mirror of
https://github.com/privacyguides/privacyguides.org
synced 2024-11-10 05:03:34 +01:00
General site-wide consistency updates (#1085)
Co-Authored-By: Daniel Gray <dng@disroot.org>
This commit is contained in:
parent
ba59882e94
commit
c8bd1533d8
@ -327,7 +327,7 @@ To mitigate these problems, we recommend [Droid-ify](https://github.com/Iamlooke
|
||||
Unlike the official F-Droid client, Droid-ify supports seamless updates on Android 12 and above without the need for a privileged extension. If your Android distribution is on Android 12 or above and does not include the [F-Droid privileged extension](https://f-droid.org/en/packages/org.fdroid.fdroid.privileged/), it is highly recommended that you use Droid-ify instead of the official client.
|
||||
|
||||
??? downloads
|
||||
|
||||
|
||||
- [:fontawesome-brands-android: APK Download](https://android.izzysoft.de/repo/apk/com.looker.droidify)
|
||||
- [:fontawesome-brands-github: GitHub](https://github.com/Iamlooker/Droid-ify)
|
||||
|
||||
|
@ -56,44 +56,37 @@ These are our current web browser recommendations and settings. We recommend kee
|
||||
|
||||
#### Recommended Configuration
|
||||
|
||||
These options can be found in the *Privacy & Security* settings page ( :material-menu: → Settings → Privacy & Security).
|
||||
These options can be found in the *Privacy & Security* settings page ( :material-menu: → **Settings** → **Privacy & Security**).
|
||||
|
||||
**Enhanced Tracking Protection (ETP):**
|
||||
##### Enhanced Tracking Protection (ETP)
|
||||
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: "Strict"</li>
|
||||
</ul>
|
||||
- Select **Strict**
|
||||
|
||||
**Sanitize on Close:**
|
||||
##### Sanitize on Close
|
||||
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: "Delete cookies and site data when Firefox is closed"</li>
|
||||
</ul>
|
||||
You can still stay logged into websites by allowing exceptions.
|
||||
- Select **Delete cookies and site data when Firefox is closed**
|
||||
|
||||
**Disable Search Suggestions:**
|
||||
!!! note
|
||||
You can still stay logged into websites by allowing exceptions (**Cookies and Site Data** → **Manage Exceptions...**)
|
||||
|
||||
*These features may not be available depending on your region.*
|
||||
##### Disable Search Suggestions
|
||||
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Toggle off: "Suggestions from the web"</li>
|
||||
<li>Toggle off: "Suggestions from sponsors"</li>
|
||||
<li>Toggle off: "Improve the Firefox Suggest experience"</li>
|
||||
</ul>
|
||||
- Clear **Suggestions from the web**
|
||||
- Clear **Suggestions from sponsors**
|
||||
- Clear **Improve the Firefox Suggest experience**
|
||||
|
||||
**Disable Telemetry:**
|
||||
!!! note
|
||||
Search suggestion features may not be available in your region.
|
||||
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Uncheck: "Allow Firefox to send technical and interaction data to Mozilla"</li>
|
||||
<li>Uncheck: "Allow Firefox to install and run studies"</li>
|
||||
<li>Uncheck: "Allow Firefox to send backlogged crash reports on your behalf"</li>
|
||||
</ul>
|
||||
##### Disable Telemetry
|
||||
|
||||
**HTTPS-Only Mode:**
|
||||
- Clear **Allow Firefox to send technical and interaction data to Mozilla**
|
||||
- Clear **Allow Firefox to install and run studies**
|
||||
- Clear **Allow Firefox to send backlogged crash reports on your behalf**
|
||||
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: "Enable HTTPS-Only Mode in all windows".</li>
|
||||
</ul>
|
||||
##### HTTPS-Only Mode
|
||||
|
||||
- Select **Enable HTTPS-Only Mode in all windows**
|
||||
|
||||
#### Sync
|
||||
|
||||
@ -128,21 +121,19 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple.
