You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. PrivacyTools provides services, tools and knowledge to protect your privacy against global mass surveillance.
Privacy? I don't have anything to hide.
Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
The primary reason for window curtains in our house, is to stop people from being able to see in. The reason we don’t want them to see in is because we consider much of what we do inside our homes to be private. Whether that be having dinner at the table, watching a movie with your kids, or even engaging in intimate or sexual acts with your partner. None of these things are illegal by any means but even knowing this, we still keep the curtains and blinds on our windows. We clearly have this strong desire for privacy when it comes to our personal life and the public.
[...] But saying that you don't need or want privacy because you have nothing to hide is to assume that no one should have, or could have, to hide anything -- including their immigration status, unemployment history, financial history, and health records. You're assuming that no one, including yourself, might object to revealing to anyone information about their religious beliefs, political affiliations, and sexual activities, as casually as some choose to reveal their movie and music tastes and reading preferences.
Listové tajomstvo, tajomstvo dopravovaných správ a iných písomností a ochrana osobných údajov sa zaručujú.
Nikto nesmie porušiť listové tajomstvo ani tajomstvo iných písomností a záznamov, či už uchovávaných v súkromí, alebo zasielaných poštou, alebo iným spôsobom; výnimkou sú prípady, ktoré ustanoví zákon. Rovnako sa zaručuje tajomstvo správ podávaných telefónom, telegrafom alebo iným podobným zariadením.
Privacy is not a luxury [in America]: it is a right – one that we need to defend in the digital realm as much as in the physical realm. We need to stay vigilant to maintain access to that right, though ... especially as technology continues to advance...
Read also:
- Nothing to hide argument (Wikipedia)
- How do you counter the "I have nothing to hide?" argument? (reddit.com)
- 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (Daniel J. Solove - San Diego Law Review)
Quotes
Ultimately, saying that you don't care about privacy because you have nothing to hide is no different from saying you don't care about freedom of speech because you have nothing to say. Or that you don't care about freedom of the press because you don't like to read. Or that you don't care about freedom of religion because you don't believe in God. Or that you don't care about the freedom to peacably assemble because you're a lazy, antisocial agoraphobe.
The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. I don't want to live in a society that does these sort of things... I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under.
We all need places where we can go to explore without the judgmental eyes of other people being cast upon us, only in a realm where we're not being watched can we really test the limits of who we want to be. It's really in the private realm where dissent, creativity and personal exploration lie.
Global Mass Surveillance - The Fourteen Eyes
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.
Five Eyes
- Australia
- Canada
- New Zealand
- United Kingdom
- United States of America
Nine Eyes
- Denmark
- France
- Netherlands
- Norway
Fourteen Eyes
- Belgium
- Germany
- Italy
- Spain
- Sweden
Key Disclosure Law
Who is required to hand over the encryption keys to authorities?
Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
Key disclosure laws apply
Key disclosure laws may apply
- Belgium
- Estonia
- Finland *
- New Zealand (unclear)
- The Netherlands *
- United States (see related info)
Key disclosure laws don't apply
- Canada
- Czech Republic
- Germany
- Iceland
- Italy
- Poland
- Sweden (proposed)
- Switzerland
* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)
Related Information
- Wikipedia page on key disclosure law
- law.stackexchange.com question about key disclosure law in US
- DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption
Why is it not recommended to choose a US-based service?
Services based in the United States are not recommended because of the country's surveillance programs and use of National Security Letters (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
An example of this is Lavabit – a secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order.
Related Information
- Avoid all US and UK based services
- Proof that warrant canaries work based on the surespot example.
- The United Kingdom – United States of America Agreement (UKUSA)
- Lavabit: Suspension and gag order
- Key disclosure law
- Wikipedia Portal: Mass_surveillance
Recommended VPN Services
Mullvad EUR €60/y
Mullvad.net is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since 2009. Mullvad is based in Sweden and does not have a free trial.
35 Countries
Mullvad has servers in 35 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.
