota" class="anchor"><a href="#tutanota"><i class="fas fa-link anchor-icon"></i></a> Tutanota <span class="badge badge-info">Free</span></h2>
<h2 id="tutanota" class="anchor"><a href="#tutanota"><i class="fas fa-link anchor-icon"></i></a> Tutanota {% include badge.html color="info" text="Free" %}</h2>
<p><strong><a href="https://tutanota.com">Tutanota.com</a></strong> is an email service with a focus on security and privacy through the use of encryption. Tutanota has been in operation since <strong>2011</strong> and is based in Hanover, <span class="flag-icon flag-icon-de"></span> Germany. Accounts start with 1GB storage with their free plan.</p>
<p>Tutanota <a href="https://tutanota.com/faq/#imap">doesn't allow</a> the use of third-party <a href="/software/email/">email clients</a>. There are plans to allow Tutanota pull email from <a href="https://github.com/tutao/tutanota/issues/544">external email accounts</a> using the <a href="https://en.wikipedia.org/wiki/Internet_Message_Access_Protocol">IMAP</a> protocol. <a href="https://github.com/tutao/tutanota/issues/630">Email import</a> is currently not possible.</p>
<p>Emails can be exported <a href="https://tutanota.com/howto#generalMail">individually or by bulk selection</a>. Tutanota does not allow for <a href="https://github.com/tutao/tutanota/issues/927">subfolders</a> as you might expect with other email providers.</p>
<p>Tutanota is working on a <a href="https://tutanota.com/blog/posts/desktop-clients/">desktop client</a> and they have an app <a href="https://f-droid.org/packages/de.tutao.tutanota">available in F-Droid</a>. They also have their app in conventional stores such as <a href="https://apps.apple.com/us/app/tutanota/id922429609">App Store</a> on iOS and <a href="https://play.google.com/store/apps/details?id=de.tutao.tutanota">Google Play</a> for Android.</p>
<h5><span class="badge badge-success">Domains and Aliases</span></h5>
<h5>{% include badge.html color="success" text="Domains and Aliases" %}</h5>
<p>Paid Tutanota accounts can use up to 5 <a href="https://tutanota.com/faq#alias">aliases</a> and <a href="https://tutanota.com/faq#custom-domain">custom domains</a>. Tutanota doesn't allow for <a href="https://tutanota.com/faq#plus">subaddressing (plus addresses)</a>, but you can use a <a href="https://tutanota.com/howto#settings-global">catch-all</a> with a custom domain.</p>
<h5><span class="badge badge-danger">Payment Methods</span></h5>
<h5>{% include badge.html color="danger" text="Payment Methods" %}</h5>
<p>Tutanota accepts only credit cards and PayPal.</p>
<h5><span class="badge badge-success">Account Security</span></h5>
<h5>{% include badge.html color="success" text="Account Security" %}</h5>
<p>Tutanota supports <a href="https://tutanota.com/faq#2fa">two factor authentication</a>. Users can either use <a href="https://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm">TOTP</a> or <a href="https://en.wikipedia.org/wiki/Universal_2nd_Factor">U2F</a>. U2F support is <a href="https://github.com/tutao/tutanota/issues/443">not yet available on Android</a>.</p>
<h5><span class="badge badge-success">Data Security</span></h5>
<h5>{% include badge.html color="success" text="Data Security" %}</h5>
<p>Tutanota has <a href="https://tutanota.com/faq#what-encrypted">zero access encryption at rest</a> for your emails, <a href="https://tutanota.com/faq#encrypted-address-book">address book contacts</a>, and <a href="https://tutanota.com/faq#calendar">calendars</a>. This means the messages and other data stored in your account are only readable by you. </p>
<h5><span class="badge badge-warning">Email Encryption</span></h5>
<h5>{% include badge.html color="warning" text="Email Encryption" %}</h5>
<p>Tutanota <a href="https://www.tutanota.com/faq/#pgp">does not use OpenPGP</a>. Tutanota users can only receive encrypted emails when external users send them through a <a href="https://www.tutanota.com/howto/#encrypted-email-external">temporary Tutanota mailbox</a>.</p>
<p>Tutanota <a href="https://github.com/tutao/tutanota/issues/198">does have plans</a> to support <a href="https://autocrypt.org">AutoCrypt</a>. This would allow for external users to send encrypted emails to Tutanota users as long as their email client supports the AutoCrypt headers.</p>
<h5><span class="badge badge-danger">.onion Service</span></h5>
<h5>{% include badge.html color="danger" text=".onion Service" %}</h5>
<p>Tutanota does not operate a .onion service but <a href="https://github.com/tutao/tutanota/issues/528">may consider</a> it in the future.</p>
<h5><span class="badge badge-info">Extra Functionality</span></h5>
<h5>{% include badge.html color="info" text="Extra Functionality" %}</h5>
<p>Tutanota offers the business version of <a href="https://tutanota.com/blog/posts/secure-email-for-non-profit">Tutanota to non-profit organizations</a> for free or with a heavy discount.</p>
<p>Tutanota also has a business feature called <a href="https://tutanota.com/secure-connect/">Secure Connect</a>. This ensures customer contact to the business uses E2EE. The feature costs €240/y.</p>
@ -243,30 +243,30 @@
alt="StartMail">
</div>
<div class="col">
<h2 id="startmail" class="anchor"><a href="#startmail"><i class="fas fa-link anchor-icon"></i></a> StartMail <span class="badge badge-info">Personal USD $59.95/y</span></h2>
<h2 id="startmail" class="anchor"><a href="#startmail"><i class="fas fa-link anchor-icon"></i></a> StartMail {% include badge.html color="info" text="Personal USD $59.95/y" %}</h2>
<p><strong><a href="https://startmail.com">StartMail.com</a></strong> is an email service with a focus on security and privacy through the use of standard OpenPGP encryption. StartMail has been in operation since <strong>2014</strong> and is based in Boulevard 11, Zeist <span class="flag-icon flag-icon-nl"></span> Netherlands. Accounts start with 10GB. They offer a 30-day trial.</p>
<h5><span class="badge badge-success">Domains and Aliases</span></h5>
<h5>{% include badge.html color="success" text="Domains and Aliases" %}</h5>
<p>Personal accounts can use <a href="https://support.startmail.com/hc/en-us/articles/360007297457-Aliases">Custom or Generated</a> aliases. Business accounts can use <a href="https://support.startmail.com/hc/en-us/articles/360006840058">Domain aliases</a>.</p>
<h5><span class="badge badge-warning">Payment Methods</span></h5>
<h5>{% include badge.html color="warning" text="Payment Methods" %}</h5>
<p>StartMail accepts Visa, MasterCard, American Express and Paypal. StartMail also has other <a href="https://support.startmail.com/hc/en-us/articles/360006620637-Payment-methods">payment options</a> such as Bitcoin (currently only for Personal accounts) and SEPA Direct Debit for accounts older than a year.</p>
<h5><span class="badge badge-success">Account Security</span></h5>
<h5>{% include badge.html color="success" text="Account Security" %}</h5>
<p>StartMail supports <a href="https://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm">TOTP</a> two factor authentication <a href="https://support.startmail.com/hc/en-us/articles/360006682158-Two-factor-authentication-2FA">for webmail only</a>. They do not allow <a href="https://en.wikipedia.org/wiki/Universal_2nd_Factor">U2F</a> security key authentication.</p>
<h5><span class="badge badge-warning">Data Security</span></h5>
<h5>{% include badge.html color="warning" text="Data Security" %}</h5>
<p>StartMail has <a href="https://www.startmail.com/en/whitepaper/#_Toc458527835">zero access encryption at rest</a>, using their "user vault" system. When a user logs in, the vault is opened, and the email is then moved to the vault out of the queue where it is decrypted by the corresponding private key.</p>
<p>StartMail supports importing <a href="https://support.startmail.com/hc/en-us/articles/360006495557-Import-contacts">contacts</a> however, they are only accessible in the webmail and not through protocols such as <a href="https://en.wikipedia.org/wiki/CalDAV">CalDAV</a>. Contacts are also not stored using zero knowledge encryption, so a <a href="/software/calendar-contacts/">standalone option</a> may be more appropriate.</p>
<h5><span class="badge badge-success">Email Encryption</span></h5>
<h5>{% include badge.html color="success" text="Email Encryption" %}</h5>
<p>StartMail has <a href="https://support.startmail.com/hc/en-us/sections/360001889078-Encryption">integrated encryption</a> in their webmail, which simplifies sending messages to users with public OpenPGP keys.</p>
<h5><span class="badge badge-danger">.onion Service</span></h5>
<h5>{% include badge.html color="danger" text=".onion Service" %}</h5>
<p>StartMail does not operate a .onion service.</p>
<h5><span class="badge badge-info">Extra Functionality</span></h5>
<h5>{% include badge.html color="info" text="Extra Functionality" %}</h5>
<p>StartMail allows for proxying of images within emails. If a user allows the remote image to be loaded, the sender won't know what the user's IP address is.</p>
</div>
</div>