|
||||
- [:fontawesome-brands-android: Android](https://www.bromite.org/fdroid)
|
||||
- [:fontawesome-brands-github: Source](https://github.com/bromite/bromite)
|
||||
|
||||
These options can be found in *Privacy and Security* ( :material-menu: → :gear: Settings → Privacy and Security).
|
||||
These options can be found in *Privacy and Security* ( :material-menu: → :gear: **Settings** → **Privacy and Security**).
|
||||
|
||||
**HTTPS-Only Mode:**
|
||||
#### Recommended Configuration
|
||||
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: Always use secure connections.</li>
|
||||
</ul>
|
||||
##### HTTPS-Only Mode
|
||||
|
||||
**Always-on Incognito Mode:**
|
||||
- Select **Always use secure connections**
|
||||
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: "Open links in incognito tabs always"</li>
|
||||
<li>Select: "Close all open tabs on exit"</li>
|
||||
<li>Select: "Open external links in incognito"</li>
|
||||
</ul>
|
||||
##### Always-on Incognito Mode
|
||||
|
||||
- Select **Open links in incognito tabs always**
|
||||
- Select **Close all open tabs on exit**
|
||||
- Select **Open external links in incognito**
|
||||
|
||||
### Safari
|
||||
|
||||
@ -156,47 +147,43 @@ These options can be found in *Privacy and Security* ( :material-menu: → :gear
|
||||
|
||||
#### Recommended Configuration
|
||||
|
||||
These options can be found in *Privacy and Security* (:gear: Settings → Safari → Privacy and Security).
|
||||
These options can be found in *Privacy and Security* ( :gear: **Settings** → **Safari** → **Privacy and Security**).
|
||||
|
||||
**Cross-Site Tracking Prevention:**
|
||||
##### Cross-Site Tracking Prevention
|
||||
|
||||
Toggling this setting enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp).
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Toggle On: "Prevent Cross-Site Tracking".</li>
|
||||
</ul>
|
||||
Enable WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp).
|
||||
|
||||
**Privacy Report:**
|
||||
- Select **Prevent Cross-Site Tracking** to enable
|
||||
|
||||
##### Privacy Report
|
||||
|
||||
Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time.
|
||||
|
||||
Privacy Report is accessible through the "**Aa**" icon in the URL bar.
|
||||
|
||||
**Privacy Preserving Ad Measurement:**
|
||||
##### Privacy Preserving Ad Measurement
|
||||
|
||||
This is WebKit's own [implementation](https://webkit.org/blog/8943/privacy-preserving-ad-click-attribution-for-the-web/) of privacy preserving ad click attribution. If you do not wish to participate, you can disable this feature.
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Toggle Off: "Privacy Preserving Ad Measurement".</li>
|
||||
</ul>
|
||||
|
||||
**Apple Pay:**
|
||||
- Select **Privacy Preserving Ad Measurement**
|
||||
|
||||
##### Apple Pay
|
||||
|
||||
If you do not use Apple Pay, you can toggle off the ability for websites to check for it.
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Toggle Off: "Check for Apple Pay".</li>
|
||||
</ul>
|
||||
|
||||
**Always-on Private Browsing:**
|
||||
- Select **Check for Apple Pay**
|
||||
|
||||
##### Always-on Private Browsing
|
||||
|
||||
Open Safari and press the tabs icon in the bottom right corner. Open Tab Groups, located in the bottom middle.
|
||||
<ul style="list-style-type:none;padding-left:0;">
|
||||
<li>Select: "Private".</li>
|
||||
</ul>
|
||||
|
||||
#### iCloud Sync
|
||||
- Select **Private**
|
||||
|
||||
##### iCloud Sync
|
||||
|
||||
While synchronization of Safari History, Tab Groups, and iCloud Tabs uses E2EE, bookmarks sync does [not](https://support.apple.com/en-us/HT202303); they are only encrypted in transit and stored in an encrypted format on Apple's servers. Apple may be able to decrypt and access them.
|
||||
|
||||
If you use iCloud, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in *General* (:gear: Settings → Safari → General → Downloads).
|
||||
If you use iCloud, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in *General* ( :gear: **Settings** → **Safari** → **General** → **Downloads**).