We also think it's better for the security of the VPN provider's private keys if they use dedicated servers, instead of cheaper shared solutions (with other customers) such as virtual private servers.
Independently Audited
Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest report published at cure53.de. The security researchers concluded:
...Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint.
In 2020 a second audit was announced and the final audit report was made available on Cure53's website.
Open Source Clients
Mullvad provides the source code for their desktop and mobile clients in their GitHub organization.
Accepts Bitcoin
Mullvad in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, and cash/local currency as anonymous forms of payment. They also accept Swish and bank wire transfers.
WireGuard Support
In addition to standard OpenVPN connections, Mullvad supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
IPv6 Support
Mullvad supports the future of networking IPv6. Their network allows users to access services hosted on IPv6 as opposed to other providers who block IPv6 connections.
Remote Port Forwarding
Remote port forwarding is allowed on Mullvad, see Port forwarding with Mullvad VPN.
Mobile Clients
Mullvad has published App Store and Google Play clients, both supporting an easy-to use interface as opposed to requiring users to manual configure their WireGuard connections. The mobile client on Android is also available in F-Droid, which ensures that it is compiled with reproducible builds.
Extra Functionality
The Mullvad VPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. The Mullvad website is also accessible via Tor at xcln5hkbriyklr6n.onion.
ProtonVPN Free Basic USD $48/y Plus USD $96/y
ProtonVPN.com is a strong contender in the VPN space, and they have been in operation since 2016. ProtonVPN is based in Switzerland and offers a limited free pricing tier, as well as premium options. They offer a further 14% discount for buying a 2 year subscription.
44 Countries
ProtonVPN has servers in 44 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.
We also think it's better for the security of the VPN provider's private keys if they use dedicated servers, instead of cheaper shared solutions (with other customers) such as virtual private servers.
Independently Audited
As of January 2020 ProtonVPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in ProtonVPN's Windows, Android, and iOS applications, all of which were "properly fixed" by ProtonVPN before the reports were published. None of the issues identified would have provided an attacker remote access to a user's device or traffic. You can view individual reports for each platform at protonvpn.com.
Open Source Clients
ProtonVPN provides the source code for their desktop and mobile clients in their GitHub organization.
Accepts Bitcoin
ProtonVPN does technically accept Bitcoin payments; however, you either need to have an existing account, or contact their support team in advance to register with Bitcoin.
Mobile Clients
In addition to providing standard OpenVPN configuration files, ProtonVPN has mobile clients for App Store and Google Play allowing for easy connections to their servers. The mobile client on Android is also available in F-Droid, which ensures that it is compiled with reproducible builds.
No Port Forwarding
ProtonVPN does not currently support remote port forwarding, which may impact some applications. Especially Peer-to-Peer applications like Torrent clients.
Extra Functionality
The ProtonVPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. ProtonVPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using the official Tor Browser for this purpose.
IVPN Standard USD $60/y Pro USD $100/y
IVPN.net is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar and offers a 3 day free trial.
32 Countries
IVPN has servers in 32 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.
We also think it's better for the security of the VPN provider's private keys if they use dedicated servers, instead of cheaper shared solutions (with other customers) such as virtual private servers.
Independently Audited
IVPN has undergone a no-logging audit from Cure53 which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a comprehensive pentest report Cure53 in January 2020. IVPN has also said they plan to have annual reports in the future.
Open Source Clients
As of Feburary 2020 IVPN applications are now open source. Source code can be obtained from their GitHub organization.
Accepts Bitcoin
In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin and cash/local currency (on annual plans) as anonymous forms of payment.
WireGuard Support
In addition to standard OpenVPN connections, IVPN supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
Remote Port Forwarding
Remote port forwarding is possible with a Pro plan. Port forwarding can be activated via the client area. Port forwarding is only available on IVPN when using OpenVPN and is disabled on US servers.
Mobile Clients
In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for App Store and Google Play allowing for easy connections to their servers. The mobile client on Android is also available in F-Droid, which ensures that it is compiled with reproducible builds.