View File

@ -1,39 +1,39 @@
<h1 id="host" class="anchor"><a href="#host"><i class="fas fa-link anchor-icon"></i></a> Secure Hosting Provider</h1>
{% include cardv2.html
title="Data Center: Bahnhof"
image="/assets/img/svg/3rd-party/bahnhof.svg"
image-dark="/assets/img/svg/3rd-party/bahnhof-dark.svg"
description="Bahnhof is one of Swedens largest network operators, founded in 1994. They specialize in innovative data center construction: Extreme security coupled with low-cost green energy has made them world famous."
website="https://www.bahnhof.net/"
privacy-policy="https://www.bahnhof.net/page/privacy-policy"
forum="https://forum.privacytools.io/t/discussion-bahnhof-net/341"
title="Data Center: Bahnhof"
image="/assets/img/svg/3rd-party/bahnhof.svg"
image-dark="/assets/img/svg/3rd-party/bahnhof-dark.svg"
description="Bahnhof is one of Swedens largest network operators, founded in 1994. They specialize in innovative data center construction: Extreme security coupled with low-cost green energy has made them world famous."
website="https://www.bahnhof.net/"
privacy-policy="https://www.bahnhof.net/page/privacy-policy"
forum="https://forum.privacytools.io/t/discussion-bahnhof-net/341"
%}
{% include cardv2.html
title="VPS & Domain: Njalla"
image="/assets/img/svg/3rd-party/njalla.svg"
image-dark="/assets/img/svg/3rd-party/njalla-dark.svg"
description="Njalla is a privacy-aware domain registration service and VPS provider based in Nevis (with VPS data centers in Sweden). It is created by people from The Pirate Bay and IPredator VPN. Accepted payments: Bitcoin, Litecoin, Monero, Zcash, DASH, Bitcoin Cash and PayPal."
website="https://njal.la/"
tor="http://njalladnspotetti.onion"
forum="https://forum.privacytools.io/t/discussion-njalla/339"
title="VPS & Domain: Njalla"
image="/assets/img/svg/3rd-party/njalla.svg"
image-dark="/assets/img/svg/3rd-party/njalla-dark.svg"
description="Njalla is a privacy-aware domain registration service and VPS provider based in Nevis (with VPS data centers in Sweden). It is created by people from The Pirate Bay and IPredator VPN. Accepted payments: Bitcoin, Litecoin, Monero, Zcash, DASH, Bitcoin Cash and PayPal."
website="https://njal.la/"
tor="http://njalladnspotetti.onion"
forum="https://forum.privacytools.io/t/discussion-njalla/339"
%}
{% include cardv2.html
title="Colocation: DataCell"
image="/assets/img/png/3rd-party/datacell.png"
description="DataCell is a data center providing secure colocating in Switzerland and Iceland."
website="https://datacell.is/"
privacy-policy="https://datacell.is/privacy/"
forum="https://forum.privacytools.io/t/discussion-datacell-is/342"
title="Colocation: DataCell"
image="/assets/img/png/3rd-party/datacell.png"
description="DataCell is a data center providing secure colocating in Switzerland and Iceland."
website="https://datacell.is/"
privacy-policy="https://datacell.is/privacy/"
forum="https://forum.privacytools.io/t/discussion-datacell-is/342"
%}
{% include cardv2.html
title="VPS, Hosting, & Domain: Orange Website"
image="/assets/img/png/3rd-party/orange_website.png"
description="Orange Website is an Icelandic web hosting provider that prides themselves in protecting online privacy and free speech."
website="https://www.orangewebsite.com/"
privacy-policy="https://www.orangewebsite.com/docs/privacy-policy.php"
forum="https://forum.privacytools.io/t/discussion-orange-website/343"
title="VPS, Hosting, & Domain: Orange Website"
image="/assets/img/png/3rd-party/orange_website.png"
description="Orange Website is an Icelandic web hosting provider that prides themselves in protecting online privacy and free speech."
website="https://www.orangewebsite.com/"
privacy-policy="https://www.orangewebsite.com/docs/privacy-policy.php"
forum="https://forum.privacytools.io/t/discussion-orange-website/343"
%}