|
||||
|
||||
#### Extensions
|
||||
|
||||
@ -217,14 +204,14 @@ We generally do not recommend installing [any extensions](https://www.sentinelon
|
||||
[Visit github.com](https://github.com/gorhill/uBlock){ .md-button .md-button--primary }
|
||||
|
||||
??? downloads
|
||||
|
||||
|
||||
- [:fontawesome-brands-firefox: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin)
|
||||
- [:fontawesome-brands-chrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm)
|
||||
- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak)
|
||||
- [:fontawesome-brands-opera: Opera](https://addons.opera.com/extensions/details/ublock)
|
||||
- [:fontawesome-brands-github: Source](https://github.com/gorhill/uBlock)
|
||||
|
||||
We also suggest adding the [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt) list and any of the regional lists that might apply to your browsing habits. To add this list, first access settings by clicking on the uBO icon, then the settings icon (:gear:). Go to the bottom of the Filter lists pane and place a checkmark next to Import under the Custom section. Paste the URL of the filter list above into the text area that appears below and click "Apply changes".
|
||||
We also suggest adding the [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt) list and any of the regional lists that might apply to your browsing habits. To add this list, first access settings by clicking on the uBO icon, then the settings icon ( :gear: ). Go to the bottom of the Filter lists pane and place a checkmark next to Import under the Custom section. Paste the URL of the filter list above into the text area that appears below and click "Apply changes".
|
||||
|
||||
Additional filter lists do slow things down and may increase your [attack surface](https://en.wikipedia.org/wiki/Attack_surface), so only apply what you need.
|
||||
|
||||
@ -237,13 +224,13 @@ uBlock Origin also has different [blocking modes](https://github.com/gorhill/uBl
|
||||
![AdGuard logo](assets/img/browsers/adguard.svg){ align=right }
|
||||
|
||||
**AdGuard for Safari** is a free and open-source content-blocking extension for Safari that uses the native [Content Blocker API](https://developer.apple.com/documentation/safariservices/creating_a_content_blocker).
|
||||
|
||||
|
||||
We suggest enabling the filters labled *#recommended* under the "Ad Blocking" and "Privacy" [content blockers](https://kb.adguard.com/en/safari/overview#content-blockers). The *#recommended* filters can also be enabled for the "Social Widgets" and "Annoyances" content blockers, but they may break some social media functions.
|
||||
|
||||
[Visit adguard.com](https://adguard.com/en/adguard-safari/overview.html){ .md-button .md-button--primary } [Privacy Policy](https://adguard.com/en/privacy/safari.html){ .md-button }
|
||||
|
||||
??? downloads
|
||||
|
||||
|
||||
- [:fontawesome-brands-safari: Safari](https://apps.apple.com/app/adguard-for-safari/id1440147259)
|
||||
- [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/app/apple-store/id1047223162)
|
||||
- [:fontawesome-brands-git: Source](https://github.com/AdguardTeam/AdGuardForSafari)
|
||||
@ -254,10 +241,6 @@ There is also [AdGuard for iOS](https://adguard.com/en/adguard-ios/overview.html
|
||||
|
||||
### Terms of Service; Didn't Read
|
||||
|
||||
!!! note
|
||||
|
||||
We do not recommend installing ToS;DR as a browser extension. The same information is provided on their website.
|
||||
|
||||
!!! recommendation
|
||||
|
||||
![Terms of Service; Didn't Read logo](assets/img/browsers/terms_of_service_didnt_read.svg){ align=right }
|
||||
@ -266,4 +249,8 @@ There is also [AdGuard for iOS](https://adguard.com/en/adguard-ios/overview.html
|
||||
|
||||
[Visit tosdr.org](https://tosdr.org){ .md-button .md-button--primary } [Privacy Policy](https://addons.mozilla.org/firefox/addon/terms-of-service-didnt-read/privacy){ .md-button }
|
||||
|
||||
!!! note
|
||||
|
||||
We do not recommend installing ToS;DR as a browser extension. The same information is provided on their website.