Extra Functionality
The IVPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. IVPN also provides "AntiTracker" functionality, which blocks advertising networks and trackers from the network level.
What is a warrant canary?
A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.
Warrant Canary Examples:
- https://proxy.sh/canary
- https://www.ivpn.net/resources/canary.txt
- https://www.bolehvpn.net/canary.txt
- https://www.ipredator.se/static/downloads/canary.txt
Related Warrant Canary Information
- Warrant Canary Frequently Asked Questions
- Companies and organizations with warrant canaries
- Warrant canary criticism by Bruce Schneier and an example of a law against warrant canaries.
Odporúčané prehliadače pre počítače
Firefox
Firefox je rýchly, spoľahlivý, open-source softvér, ktorý rešpektuje Vaše súkromie. Nezabudnite upraviť nastavenia podľa našich rád: Rozšírenia pre ochranu súkromia WebRTC Vylepšenia about:config.
Tor Browser - Poskytuje anonymitu
Tor Browser je najlepšia voľba, ak potrebujete čo najvyššiu anonymitu. Ide o modifikovanú verziu Firefox ESR s predinštalovanými rozšíreniami na ochranu súkromia, šifrovaním a pokročilou proxy. Ako funguje Tor? [English]
Odporúčané prehliadače pre Android
Firefox
Firefox je rýchly, spoľahlivý, open-source softvér, ktorý rešpektuje Vaše súkromie. Nezabudnite upraviť nastavenia podľa našich rád: Rozšírenia pre ochranu súkromia WebRTC Vylepšenia about:config.
Tor Browser - Poskytuje anonymity
Tor Browser je najlepšia voľba, ak potrebujete čo najvyššiu anonymitu. Ide o modifikovanú verziu Firefox ESR s predinštalovanými rozšíreniami na ochranu súkromia, šifrovaním a pokročilou proxy. Ako funguje Tor? [English]
Bromite
Bromite je prehliadač, ktorého základom je Chromium, open-sourcový prehliadač využívaný napr. v Google Chrome, Brave Browser. Bromite má zabudované vylepšenia na zaistenie bezpečnosti a ochrany súkromia, zabudované blokovanie reklám, umožňuje DNS over HTTPS; prebral tiež vylepšenia od ungoogled-chromium a ďalších prehliadačov zameraných na ochranu súkromia. Viac info na oficiálnej webstránke [English].
Pre Android si pozrite tiež
- Privacy Browser - Open-source prehliadač zameraný na ochranu súkromia. Obsahuje zabudované blokovanie reklám pomocou EasyList [English], SSL certificate pinning [English] a umožňuje Tor Orbot proxy [English]. Majte vždy najnovšiu verziu WebView
Odporúčané prehliadače pre iOS (iPhone, iPad)
Firefox
Firefox je rýchly, spoľahlivý, open-source softvér, ktorý rešpektuje Vaše súkromie. Poznámka: Obmedzenia iOS nastavené spoločnosťou Apple neumožňujú upraviť Firefox tak, ako to odporúčame pre ostatné operačné systémy. Firefox pre iOS má zabudovanú Ochranu pred sledovaním, ktorá používa zoznam od Disconnect [English] na identifikáciu a zablokovanie reklám, analytických prvkov stránok ako aj tažbu kryptomien a analyzátorov odtlačku prehliadača.
Onion Browser
Onion Browser je open-source prehliadač, ktorý umožňuje surfovať po internete anonymne cez sieť Tor na zariadeniach s operačným sytémom iOS a odporúča ho aj Tor Project [English], ktorý okrem iného vyvíja Tor Browser pre ostatné operačné systémy. Upozornenie: Z dôvodu limitácií operačného systému iOS vznikajú isté problémy [English] so zabezpečením anonymity.
DuckDuckGo Privacy Browser
DuckDuckGo Privacy Browser je open-source webový prehliadač so zabudovanou ochranou pred sledovaním a využíva ToS;DR [English] na rýchle vyhodnotenie podmienok ochrany súkromia stránok, ktoré navštívite.