View File

@ -5,53 +5,53 @@
</div>
{% include cardv2.html
title="Joplin"
image="/assets/img/svg/3rd-party/joplin.svg"
description="Joplin is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers end-to-end encryption and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes."
website="https://joplinapp.org/"
privacy-policy="https://joplinapp.org/privacy/"
github="https://github.com/laurent22/joplin"
windows="https://joplinapp.org/#desktop-applications"
mac="https://joplinapp.org/#desktop-applications"
linux="https://joplinapp.org/#desktop-applications"
freebsd="https://www.npmjs.com/package/joplin"
googleplay="https://play.google.com/store/apps/details?id=net.cozic.joplin"
android="https://joplinapp.org/#mobile-applications"
ios="https://itunes.apple.com/us/app/joplin/id1315599797"
firefox="https://addons.mozilla.org/en-US/firefox/addon/joplin-web-clipper/"
chrome="https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek"
title="Joplin"
image="/assets/img/svg/3rd-party/joplin.svg"
description="Joplin is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers end-to-end encryption and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes."
website="https://joplinapp.org/"
privacy-policy="https://joplinapp.org/privacy/"
github="https://github.com/laurent22/joplin"
windows="https://joplinapp.org/#desktop-applications"
mac="https://joplinapp.org/#desktop-applications"
linux="https://joplinapp.org/#desktop-applications"
freebsd="https://www.npmjs.com/package/joplin"
googleplay="https://play.google.com/store/apps/details?id=net.cozic.joplin"
android="https://joplinapp.org/#mobile-applications"
ios="https://itunes.apple.com/us/app/joplin/id1315599797"
firefox="https://addons.mozilla.org/en-US/firefox/addon/joplin-web-clipper/"
chrome="https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek"
%}
{% include cardv2.html
title="Standard Notes"
image="/assets/img/svg/3rd-party/standard_notes.svg"
description='Standard Notes is a simple and private notes app that makes your notes easy and available everywhere you are. It features end-to-end encryption on every platform, and a powerful desktop experience with themes and custom editors. It has also been <a href="https://s3.amazonaws.com/standard-notes/security/Report-SN-Audit.pdf">independently audited (PDF)</a>.'
website="https://standardnotes.org/"
privacy-policy="https://standardnotes.org/privacy"
github="https://github.com/standardnotes"
windows="https://standardnotes.org/#get-started"
mac="https://standardnotes.org/#get-started"
linux="https://standardnotes.org/#get-started"
ios="https://itunes.apple.com/us/app/standard-notes/id1285392450"
fdroid="https://f-droid.org/packages/com.standardnotes/"
googleplay="https://play.google.com/store/apps/details?id=com.standardnotes"
web="https://app.standardnotes.org/"
title="Standard Notes"
image="/assets/img/svg/3rd-party/standard_notes.svg"
description='Standard Notes is a simple and private notes app that makes your notes easy and available everywhere you are. It features end-to-end encryption on every platform, and a powerful desktop experience with themes and custom editors. It has also been <a href="https://s3.amazonaws.com/standard-notes/security/Report-SN-Audit.pdf">independently audited (PDF)</a>.'
website="https://standardnotes.org/"
privacy-policy="https://standardnotes.org/privacy"
github="https://github.com/standardnotes"
windows="https://standardnotes.org/#get-started"
mac="https://standardnotes.org/#get-started"
linux="https://standardnotes.org/#get-started"
ios="https://itunes.apple.com/us/app/standard-notes/id1285392450"
fdroid="https://f-droid.org/packages/com.standardnotes/"
googleplay="https://play.google.com/store/apps/details?id=com.standardnotes"
web="https://app.standardnotes.org/"
%}
{% include cardv2.html
title="Turtl"
image="/assets/img/svg/3rd-party/turtl.svg"
description="Turtl lets you take notes, bookmark websites, and store documents for sensitive projects. From sharing passwords with your coworkers to tracking research on an article you're writing, Turtl keeps it all safe from everyone but you and those you share with."
website="https://turtlapp.com/"
privacy-policy="https://turtlapp.com/privacy/"
github="https://github.com/turtl"
windows="https://turtlapp.com/download/"
mac="https://turtlapp.com/download/"
linux="https://turtlapp.com/download/"
googleplay="https://play.google.com/store/apps/details?id=com.lyonbros.turtl"
android="https://turtlapp.com/download/"
firefox="https://addons.mozilla.org/en-US/firefox/addon/turtl-bookmarking/"
chrome="https://chrome.google.com/webstore/detail/turtl/dgcojenhfdjhieoglmiaheihjadlpcml"
title="Turtl"
image="/assets/img/svg/3rd-party/turtl.svg"
description="Turtl lets you take notes, bookmark websites, and store documents for sensitive projects. From sharing passwords with your coworkers to tracking research on an article you're writing, Turtl keeps it all safe from everyone but you and those you share with."
website="https://turtlapp.com/"
privacy-policy="https://turtlapp.com/privacy/"
github="https://github.com/turtl"
windows="https://turtlapp.com/download/"
mac="https://turtlapp.com/download/"
linux="https://turtlapp.com/download/"
googleplay="https://play.google.com/store/apps/details?id=com.lyonbros.turtl"
android="https://turtlapp.com/download/"
firefox="https://addons.mozilla.org/en-US/firefox/addon/turtl-bookmarking/"
chrome="https://chrome.google.com/webstore/detail/turtl/dgcojenhfdjhieoglmiaheihjadlpcml"
%}
<h3>Warning</h3>

View File

@ -5,8 +5,8 @@
</div>
{% include cardv2.html
title="Qubes OS"
image="/assets/img/svg/3rd-party/qubes_os.svg"
title="Qubes OS"
image="/assets/img/svg/3rd-party/qubes_os.svg"
description='Qubes is an open-source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, the X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers.'
badges="info:Xen"
labels="color==warning::text==contrib::tooltip==This software may depend on or recommend non-free software."

View File

@ -5,47 +5,47 @@
</div>
{%
include cardv2.html
title="Searx"
image="/assets/img/svg/3rd-party/searx.svg"
description='Searx is an <a href="https://github.com/asciimoo/searx">open-source</a>, self-hostable, metasearch engine, aggregating the results of other search engines while not storing information about its users. There is a <a href="https://searx.space/">list of public instances</a> or you can try the <a href="https://search.privacytools.io/">PrivacyTools instance</a>.'
website="https://searx.me/"
tor="http://ulrn6sryqaifefld.onion"
forum="https://forum.privacytools.io/t/discussion-searx/283"
github="https://github.com/asciimoo/searx"
include cardv2.html
title="Searx"
image="/assets/img/svg/3rd-party/searx.svg"
description='Searx is an <a href="https://github.com/asciimoo/searx">open-source</a>, self-hostable, metasearch engine, aggregating the results of other search engines while not storing information about its users. There is a <a href="https://searx.space/">list of public instances</a> or you can try the <a href="https://search.privacytools.io/">PrivacyTools instance</a>.'
website="https://searx.me/"
tor="http://ulrn6sryqaifefld.onion"
forum="https://forum.privacytools.io/t/discussion-searx/283"
github="https://github.com/asciimoo/searx"
%}
{%
include cardv2.html
title="DuckDuckGo"
image="/assets/img/svg/3rd-party/duckduckgo.svg"
description='DuckDuckGo is a "search engine that doesn\'t track you." Some of DuckDuckGo\'s code is free software hosted at GitHub, but the core is proprietary. <span class="flag-icon flag-icon-us"></span> <a href="../../providers/#ukusa">The company is based in the USA.</a>'
website="https://duckduckgo.com/"
privacy-policy="https://duckduckgo.com/privacy"
tor="http://3g2upl4pq6kufc4m.onion"
forum="https://forum.privacytools.io/t/discussion-duckduckgo/285"
github="https://github.com/duckduckgo"
include cardv2.html
title="DuckDuckGo"
image="/assets/img/svg/3rd-party/duckduckgo.svg"
description='DuckDuckGo is a "search engine that doesn\'t track you." Some of DuckDuckGo\'s code is free software hosted at GitHub, but the core is proprietary. <span class="flag-icon flag-icon-us"></span> <a href="../../providers/#ukusa">The company is based in the USA.</a>'
website="https://duckduckgo.com/"
privacy-policy="https://duckduckgo.com/privacy"
tor="http://3g2upl4pq6kufc4m.onion"
forum="https://forum.privacytools.io/t/discussion-duckduckgo/285"
github="https://github.com/duckduckgo"
%}
{%
include cardv2.html
title="Qwant"
image="/assets/img/svg/3rd-party/qwant.svg"
description='Qwant is a search engine with its philosophy based on two principles: no user tracking and no filter bubble. <span class="flag-icon flag-icon-fr"></span> <a href="../../providers/#ukusa">The company is based in France.</a>'
website="https://www.qwant.com/"
privacy-policy="https://about.qwant.com/legal/privacy/"
forum="https://forum.privacytools.io/t/discussion-qwant/286"
github="https://github.com/Qwant/"
include cardv2.html
title="Qwant"
image="/assets/img/svg/3rd-party/qwant.svg"
description='Qwant is a search engine with its philosophy based on two principles: no user tracking and no filter bubble. <span class="flag-icon flag-icon-fr"></span> <a href="../../providers/#ukusa">The company is based in France.</a>'
website="https://www.qwant.com/"
privacy-policy="https://about.qwant.com/legal/privacy/"
forum="https://forum.privacytools.io/t/discussion-qwant/286"
github="https://github.com/Qwant/"
%}
{% include cardv2.html
title="Startpage.com"
image="/assets/img/svg/3rd-party/startpage.svg"
description='Startpage.com is a search engine that provides Google search results with complete privacy protection. <span class="flag-icon flag-icon-nl"></span> Startpage BV is a Netherlands-based company that has been dedicated to privacy-respecting search since 2006.'
labels="color==warning::link==https://support.startpage.com/index.php?/Knowledgebase/Article/View/1277/0/startpage-ceo-robert-beens-discusses-the-investment-from-privacy-one--system1::text==Warning::tooltip==Startpage.com was recently acquired by United States-based System1."
website="https://www.startpage.com/"
privacy-policy="https://www.startpage.com/en/privacy-policy/"
forum="https://forum.privacytools.io/t/delisted-discussion-startpage/284"
title="Startpage.com"
image="/assets/img/svg/3rd-party/startpage.svg"
description='Startpage.com is a search engine that provides Google search results with complete privacy protection. <span class="flag-icon flag-icon-nl"></span> Startpage BV is a Netherlands-based company that has been dedicated to privacy-respecting search since 2006.'
labels="color==warning::link==https://support.startpage.com/index.php?/Knowledgebase/Article/View/1277/0/startpage-ceo-robert-beens-discusses-the-investment-from-privacy-one--system1::text==Warning::tooltip==Startpage.com was recently acquired by United States-based System1."
website="https://www.startpage.com/"
privacy-policy="https://www.startpage.com/en/privacy-policy/"
forum="https://forum.privacytools.io/t/delisted-discussion-startpage/284"
%}
<h3>Worth Mentioning</h3>