|
||||
|
||||
--8<-- "includes/abbreviations.en.md"
|
||||
|
@ -44,7 +44,7 @@ When self hosting Nextcloud, you should also remember to enable E2EE to protect
|
||||
[Visit drive.protonmail.com](https://drive.protonmail.com){ .md-button .md-button--primary } [Privacy Policy](https://protonmail.com/privacy-policy){ .md-button }
|
||||
|
||||
??? downloads
|
||||
|
||||
|
||||
- [:fontawesome-brands-github: Source](https://github.com/ProtonMail/WebClients)
|
||||
|
||||
Proton Drive is currently in beta and only is only available through a web client.
|
||||
@ -68,10 +68,6 @@ When using a web client, you are placing trust in the server to send you proper
|
||||
|
||||
### Tahoe-LAFS
|
||||
|
||||
!!! note
|
||||
|
||||
Due to the complexity of the system and the amount of nodes needed to set it up, Tahoe-LAFS is only recommended for seasoned system administrators.
|
||||
|
||||
!!! recommendation
|
||||
|
||||
![Tahoe-LAFS logo](./assets/img/cloud/tahoe-lafs.svg#only-light){ align=right }
|
||||
@ -89,4 +85,8 @@ When using a web client, you are placing trust in the server to send you proper
|
||||
- [:pg-netbsd: NetBSD](https://pkgsrc.se/filesystems/tahoe-lafs)
|
||||
- [:fontawesome-brands-git: Source](https://www.tahoe-lafs.org/trac/tahoe-lafs/browser)
|
||||
|
||||
!!! note
|
||||
|
||||
Due to the complexity of the system and the amount of nodes needed to set it up, Tahoe-LAFS is only recommended for seasoned system administrators.
|
||||
|
||||
--8<-- "includes/abbreviations.en.md"
|
||||
|
@ -31,10 +31,6 @@ Our recommendation list contains email clients that support both [OpenPGP](encry
|
||||
|
||||
### Apple Mail
|
||||
|
||||
!!! note
|
||||
|
||||
For iOS devices we suggest [Canary Mail](#canary-mail) as it has PGP support which means you can send end-to-end encrypted email.
|
||||
|
||||
!!! recommendation
|
||||
|
||||
![Apple Mail logo](assets/img/email-clients/applemail.png){ align=right }
|
||||
@ -43,6 +39,10 @@ Our recommendation list contains email clients that support both [OpenPGP](encry
|
||||
|
||||
[Visit apple.com](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } [Privacy Policy](https://www.apple.com/legal/privacy/en-ww/){ .md-button }
|
||||
|
||||
!!! note
|
||||
|
||||
For iOS devices we suggest [Canary Mail](#canary-mail) as it has PGP support which means you can send end-to-end encrypted email.
|
||||
|
||||
### GNOME Evolution
|
||||
|
||||
!!! recommendation
|
||||
|
@ -63,10 +63,6 @@ When sharing files, be sure to remove associated metadata. Image files commonly
|
||||
|
||||
### Imagepipe
|
||||
|
||||
!!! info
|
||||
|
||||
Imagepipe is only available from F-Droid and not in Google Play. If you're looking for a paint app in Google Play we suggest [Pocket Paint](https://play.google.com/store/apps/details?id=org.catrobat.paintroid).
|
||||
|
||||
!!! recommendation
|
||||
|
||||
![Imagepipe logo](assets/img/metadata-removal/imagepipe.svg){ align=right }
|
||||
@ -80,12 +76,12 @@ When sharing files, be sure to remove associated metadata. Image files commonly
|
||||
- [:pg-f-droid: F-Droid](https://f-droid.org/en/packages/de.kaffeemitkoffein.imagepipe/)
|
||||
- [:fontawesome-brands-git: Source](https://codeberg.org/Starfish/Imagepipe)
|
||||
|
||||
!!! info
|
||||
|
||||
Imagepipe is only available from F-Droid and not in Google Play. If you're looking for a paint app in Google Play we suggest [Pocket Paint](https://play.google.com/store/apps/details?id=org.catrobat.paintroid).
|
||||
|
||||
### Metapho
|
||||
|
||||
!!! attention
|
||||
|
||||
Metapho is closed source. We recommend it, due to the few choices there are for iOS devices.