View File

@ -5,71 +5,99 @@
</div>
{% include cardv2.html
title="Tor"
image="/assets/img/svg/3rd-party/tor.svg"
description="The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Tor is an effective censorship circumvention tool."
website="https://www.torproject.org/"
tor="http://expyuzz4wqqyqhjn.onion"
forum="https://forum.privacytools.io/t/discussion-tor/1589"
windows="https://www.torproject.org/download/"
mac="https://www.torproject.org/download/"
linux="https://www.torproject.org/download/"
freebsd="https://www.freshports.org/security/tor"
openbsd="http://openports.se/net/tor"
netbsd="http://pkgsrc.se/net/tor"
fdroid="https://support.torproject.org/tormobile/tormobile-7/"
googleplay="https://play.google.com/store/apps/details?id=org.torproject.torbrowser"
android="https://www.torproject.org/download/#android"
git="https://gitweb.torproject.org/tor.git"
title="Tor"
image="/assets/img/svg/3rd-party/tor.svg"
description="The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Tor is an effective censorship circumvention tool."
website="https://www.torproject.org/"
tor="http://expyuzz4wqqyqhjn.onion"
forum="https://forum.privacytools.io/t/discussion-tor/1589"
windows="https://www.torproject.org/download/"
mac="https://www.torproject.org/download/"
linux="https://www.torproject.org/download/"
freebsd="https://www.freshports.org/security/tor"
openbsd="http://openports.se/net/tor"
netbsd="http://pkgsrc.se/net/tor"
fdroid="https://support.torproject.org/tormobile/tormobile-7/"
googleplay="https://play.google.com/store/apps/details?id=org.torproject.torbrowser"
android="https://www.torproject.org/download/#android"
git="https://gitweb.torproject.org/tor.git"
%}
{% include cardv2.html
title="I2P Anonymous Network"
image="/assets/img/svg/3rd-party/i2p.svg"
image-dark="/assets/img/svg/3rd-party/i2p-dark.svg"
description="The Invisible Internet Project (I2P) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous Web surfing, chatting, blogging, and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. The software is free and open-source and is published under multiple licenses."
website="https://geti2p.net/"
forum="https://forum.privacytools.io/t/discussion-i2p/1590"
i2p="http://i2p-projekt.i2p/"
windows="https://geti2p.net/en/download#windows"
mac="https://geti2p.net/en/download#mac"
linux="https://geti2p.net/en/download#unix"
freebsd="https://www.freshports.org/security/i2p/"
openbsd="http://openports.se/net/i2pd"
netbsd="http://pkgsrc.se/wip/i2pd"
fdroid="https://f-droid.org/app/net.i2p.android.router"
googleplay="https://play.google.com/store/apps/details?id=net.i2p.android"
android="https://download.i2p2.de/android/current/"
source="https://geti2p.net/en/get-involved/guides/new-developers#getting-the-i2p-code"
title="I2P Anonymous Network"
image="/assets/img/svg/3rd-party/i2p.svg"
image-dark="/assets/img/svg/3rd-party/i2p-dark.svg"
description="The Invisible Internet Project (I2P) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous Web surfing, chatting, blogging, and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. The software is free and open-source and is published under multiple licenses."
website="https://geti2p.net/"
forum="https://forum.privacytools.io/t/discussion-i2p/1590"
i2p="http://i2p-projekt.i2p/"
windows="https://geti2p.net/en/download#windows"
mac="https://geti2p.net/en/download#mac"
linux="https://geti2p.net/en/download#unix"
freebsd="https://www.freshports.org/security/i2p/"
openbsd="http://openports.se/net/i2pd"
netbsd="http://pkgsrc.se/wip/i2pd"
fdroid="https://f-droid.org/app/net.i2p.android.router"
googleplay="https://play.google.com/store/apps/details?id=net.i2p.android"
android="https://download.i2p2.de/android/current/"
source="https://geti2p.net/en/get-involved/guides/new-developers#getting-the-i2p-code"
%}
{% include cardv2.html
title="The Freenet Project"
image="/assets/img/svg/3rd-party/freenet.svg"
description="Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools were originally designed by Ian Clarke, who defined Freenet's goal as providing freedom of speech on the Internet with strong anonymity protection."
website="https://freenetproject.org/"
forum="https://forum.privacytools.io/t/discussion-freenet/1591"
windows="https://freenetproject.org/pages/download.html#windows"
mac="https://freenetproject.org/pages/download.html#os-x"
linux="https://freenetproject.org/pages/download.html#gnulinux-posix"
freebsd="https://freenetproject.org/pages/download.html#gnulinux-posix"
openbsd="https://freenetproject.org/pages/download.html#gnulinux-posix"
netbsd="https://freenetproject.org/pages/download.html#gnulinux-posix"
github="https://github.com/freenet/"
title="The Freenet Project"
image="/assets/img/svg/3rd-party/freenet.svg"
description="Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools were originally designed by Ian Clarke, who defined Freenet's goal as providing freedom of speech on the Internet with strong anonymity protection."
website="https://freenetproject.org/"
forum="https://forum.privacytools.io/t/discussion-freenet/1591"
windows="https://freenetproject.org/pages/download.html#windows"
mac="https://freenetproject.org/pages/download.html#os-x"
linux="https://freenetproject.org/pages/download.html#gnulinux-posix"
freebsd="https://freenetproject.org/pages/download.html#gnulinux-posix"
openbsd="https://freenetproject.org/pages/download.html#gnulinux-posix"
netbsd="https://freenetproject.org/pages/download.html#gnulinux-posix"
github="https://github.com/freenet/"
%}
<h3>Worth Mentioning</h3>
<ul>
<li><a href="https://zeronet.io/">ZeroNet</a> - Open, free, and uncensorable websites, using Bitcoin cryptography and BitTorrent network. <span class="badge badge-danger" data-toggle="tooltip" title="Your IP address isn't hidden by default and won't be, unless you enforce Tor usage.">privacy warning <span class="far fa-question-circle"></span></span></li>
<li>
<a href="https://zeronet.io/">ZeroNet</a> - Open, free, and uncensorable websites, using Bitcoin cryptography and BitTorrent network.
{% include badge.html
color="danger"
icon="fas fa-exclamation-triangle"
tooltip="Your IP address isn't hidden by default and won't be, unless you enforce Tor usage."
text="Not anonymous"
%}
</li>
<li><a href="https://retroshare.cc/">RetroShare</a> - An open source, cross-platform, friend-to-friend, secure, and decentralized communication platform.</li>
<li><a href="https://i2pbote.xyz/">I2P-Bote</a> - End-to-end encrypted decentralized mail system within the I2P network.</li>
<li><a href="https://gnunet.org/">GNUnet</a> - GNUnet provides a strong foundation of free software for a global, distributed network that provides security and privacy.</li>
<li><a href="https://ipfs.io/">IPFS</a> <em>and</em> <a href="https://github.com/ipfs-shipyard/ipfs-companion">IPFS Companion</a>- A peer-to-peer hypermedia protocol to make the web faster, safer, and more open. IPFS Companion is a browser extension for redirecting queries to a gateway of your choice (generally local). <a href="https://github.com/privacytools/privacytools.io/pull/361#issuecomment-344414022">
<span class="badge badge-danger" data-toggle="tooltip" title="">
<span class="fas fa-exclamation-triangle"></span>
Important privacy warning
</span>
</a></li>
<li><a href="https://yggdrasil-network.github.io/">Yggdrasil</a> - An early-stage implementation of a fully end-to-end encrypted IPv6 network. It is lightweight, self-arranging, supported on multiple platforms, and allows pretty much any IPv6-capable application to communicate securely with other Yggdrasil nodes. Yggdrasil does not require you to have IPv6 Internet connectivity - it also works over IPv4. <span class="badge badge-warning" data-toggle="tooltip" title="The project is currently in early stages but it is being actively developed.">experimental <i class=\"far fa-question-circle\"></i></span> <span class="badge badge-danger" data-toggle="tooltip" title="Yggdrasil doesn't have a goal of providing anonymity and your peers know your IP address unless you are only using Tor/I2P peers.">privacy warning <i class="far fa-question-circle"></i></span></li>
<li>
<a href="https://ipfs.io/">IPFS</a> <em>and</em> <a href="https://github.com/ipfs-shipyard/ipfs-companion">IPFS Companion</a>- A peer-to-peer hypermedia protocol to make the web faster, safer, and more open. IPFS Companion is a browser extension for redirecting queries to a gateway of your choice (generally local).
{% include badge.html
color="warning"
icon="fas fa-exclamation-triangle"
link="https://github.com/privacytools/privacytools.io/pull/361#issuecomment-344414022"
text="Supercookie warning"
%}
</li>
<li>
<a href="https://yggdrasil-network.github.io/">Yggdrasil</a>
- An early-stage implementation of a fully end-to-end encrypted IPv6 network. It is lightweight, self-arranging, supported on multiple platforms, and allows pretty much any IPv6-capable application to communicate securely with other Yggdrasil nodes. Yggdrasil does not require you to have IPv6 Internet connectivity - it also works over IPv4.
{% include badge.html
color="warning"
icon="far fa-question-circle"
tooltip="The project is currently in early stages but it is being actively developed."
text="Experimental"
%}
{% include badge.html
color="danger"
icon="fas fa-exclamation-triangle"
link=""
tooltip="Yggdrasil doesn't provide anonymity by default. Your peers know your IP address unless you configure it to only use Tor/I2P peers."
text="Not anonymous by default"
%}
</li>
</ul>