|
||||
|
||||
!!! recommendation
|
||||
|
||||
![Metapho logo](assets/img/metadata-removal/metapho.jpg){ align=right }
|
||||
@ -98,6 +94,11 @@ When sharing files, be sure to remove associated metadata. Image files commonly
|
||||
|
||||
- [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/us/app/metapho/id914457352)
|
||||
|
||||
!!! attention
|
||||
|
||||
Metapho is closed source. We recommend it, due to the few choices there are for iOS devices.
|
||||
|
||||
|
||||
## Command-line
|
||||
|
||||
### ExifTool
|
||||
@ -120,10 +121,11 @@ When sharing files, be sure to remove associated metadata. Image files commonly
|
||||
- [:fontawesome-brands-git: Source](https://sourceforge.net/projects/exiftool)
|
||||
- [:fontawesome-brands-github: Source](https://github.com/exiftool/exiftool)
|
||||
|
||||
To delete data from a directory of files:
|
||||
|
||||
```bash
|
||||
exiftool -all= *.file_extension
|
||||
```
|
||||
??? example "Deleting data from a directory of files"
|
||||
|
||||
```bash
|
||||
exiftool -all= *.file_extension
|
||||
```
|
||||
|
||||
--8<-- "includes/abbreviations.en.md"
|
||||
|
@ -90,7 +90,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative
|
||||
[Visit github.com](https://github.com/raivo-otp/ios-application){ .md-button .md-button--primary } [Privacy Policy](https://github.com/raivo-otp/ios-application/blob/master/PRIVACY.md){ .md-button }
|
||||
|
||||
??? downloads
|
||||
|
||||
|
||||
- [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/us/app/raivo-otp/id1459042137)
|
||||
- [:fontawesome-brands-app-store: Mac App Store](https://apps.apple.com/us/app/raivo-otp/id1498497896)
|
||||
- [:fontawesome-brands-github: GitHub](https://github.com/raivo-otp/ios-application)
|
||||
|
@ -121,27 +121,33 @@ Some social media services also support RSS although it's not often advertised.
|
||||
|
||||
### YouTube
|
||||
|
||||
You can subscribe YouTube channels without logging in and associating usage information with your Google Account. To subscribe to a YouTube channel with an RSS client, first look for your [channel code](https://support.google.com/youtube/answer/6180214), replace `channel_id` below:
|
||||
You can subscribe YouTube channels without logging in and associating usage information with your Google Account.
|
||||
!!! example
|
||||
|
||||
```text
|
||||
https://www.youtube.com/feeds/videos.xml?channel_id={{ channel id }}
|
||||
```
|
||||
To subscribe to a YouTube channel with an RSS client, first look for your [channel code](https://support.google.com/youtube/answer/6180214), replace `channel_id` below:
|
||||
```text
|
||||
https://www.youtube.com/feeds/videos.xml?channel_id={{ channel id }}
|
||||
```
|
||||
|
||||
### Reddit
|
||||
|
||||
Reddit also supports subscription via RSS, just replace `subreddit_name` with the subreddit you wish to subscribe to.
|
||||
Reddit also supports subscription via RSS.
|
||||
|
||||
```text
|
||||
https://www.reddit.com/r/{{ subreddit_name }}/new/.rss
|
||||
```
|
||||
!!! example
|
||||
Replace `subreddit_name` with the subreddit you wish to subscribe to.
|
||||
|
||||
```text
|
||||
https://www.reddit.com/r/{{ subreddit_name }}/new/.rss
|
||||
```
|
||||
|
||||
### Twitter
|
||||
|
||||
Using any of the Nitter [instances](https://github.com/zedeus/nitter/wiki/Instances) you can easily subscribe using RSS.