View File

@ -5,74 +5,74 @@
</div>
{% include cardv2.html
title="Mastodon - Twitter Alternative"
image="/assets/img/svg/3rd-party/mastodon.svg"
description='Mastodon is a social network based on open web protocols and free, open-source software. It is decentralized like email, users can exist on different servers or even different platforms but still communicate with each other. It also has the most users, and the most diverse (in terms of interests) users, it looks good, and it is easy to setup yourself. If you are looking for a server to join, you are welcome to join our hosted instance: <a href="https://social.privacytools.io/">social.privacytools.io</a>'
website="https://joinmastodon.org/"
forum="https://forum.privacytools.io/t/discussion-mastodon/289"
github="https://github.com/tootsuite/mastodon"
windows="https://joinmastodon.org/apps"
mac="https://joinmastodon.org/apps"
linux="https://joinmastodon.org/apps"
freebsd="https://joinmastodon.org/apps"
openbsd="https://joinmastodon.org/apps"
netbsd="https://joinmastodon.org/apps"
android="https://joinmastodon.org/apps"
sailfish="https://joinmastodon.org/apps"
ios="https://joinmastodon.org/apps"
web="https://joinmastodon.org/#getting-started"
title="Mastodon - Twitter Alternative"
image="/assets/img/svg/3rd-party/mastodon.svg"
description='Mastodon is a social network based on open web protocols and free, open-source software. It is decentralized like email, users can exist on different servers or even different platforms but still communicate with each other. It also has the most users, and the most diverse (in terms of interests) users, it looks good, and it is easy to setup yourself. If you are looking for a server to join, you are welcome to join our hosted instance: <a href="https://social.privacytools.io/">social.privacytools.io</a>'
website="https://joinmastodon.org/"
forum="https://forum.privacytools.io/t/discussion-mastodon/289"
github="https://github.com/tootsuite/mastodon"
windows="https://joinmastodon.org/apps"
mac="https://joinmastodon.org/apps"
linux="https://joinmastodon.org/apps"
freebsd="https://joinmastodon.org/apps"
openbsd="https://joinmastodon.org/apps"
netbsd="https://joinmastodon.org/apps"
android="https://joinmastodon.org/apps"
sailfish="https://joinmastodon.org/apps"
ios="https://joinmastodon.org/apps"
web="https://joinmastodon.org/#getting-started"
%}
{% include cardv2.html
title="diaspora* - Google+ Alternative"
image="/assets/img/svg/3rd-party/diaspora.svg"
description="diaspora* is based on three key philosophies: Decentralization, Freedom, and Privacy. It is intended to address privacy concerns related to centralized social networks by allowing users set up their own server (or \"pod\") to host content. Pods can then interact to share status updates, photographs, and other social data."
website="https://diasporafoundation.org/"
forum="https://forum.privacytools.io/t/discussion-diaspora/290"
github="https://github.com/diaspora/diaspora"
android="https://wiki.diasporafoundation.org/Tools_to_use_with_Diaspora#Android"
web="https://diasporafoundation.org/"
title="diaspora* - Google+ Alternative"
image="/assets/img/svg/3rd-party/diaspora.svg"
description="diaspora* is based on three key philosophies: Decentralization, Freedom, and Privacy. It is intended to address privacy concerns related to centralized social networks by allowing users set up their own server (or \"pod\") to host content. Pods can then interact to share status updates, photographs, and other social data."
website="https://diasporafoundation.org/"
forum="https://forum.privacytools.io/t/discussion-diaspora/290"
github="https://github.com/diaspora/diaspora"
android="https://wiki.diasporafoundation.org/Tools_to_use_with_Diaspora#Android"
web="https://diasporafoundation.org/"
%}
{% include cardv2.html
title="Friendica - Facebook Alternative"
image="/assets/img/svg/3rd-party/friendica.svg"
description="Friendica has an emphasis on extensive privacy settings and easy server installation. It aims to federate with as many other social networks as possible. Currently, Friendica users can integrate contacts from Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io and other services in their social streams."
website="https://friendi.ca/"
forum="https://forum.privacytools.io/t/discussion-friendica/291"
github="https://github.com/friendica/friendica"
windows="https://friendi.ca/resources/mobile-clients/"
linux="https://friendi.ca/resources/mobile-clients/"
android="https://friendi.ca/resources/mobile-clients/"
sailfish="https://friendi.ca/resources/mobile-clients/"
web="https://friendi.ca/"
title="Friendica - Facebook Alternative"
image="/assets/img/svg/3rd-party/friendica.svg"
description="Friendica has an emphasis on extensive privacy settings and easy server installation. It aims to federate with as many other social networks as possible. Currently, Friendica users can integrate contacts from Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io and other services in their social streams."
website="https://friendi.ca/"
forum="https://forum.privacytools.io/t/discussion-friendica/291"
github="https://github.com/friendica/friendica"
windows="https://friendi.ca/resources/mobile-clients/"
linux="https://friendi.ca/resources/mobile-clients/"
android="https://friendi.ca/resources/mobile-clients/"
sailfish="https://friendi.ca/resources/mobile-clients/"
web="https://friendi.ca/"
%}
{% include cardv2.html
title="PixelFed - Instagram Alternative"
image="/assets/img/svg/3rd-party/pixelfed.svg"
description='PixelFed is a free and ethical photo sharing platform, powered by ActivityPub federation. Pixelfed is an open-source, federated platform. You can run your own instance or <a href="https://fediverse.party/en/pixelfed/">join an existing one.</a>'
website="https://pixelfed.org/"
forum="https://forum.privacytools.io/t/discussion-pixelfed/293"
github="https://github.com/pixelfed"
web="https://pixelfed.org/"
title="PixelFed - Instagram Alternative"
image="/assets/img/svg/3rd-party/pixelfed.svg"
description='PixelFed is a free and ethical photo sharing platform, powered by ActivityPub federation. Pixelfed is an open-source, federated platform. You can run your own instance or <a href="https://fediverse.party/en/pixelfed/">join an existing one.</a>'
website="https://pixelfed.org/"
forum="https://forum.privacytools.io/t/discussion-pixelfed/293"
github="https://github.com/pixelfed"
web="https://pixelfed.org/"
%}
{% include cardv2.html
title="Pleroma - Twitter Alternative"
image="/assets/img/svg/3rd-party/pleroma.svg"
description="Pleroma is a free, federated social networking server built on open protocols. It is compatible with Mastodon and many other ActivityPub and OStatus implementations."
website="https://pleroma.social"
forum="https://forum.privacytools.io/t/discussion-pleroma/2307"
gitlab="https://git.pleroma.social/pleroma/pleroma/"
windows="https://docs-develop.pleroma.social/backend/clients/#desktop"
mac="https://docs-develop.pleroma.social/backend/clients/#desktop"
linux="https://docs-develop.pleroma.social/backend/clients/#desktop"
android="https://docs-develop.pleroma.social/backend/clients/#handheld"
fdroid="https://docs-develop.pleroma.social/backend/clients/#handheld"
googleplay="https://docs-develop.pleroma.social/backend/clients/#handheld"
ios="https://docs-develop.pleroma.social/backend/clients/#handheld"
web="https://docs-develop.pleroma.social/backend/clients/#alternative-web-interfaces"
title="Pleroma - Twitter Alternative"
image="/assets/img/svg/3rd-party/pleroma.svg"
description="Pleroma is a free, federated social networking server built on open protocols. It is compatible with Mastodon and many other ActivityPub and OStatus implementations."
website="https://pleroma.social"
forum="https://forum.privacytools.io/t/discussion-pleroma/2307"
gitlab="https://git.pleroma.social/pleroma/pleroma/"
windows="https://docs-develop.pleroma.social/backend/clients/#desktop"
mac="https://docs-develop.pleroma.social/backend/clients/#desktop"
linux="https://docs-develop.pleroma.social/backend/clients/#desktop"
android="https://docs-develop.pleroma.social/backend/clients/#handheld"
fdroid="https://docs-develop.pleroma.social/backend/clients/#handheld"
googleplay="https://docs-develop.pleroma.social/backend/clients/#handheld"
ios="https://docs-develop.pleroma.social/backend/clients/#handheld"
web="https://docs-develop.pleroma.social/backend/clients/#alternative-web-interfaces"
%}
<h3>Worth Mentioning</h3>

View File

@ -19,30 +19,30 @@
<div class="col">
<h2 id="mullvad" class="anchor">
<a href="#mullvad"><i class="fas fa-link anchor-icon"></i></a> Mullvad
<span class="badge badge-info">EUR €60/y</span>
{% include badge.html color="info" text="EUR €60/y" %}
</h2>
<p><strong><a href="https://mullvad.net/">Mullvad.net</a> </strong> is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since <strong>2009</strong>. Mullvad is based in <span class="flag-icon flag-icon-se"></span> Sweden and does not have a free trial.</p>
<h5><span class="badge badge-success">35 Countries</span></h5>
<h5>{% include badge.html color="success" text="35 Countries" %}</h5>
<p>Mullvad has <a href="https://mullvad.net/en/servers/">servers in 35 countries</a> at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.</p>
<p>We also think it's better for the security of the VPN provider's private keys if they use <a href="https://en.wikipedia.org/wiki/Dedicated_hosting_service">dedicated servers</a>, instead of cheaper shared solutions (with other customers) such as <a href="https://en.wikipedia.org/wiki/Virtual_private_server">virtual private servers</a>.</p>
<h5><span class="badge badge-success">Independently Audited</span></h5>
<h5>{% include badge.html color="success" text="Independently Audited" %}</h5>
<p>Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest report <a href="https://cure53.de/pentest-report_mullvad_v2.pdf">published at cure53.de</a>. The security researchers concluded:</p>
<blockquote class="blockquote">
<p class="mb-0">...Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint.</p>
</blockquote>
<h5><span class="badge badge-success">Open Source Clients</span></h5>
<h5>{% include badge.html color="success" text="Open Source Clients" %}</h5>
<p>Mullvad provides the source code for their desktop and mobile clients in their <a href="https://github.com/mullvad/mullvadvpn-app">GitHub organization</a>.</p>
<h5><span class="badge badge-success">Accepts Bitcoin</span></h5>
<h5>{% include badge.html color="success" text="Accepts Bitcoin" %}</h5>
<p>Mullvad in addition to accepting credit/debit cards and PayPal, accepts <strong>Bitcoin</strong>, <strong>Bitcoin Cash</strong>, and <strong>cash/local currency</strong> as anonymous forms of payment. They also accept Swish and bank wire transfers.</p>
<h5><span class="badge badge-success">WireGuard Support</span></h5>
<h5>{% include badge.html color="success" text="WireGuard Support" %}</h5>
<p>In addition to standard OpenVPN connections, Mullvad supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.</p>
<h5><span class="badge badge-success">IPv6 Support</span></h5>
<h5>{% include badge.html color="success" text="IPv6 Support" %}</h5>
<p>Mullvad supports the future of networking <a href="https://en.wikipedia.org/wiki/IPv6">IPv6</a>. Their network allows users to <a href="https://mullvad.net/en/blog/2014/9/15/ipv6-support/">access services hosted on IPv6</a> as opposed to other providers who block IPv6 connections.</p>
<h5><span class="badge badge-success">Remote Port Forwarding</span></h5>
<h5>{% include badge.html color="success" text="Remote Port Forwarding" %}</h5>
<p>Remote <a href="https://en.wikipedia.org/wiki/Port_forwarding">port forwarding</a> is allowed on Mullvad, see <a href="https://mullvad.net/help/port-forwarding-and-mullvad/">Port forwarding with Mullvad VPN</a>.</p>
<h5><span class="badge badge-success">Mobile Clients</span></h5>
<h5>{% include badge.html color="success" text="Mobile Clients" %}</h5>
<p>Mullvad has published <a href ="https://apps.apple.com/app/mullvad-vpn/id1488466513">App Store</a> and <a href="https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn">Google Play</a> clients, both supporting an easy-to use interface as opposed to requiring users to manual configure their WireGuard connections.</p>
<h5><span class="badge badge-info">Extra Functionality</span></h5>
<h5>{% include badge.html color="info" text="Extra Functionality" %}</h5>
<p>The Mullvad VPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. The Mullvad website is also accessible via Tor at <a href="http://xcln5hkbriyklr6n.onion/">xcln5hkbriyklr6n.onion</a>.</p>
</div>
</div>
@ -53,25 +53,25 @@
<div class="col">
<h2 id="protonvpn" class="anchor">
<a href="#protonvpn"><i class="fas fa-link anchor-icon"></i></a> ProtonVPN
<span class="badge badge-info">Free</span>
<span class="badge badge-info">Basic USD $48/y</span>
<span class="badge badge-secondary">Plus USD $96/y</span>
{% include badge.html color="info" text="Free" %}
{% include badge.html color="info" text="Basic USD $48/y" %}
{% include badge.html color="secondary" text="Plus USD $96/y" %}
</h2>
<p><strong><a href="https://protonvpn.com/">ProtonVPN.com</a></strong> is a strong contender in the VPN space, and they have been in operation since <strong>2016</strong>. ProtonVPN is based in <span class="flag-icon flag-icon-ch"></span> Switzerland and offers a limited free pricing tier, as well as premium options. They offer a further 14% discount for buying a 2 year subscription.</p>
<h5><span class="badge badge-success">44 Countries</span></h5>
<h5>{% include badge.html color="success" text="44 Countries" %}</h5>
<p>ProtonVPN has <a href="https://protonvpn.com/vpn-servers">servers in 44 countries</a> at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.</p>
<p>We also think it's better for the security of the VPN provider's private keys if they use <a href="https://en.wikipedia.org/wiki/Dedicated_hosting_service">dedicated servers</a>, instead of cheaper shared solutions (with other customers) such as <a href="https://en.wikipedia.org/wiki/Virtual_private_server">virtual private servers</a>.</p>
<h5><span class="badge badge-success">Independently Audited</span></h5>
<h5>{% include badge.html color="success" text="Independently Audited" %}</h5>
<p>As of January 2020 ProtonVPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in ProtonVPN's Windows, Android, and iOS applications, all of which were "properly fixed" by ProtonVPN before the reports were published. None of the issues identified would have provided an attacker remote access to a user's device or traffic. You can view individual reports for each platform at <a href="https://protonvpn.com/blog/open-source/">protonvpn.com</a>.
<h5><span class="badge badge-success">Open Source Clients</span></h5>
<h5>{% include badge.html color="success" text="Open Source Clients" %}</h5>