|
||||
|
||||
1. Pick an instance and set `nitter_instance`.
|
||||
2. Replace `twitter_account` with the account name.
|
||||
!!! example
|
||||
1. Pick an instance and set `nitter_instance`.
|
||||
2. Replace `twitter_account` with the account name.
|
||||
|
||||
```text
|
||||
https://{{ nitter_instance }}/{{ twitter_account }}/rss
|
||||
```
|
||||
```text
|
||||
https://{{ nitter_instance }}/{{ twitter_account }}/rss
|
||||
```
|
||||
|
@ -26,14 +26,14 @@ If you are currently using an application like Evernote, Google Keep, or Microso
|
||||
- [:fontawesome-brands-linux: Linux](https://joplinapp.org/#desktop-applications)
|
||||
- [:fontawesome-brands-firefox-browser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/)
|
||||
- [:fontawesome-brands-chrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
|
||||
- [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/us/app/joplin/id1315599797)
|
||||
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin)
|
||||
- [:pg-f-droid: F-Droid](https://f-droid.org/en/packages/net.cozic.joplin)
|
||||
- [:fontawesome-brands-android: Android](https://joplinapp.org/#mobile-applications)
|
||||
- [:fontawesome-brands-github: GitHub](https://github.com/laurent22/joplin)
|
||||
|
||||
!!! warning
|
||||
|
||||
Note: As of Dec 2018, Joplin does not support password/pin protection for the application itself or individual notes/notebooks. Data is still encrypted in transit and at sync location using your master key. See [open issue](https://github.com/laurent22/joplin/issues/289).
|
||||
Joplin does not support password/pin protection for the [application itself or individual notes/notebooks](https://github.com/laurent22/joplin/issues/289). Data is still encrypted in transit and at the sync location using your master key.
|
||||
|
||||
### Standard Notes
|
||||
|
||||
@ -43,22 +43,53 @@ If you are currently using an application like Evernote, Google Keep, or Microso
|
||||
|
||||
Standard Notes is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited (PDF)](https://s3.amazonaws.com/standard-notes/security/Report-SN-Audit.pdf).
|
||||
|
||||
[Visit standardnotes.org](https://standardnotes.org/){ .md-button .md-button--primary }
|
||||
[Visit standardnotes.com](https://standardnotes.com){ .md-button .md-button--primary }
|
||||
|
||||
??? downloads
|
||||
|
||||
- [:fontawesome-brands-windows: Windows](https://standardnotes.org/#get-started)
|
||||
- [:fontawesome-brands-apple: macOS](https://standardnotes.org/#get-started)
|
||||
- [:fontawesome-brands-linux: Linux](https://standardnotes.org/#get-started)
|
||||
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes)
|
||||
- [:fontawesome-brands-windows: Windows](https://standardnotes.com)
|
||||
- [:fontawesome-brands-apple: macOS](https://standardnotes.com)
|
||||
- [:fontawesome-brands-linux: Linux](https://standardnotes.com)
|
||||
- [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/app/id1285392450)
|
||||
- [:octicons-browser-16: Browser](https://app.standardnotes.org/)
|
||||
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes)
|
||||
- [:pg-f-droid: F-Droid](https://f-droid.org/en/packages/com.standardnotes)
|
||||
- [:octicons-browser-16: Browser](https://app.standardnotes.com/)
|
||||
- [:fontawesome-brands-github: GitHub](https://github.com/standardnotes)
|
||||
|
||||
## Worth Mentioning
|
||||
### EteSync Notes
|
||||
|
||||
- [EteSync](https://www.etesync.com/) - Secure, end-to-end encrypted, and privacy respecting sync for your contacts, calendars, tasks and notes.
|
||||
- [Paperwork](https://paperwork.cloud/) - An open-source and self-hosted solution. For PHP / MySQL servers.
|
||||
- [Org-mode](https://orgmode.org) - A major mode for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system.
|
||||
!!! recommendation
|
||||
|
||||
![EteSync Notes logo](assets/img/notebooks/etesync-notes.png){ align=right }
|
||||
|
||||
**EteSync Notes** is a secure, end-to-end encrypted, and privacy-respecting note taking app. EteSync also offers optional software as a service for [$24 per year](https://dashboard.etebase.com/user/partner/pricing/), or you can host the server yourself for free.
|
||||
|
||||
[etebase](https://docs.etebase.com), which is the foundation of EteSync, can also be used by other apps as a backend to store data end-to-end encrypted (E2EE).