<p>ProtonVPN provides the source code for their desktop and mobile clients in their <a href="https://github.com/ProtonVPN">GitHub organization</a>.</p>
<h5><span class="badge badge-success">Accepts Bitcoin</span></h5>
<h5>{% include badge.html color="success" text="Accepts Bitcoin" %}</h5>
<p>ProtonVPN does technically accept Bitcoin payments; however, you either need to have an existing account, or contact their support team in advance to register with Bitcoin.</p>
<h5><span class="badge badge-success">Mobile Clients</span></h5>
<h5>{% include badge.html color="success" text="Mobile Clients" %}</h5>
<p>In addition to providing standard OpenVPN configuration files, ProtonVPN has mobile clients for <a href="https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085">App Store</a> and <a href="https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US">Google Play</a> allowing for easy connections to their servers. The mobile client on Android is also available in <a href="https://f-droid.org/en/packages/ch.protonvpn.android">F-Droid</a>, which ensures that it is compiled with <a href="https://www.f-droid.org/en/2019/05/05/trust-privacy-and-free-software.html">reproducable builds</a>.</p>
<h5><span class="badge badge-warning">No Port Forwarding</span></h5>
<h5>{% include badge.html color="warning" text="No Port Forwarding" %}</h5>
<p>ProtonVPN does not currently support remote port forwarding, which may impact some applications. Especially Peer-to-Peer applications like Torrent clients.</p>
<h5><span class="badge badge-info">Extra Functionality</span></h5>
<h5>{% include badge.html color="info" text="Extra Functionality" %}</h5>
<p>The ProtonVPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. ProtonVPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using <a href="https://www.torproject.org/">the official Tor Browser</a> for this purpose.</p>
</div>
</div>
@ -82,26 +82,26 @@
<div class="col">
<h2 id="ivpn" class="anchor">
<a href="#ivpn"><i class="fas fa-link anchor-icon"></i></a> IVPN
<span class="badge badge-info">Standard USD $60/y</span>
<span class="badge badge-secondary">Pro USD $100/y</span>
{% include badge.html color="info" text="Standard USD $60/y" %}
{% include badge.html color="secondary" text="Pro USD $100/y" %}
</h2>
<p><strong><a href="https://www.ivpn.net">IVPN.net</a></strong> is another premium VPN provider, and they have been in operation since <strong>2009</strong>. IVPN is based in <span class="flag-icon flag-icon-gi"></span> Gibraltar and offers a 3 day free trial.</p>
<h5><span class="badge badge-success">32 Countries</span></h5>
<h5>{% include badge.html color="success" text="32 Countries" %}</h5>
<p>IVPN has <a href="https://www.ivpn.net/server-locations">servers in 32 countries</a> at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.</p>
<p>We also think it's better for the security of the VPN provider's private keys if they use <a href="https://en.wikipedia.org/wiki/Dedicated_hosting_service">dedicated servers</a>, instead of cheaper shared solutions (with other customers) such as <a href="https://en.wikipedia.org/wiki/Virtual_private_server">virtual private servers</a>.</p>
<h5><span class="badge badge-success">Independently Audited</span></h5>
<h5>{% include badge.html color="success" text="Independently Audited" %}</h5>
<p>IVPN has undergone a <a href="https://cure53.de/audit-report_ivpn.pdf">no-logging audit from Cure53</a> which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a <a href="https://cure53.de/summary-report_ivpn_2019.pdf">comprehensive pentest report Cure53</a> in January 2020. IVPN has also said they plan to have <a href="https://www.ivpn.net/blog/independent-security-audit-concluded">annual reports</a> in the future.</p>
<h5><span class="badge badge-success">Open Source Clients</span></h5>
<h5>{% include badge.html color="success" text="Open Source Clients" %}</h5>
<p>As of Feburary 2020 <a href="https://www.ivpn.net/blog/ivpn-applications-are-now-open-source">IVPN applications are now open source</a>. Source code can be obtained from their <a href="https://github.com/ivpn">GitHub organization</a>.</p>
<h5><span class="badge badge-success">Accepts Bitcoin</span></h5>
<h5>{% include badge.html color="success" text="Accepts Bitcoin" %}</h5>
<p>In addition to accepting credit/debit cards and PayPal, IVPN accepts <strong>Bitcoin</strong> and <strong>cash/local currency</strong> (on annual plans) as anonymous forms of payment.</p>
<h5><span class="badge badge-success">WireGuard Support</span></h5>
<h5>{% include badge.html color="success" text="WireGuard Support" %}</h5>
<p>In addition to standard OpenVPN connections, IVPN supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.</p>
<h5><span class="badge badge-success">Remote Port Forwarding</span></h5>
<h5>{% include badge.html color="success" text="Remote Port Forwarding" %}</h5>
<p>Remote <a href="https://en.wikipedia.org/wiki/Port_forwarding">port forwarding</a> is possible with a Pro plan. Port forwarding <a href="https://www.ivpn.net/knowledgebase/81/How-do-I-activate-port-forwarding.html">can be activated</a> via the client area. Port forwarding is only available on IVPN when <a href="https://www.ivpn.net/knowledgebase/116/Port-forwarding-is-not-working-why.html">using OpenVPN and is disabled on US servers</a>.</p>
<h5><span class="badge badge-success">Mobile Clients</span></h5>
<h5>{% include badge.html color="success" text="Mobile Clients" %}</h5>
<p>In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for <a href="https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683">App Store</a> and <a href="https://play.google.com/store/apps/details?id=net.ivpn.client">Google Play</a> allowing for easy connections to their servers. The mobile client on Android is also available in <a href="https://f-droid.org/en/packages/net.ivpn.client">F-Droid</a>, which ensures that it is compiled with <a href="https://www.f-droid.org/en/2019/05/05/trust-privacy-and-free-software.html">reproducable builds</a>.</p>
<h5><span class="badge badge-info">Extra Functionality</span></h5>
<h5>{% include badge.html color="info" text="Extra Functionality" %}</h5>
<p>The IVPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. IVPN also provides "<a href="https://www.ivpn.net/antitracker">AntiTracker</a>" functionality, which blocks advertising networks and trackers from the network level.</p>
</div>
</div>