|
||||
|
||||
[Visit etesync.com](https://www.etesync.com){ .md-button .md-button--primary } [Privacy Policy](https://www.etesync.com/tos/#privacy){ .md-button }
|
||||
|
||||
??? downloads
|
||||
|
||||
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=com.etesync.notes)
|
||||
- [:pg-f-droid: F-Droid](https://f-droid.org/packages/com.etesync.notes)
|
||||
- [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/us/app/etesync-notes/id1533806351)
|
||||
- [:octicons-browser-16: Browser](https://notes.etesync.com)
|
||||
- [:fontawesome-brands-github: GitHub](https://github.com/etesync)
|
||||
|
||||
## Local notebooks
|
||||
|
||||
### Org-mode
|
||||
|
||||
!!! recommendation
|
||||
|
||||
![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right }
|
||||
|
||||
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](/software/file-sharing/#sync) tools.
|
||||
|
||||
[Visit orgmode.org](https://orgmode.org){ .md-button .md-button--primary }
|
||||
|
||||
??? downloads
|
||||
|
||||
- [:fontawesome-brands-git: Source](https://git.savannah.gnu.org/cgit/emacs/org-mode.git)
|
||||
|
||||
--8<-- "includes/abbreviations.en.md"
|
||||
|
@ -81,7 +81,8 @@ Get working and collaborating without sharing your documents with a middleman or
|
||||
|
||||
- [:fontawesome-brands-github: Source](https://github.com/PrivateBin/PrivateBin)
|
||||
|
||||
Do note that PrivateBin uses JavaScript to handle encryption, so you must trust the provider to the extent that they do not inject any malicious JavaScript to get your private key. Consider self-hosting to mitigate this threat.
|
||||
!!! warning
|
||||
PrivateBin uses JavaScript to handle encryption, so you must trust the provider to the extent that they do not inject any malicious JavaScript to get your private key. Consider self-hosting to mitigate this threat.
|
||||
|
||||
### CryptPad
|
||||
|
||||
@ -89,7 +90,7 @@ Do note that PrivateBin uses JavaScript to handle encryption, so you must trust
|
||||
|
||||
![CryptPad logo](assets/img/productivity/cryptpad.svg){ align=right }
|
||||
|
||||
**CryptPad** is a private-by-design alternative to popular office tools. All content is end-to-end encrypted. Do note that it uses JavaScript to handle encryption, so you must trust the provider to the extent that they do not inject any malicious JavaScript to get your private key. Consider self-hosting to mitigate this threat.
|
||||
**CryptPad** is a private-by-design alternative to popular office tools. All content is end-to-end encrypted.
|
||||
|
||||
[Visit cryptpad.fr](https://cryptpad.fr){ .md-button .md-button--primary } [Privacy Policy](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .md-button }
|
||||
|
||||
@ -97,6 +98,9 @@ Do note that PrivateBin uses JavaScript to handle encryption, so you must trust
|
||||
|
||||
- [:fontawesome-brands-github: Source](https://github.com/xwiki-labs/cryptpad)
|
||||
|
||||
!!! warning
|
||||
CryptPad uses JavaScript to handle encryption, so you must trust the provider to the extent that they do not inject any malicious JavaScript to get your private key. Consider self-hosting to mitigate this threat.
|
||||
|
||||
## Blogging
|
||||
|
||||
### Write.as
|
||||
|
@ -50,8 +50,8 @@ The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf)
|
||||
- [:fontawesome-brands-windows: Windows](https://element.io/get-started)
|
||||
- [:fontawesome-brands-apple: macOS](https://element.io/get-started)
|
||||
- [:fontawesome-brands-linux: Linux](https://element.io/get-started)
|
||||
- [:fontawesome-brands-android: Android](https://f-droid.org/packages/im.vector.app/)
|
||||
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=im.vector.app)
|
||||
- [:pg-f-droid: F-Droid](https://f-droid.org/packages/im.vector.app/)
|
||||
- [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/app/vector/id1083446067)
|
||||
- [:fontawesome-brands-github: Source](https://github.com/vector-im/element-web)
|
||||
|
||||
@ -75,8 +75,8 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr
|
||||
|
||||
??? downloads
|
||||
|
||||
- [:fontawesome-brands-android: Android](https://f-droid.org/packages/org.briarproject.briar.android)
|
||||
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android)
|
||||
- [:pg-f-droid: F-Droid](https://f-droid.org/packages/org.briarproject.briar.android)
|
||||
- [:fontawesome-brands-git: Source](https://code.briarproject.org/briar/briar)
|
||||
|
||||
To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby.
|
||||
|
@ -8,10 +8,6 @@ The primary threat when using a video streaming platform is that your streaming
|
||||
|
||||
### FreeTube
|
||||
|
||||
!!! Warning
|
||||
|
||||
When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](threat-modeling.md) requires hiding your IP address.
|
||||
|
||||
!!! recommendation
|
||||
|
||||
![FreeTube logo](assets/img/video-streaming/freetube.svg){ align=right }
|
||||
@ -30,12 +26,12 @@ The primary threat when using a video streaming platform is that your streaming
|
||||
- [:pg-flathub: Flatpak](https://flathub.org/apps/details/io.freetubeapp.FreeTube)
|
||||
- [:fontawesome-brands-github: Source](https://github.com/FreeTubeApp/FreeTube/)
|
||||
|
||||
!!! Warning
|
||||
|
||||
When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](threat-modeling.md) requires hiding your IP address.
|
||||
|
||||
### LBRY
|
||||
|
||||
!!! note
|
||||
|
||||
Only the **LBRY desktop client** is recommended, as the [Odysee](https://odysee.com) website and the LBRY clients in F-Droid, Play Store, and the App Store have mandatory synchronization and telemetry.
|
||||
|
||||
!!! recommendation
|
||||
|
||||
![LBRY logo](assets/img/video-streaming/lbry.svg){ align=right }
|
||||
@ -53,6 +49,10 @@ The primary threat when using a video streaming platform is that your streaming
|
||||
- [:fontawesome-brands-linux: Linux](https://lbry.com/linux)
|
||||
- [:fontawesome-brands-github: Source](https://github.com/lbryio)
|
||||
|
||||
!!! note
|
||||
|
||||
Only the **LBRY desktop client** is recommended, as the [Odysee](https://odysee.com) website and the LBRY clients in F-Droid, Play Store, and the App Store have mandatory synchronization and telemetry.
|
||||
|
||||
!!! warning
|
||||
|
||||
While watching and hosting videos, your IP address is visible to the LBRY network. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](threat-modeling) requires hiding your IP address.
|
||||
@ -96,10 +96,6 @@ This fork is not endorsed by or affiliated with the upstream project. The NewPip
|
||||
|
||||
### Invidious
|
||||
|
||||
!!! warning
|
||||
|
||||
Invidious does not proxy the video stream through its server by default. Videos watched through Invidious will still make direct connections to Google's servers (googlevideo.com); however, some instances support video proxying. This can be enabled by adding `&local=true` to the URL.
|
||||
|
||||
!!! recommendation
|
||||
|
||||
![Invidious logo](assets/img/video-streaming/invidious.svg#only-light){ align=right }
|
||||
@ -114,6 +110,10 @@ This fork is not endorsed by or affiliated with the upstream project. The NewPip
|
||||
- [:fontawesome-solid-earth-americas: Instances](https://instances.invidious.io)
|
||||
- [:fontawesome-brands-github: Source](https://github.com/iv-org/invidious)
|
||||
|
||||
!!! warning
|
||||
|
||||
Invidious does not proxy the video stream through its server by default. Videos watched through Invidious will still make direct connections to Google's servers (googlevideo.com); however, some instances support video proxying. This can be enabled by adding `&local=true` to the URL.
|
||||
|
||||
!!! tip
|
||||
|
||||
Invidious is useful if you want to disable JavaScript in your browser, such as [Tor Browser](https://www.torproject.org/) on the Safest security setting. It does not provide privacy by itself and we don’t recommend logging into any accounts.
|
||||
|
Loading…
Reference in New Issue
Block a user