View File

@ -17,7 +17,7 @@ description: "Find a secure email provider that will keep your privacy in mind.
<div class="container">
<div class="row">
<div class="col-12">
<h3><span class="badge badge-info">Jurisdiction</span></h3>
<h3>{% include badge.html color="info" text="Jurisdiction" %}</h3>
<p>Operating outside the five/nine/fourteen-eyes countries is not necessarily a guarantee of privacy, and there are other factors to consider. However, we believe that avoiding these countries is important if you wish to avoid mass government dragnet surveillance, especially from the United States. Read our page on <a href="/providers/#ukusa">global mass surveillance and avoiding the US and UK</a> to learn more about why we feel this is important.</p>
</div>
<div class="col-md-6">
@ -35,7 +35,7 @@ description: "Find a secure email provider that will keep your privacy in mind.
</div>
<div class="col-12">
<h3><span class="badge badge-info">Technology</span></h3>
<h3>{% include badge.html color="info" text="Technology" %}</h3>
<p>We regard these features as important in order to provide a safe and optimal service to users. Users should consider the provider which has the features they require.</p>
</div>
<div class="col-md-6">
@ -60,7 +60,7 @@ description: "Find a secure email provider that will keep your privacy in mind.
</div>
<div class="col-12">
<h3><span class="badge badge-info">Privacy</span></h3>
<h3>{% include badge.html color="info" text="Privacy" %}</h3>
<p>We prefer our recommended providers to collect as little data as possible.</p>
</div>
<div class="col-md-6">
@ -79,7 +79,7 @@ description: "Find a secure email provider that will keep your privacy in mind.
</div>
<div class="col-12">
<h3><span class="badge badge-info">Security</span></h3>
<h3>{% include badge.html color="info" text="Security" %}</h3>
<p>Email servers deal with a lot of very sensitive data. We expect that providers will adopt best industry practices in order to protect their users.</p>
</div>
<div class="col-md-6">
@ -118,7 +118,7 @@ description: "Find a secure email provider that will keep your privacy in mind.
</div>
<div class="col-12">
<h3><span class="badge badge-info">Trust</span></h3>
<h3>{% include badge.html color="info" text="Trust" %}</h3>
<p>You wouldn't trust your finances to someone with a fake identity, so why trust them with your email? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.</p>
</div>
<div class="col-md-6">
@ -136,7 +136,7 @@ description: "Find a secure email provider that will keep your privacy in mind.
</div>
<div class="col-12">
<h3><span class="badge badge-info">Marketing</span></h3>
<h3>{% include badge.html color="info" text="Marketing" %}</h3>
<p>With the email providers we recommend we like to see responsible marketing.</p>
</div>
<div class="col-md-6">
@ -162,7 +162,7 @@ description: "Find a secure email provider that will keep your privacy in mind.
</div>
<div class="col-12">
<h3><span class="badge badge-info">Additional Functionality</span></h3>
<h3>{% include badge.html color="info" text="Additional Functionality" %}</h3>
<p>While not strictly requirements, there are some factors we looked into when determining which providers to recommend.</p>
</div>
</div>

View File

@ -29,7 +29,7 @@ breadcrumb: "VPN"
<div class="container">
<div class="row">
<div class="col-12">
<h3><span class="badge badge-info">Jurisdiction</span></h3>
<h3>{% include badge.html color="info" text="Jurisdiction" %}</h3>
<p>Operating outside the five/nine/fourteen-eyes countries is not a guarantee of privacy necessarily, and there are other factors to consider. However, we believe that avoiding these countries is important if you wish to avoid mass government dragnet surveillance, especially from the United States. Read our page on <a href="/providers/#ukusa">global mass surveillance and avoiding the US and UK</a> to learn more about why we feel this is important.</p>
</div>
<div class="col-md-6">
@ -47,7 +47,7 @@ breadcrumb: "VPN"
</div>
<div class="col-12">
<h3><span class="badge badge-info">Technology</span></h3>
<h3>{% include badge.html color="info" text="Technology" %}</h3>
<p>We require all our recommended VPN providers to provide OpenVPN configuration files to be used in any client. <strong>If</strong> a VPN provides their own custom client, we require a killswitch to block network data leaks when disconnected.</p>
</div>
<div class="col-md-6">
@ -70,7 +70,7 @@ breadcrumb: "VPN"
</div>
<div class="col-12">
<h3><span class="badge badge-info">Privacy</span></h3>
<h3>{% include badge.html color="info" text="Privacy" %}</h3>
<p>We prefer our recommended providers to collect as little data as possible. Not collecting personal information on registration, and accepting anonymous forms of payment are required.</p>
</div>
<div class="col-md-6">
@ -89,7 +89,7 @@ breadcrumb: "VPN"
</div>
<div class="col-12">
<h3><span class="badge badge-info">Security</span></h3>
<h3>{% include badge.html color="info" text="Security" %}</h3>
<p>A VPN is pointless if it can't even provide adequate security. We require all our recommended providers to abide by current security standards for their OpenVPN connections. Ideally, they would use more future-proof encryption schemes by default. We also require an independent third-party to audit the provider's security, ideally in a very comprehensive manner and on a repeated (yearly) basis.</p>
</div>
<div class="col-md-6">
@ -111,7 +111,7 @@ breadcrumb: "VPN"
</div>
<div class="col-12">
<h3><span class="badge badge-info">Trust</span></h3>
<h3>{% include badge.html color="info" text="Trust" %}</h3>
<p>You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data? We require our recommended providers to be public about their ownership or leadership. We also would like to see frequent transparency reports, especially in regard to how government requests are handled.</p>
</div>
<div class="col-md-6">
@ -129,7 +129,7 @@ breadcrumb: "VPN"
</div>
<div class="col-12">
<h3><span class="badge badge-info">Marketing</span></h3>
<h3>{% include badge.html color="info" text="Marketing" %}</h3>
<p>With the VPN providers we recommend we like to see responsible marketing.</p>
</div>
<div class="col-md-6">
@ -159,7 +159,7 @@ breadcrumb: "VPN"
</div>
<div class="col-12">
<h3><span class="badge badge-info">Additional Functionality</span></h3>
<h3>{% include badge.html color="info" text="Additional Functionality" %}</h3>
<p>While not strictly requirements, there are some factors we looked into when determining which providers to recommend. These include adblocking/tracker-blocking functionality, warrant canaries, multihop connections, excellent customer support, the number of allowed simultaneous connections, etc.</p>
</div>
</div>
@ -230,21 +230,33 @@ breadcrumb: "VPN"
<li><a href="https://gist.github.com/kennwhite/1f3bc4d889b02b35d8aa">Don't use LT2P IPSec, use other protocols.</a></li>
<li>
<a href="https://www.top10vpn.com/free-vpn-app-investigation/">Free VPN App Investigation</a>
<span class="badge badge-warning" data-toggle="tooltip" title="This site has affiliate based recommendations">
<a href="https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews"/>Warning</a>
</span>
{% include badge.html
color="warning"
icon="fas fa-exclamation-triangle"
link="https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews"
tooltip="This site has affiliate based recommendations. They get paid for referring visitors to specific VPN providers."
text="Affiliate program"
%}
</li>
<li>
<a href="https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/">Hidden VPN owners unveiled: 101 VPN products run by just 23 companies</a>
<span class="badge badge-warning" data-toggle="tooltip" title="This site has affiliate based recommendations">
<a href="https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews"/>Warning</a>
</span>
{% include badge.html
color="warning"
icon="fas fa-exclamation-triangle"
link="https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews"
tooltip="This site has affiliate based recommendations. They get paid for referring visitors to specific VPN providers."
text="Affiliate program"
%}
</li>
<li>
<a href="https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/">This Chinese company is secretly behind 24 popular apps seeking dangerous permissions</a>
<span class="badge badge-warning" data-toggle="tooltip" title="This site has affiliate based recommendations">
<a href="https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews"/>Warning</a>
</span>
{% include badge.html
color="warning"
icon="fas fa-exclamation-triangle"
link="https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews"
tooltip="This site has affiliate based recommendations. They get paid for referring visitors to specific VPN providers."
text="Affiliate program"
%}
</li>
</ul>