Pre iOS si pozrite tiež
- SnowHaze - Open-source webový prehliadač so zabudovaným blokovaním reklám, sledovačov, analyzátorov, skenovaním odtlačku prehliadača, všetko prispôsobiteľné jednotlivo pre každú stránku.
Odtlačok prsta prehliadača - Je konfigurácia vášho prehliadača jedinečná?
Keď navštívite webovú stránku, prehliadač zasiela rôzne informácie o svojej konfigurácií, napríklad dostupné fonty, typ prehliadača, použité rozšírenia a mnohé ďalšie. Ak je kombinácia týchto informácií dostatočne jedinečná, môže to byť využité na identifikáciu a sledovanie bez použitia cookies a iných nástrojov. EFF vytvorila nástroj Cover Your Tracks [English] (predtým Panopticlick [English]) na otestovanie, nakoľko je váš prehliadač jedinečný.
Súčasné prehliadače neboli navrhnuté na to, aby zabezpečili ochranu súkromia. Efektívnejšie ako úpenlivá snaha minimalizovať odtlačok prehliadača je používanie rozšírení pre prehliadač, ktoré vám pomôžu vylepšiť ochranu súkromia. Pomocou nich dosiahnete oveľa lepšie výsledky.
Súvisiace informácie
- Ako jedinečný je váš prehliadač? Peter Eckersley, EFF [English]
- Odporúčané rozšírenia na ochranu súkromia
- BrowserLeaks.com [English] - bezpečnostný testovací nástroj, ktorý odhalí dáta, ktoré prehliadač automaticky odosiela stránkam, ktoré prehliadate
WebRTC únik IP adresy - Uniká vaša IP adresa spoza VPN?
Softvér ako NoScript dokáže úniku IP adresy zabrániť, napriek tomu odporúčame zablokovať WebRTC protokol priamo v prehliadači. Poznámka: Zablokovanie WebRTC znefunkční hovory cez internetový prehliadač vo webových aplikáciách ako Discord, Hangouts, Jitsi a mnohých ďalších.
Ako vypnúť WebRTC v prehliadači Firefox?
Nastavte "media.peerconnection.enabled" na "false" v "about:config".
Postup:
- Zadajte "about:config" do panela Firefoxu na zadávanie webovej adresy a stlačte enter.
- Klinknite na tlačidlo "Rozumiem riziku a chcem pokračovať".
- Vyhľadajte "media.peerconnection.enabled".
- Dvojkliknite na danú položku, aby sa jej hodnota zmenila na "false".
- Hotovo. Otestujte ešte raz, či cez WebRTC neuniká vaša IP adresa.
Ak chcete vypnúť všetky nastavenie týkajúce sa WebRTC, zmeňte tieto hodnoty na:
- media.peerconnection.turn.disable = true
- media.peerconnection.use_document_iceservers = false
- media.peerconnection.video.enabled = false
- media.peerconnection.identity.timeout = 1
Teraz je WebRTC vypnuté.
Znova otestujte svoj prehliadač
Ako vypnúť WebRTC v prehliadači Safari?
Safari je oveľa striknejšií pri používaní WebRTC ako ostatné najpoužívanejšie webové prehliadače a WebRTC by tu nemal spôsobovať únik IP adresy. Podľa nižšie uvedených krokov si môžete overiť, či máte Safari správne nastavené:
- V Safari menu vyberte "Preferences".
- Vyberte "Advanced tab" a označte políčko "Show Develop menu in menu bar".
- Zatvorte "Preferences" a otvorte "Develop menu" zo Safari menu panela.
- V rozbalovacom menu otvorte "WebRTC" podmenu a uistite sa, že políčko "Enable Legacy WebRTC API" nie je začiarknuté. Ak je vyznačené na šedo, ešte lepšie.
Ako vypnúť WebRTC v prehliadači Google Chrome?
WebRTC sa nedá v prehliadači Chrome úplne vypnúť. Môžete však zmeniť jeho smerovacie nastavenia, a tým zabrániť únikom IP adresy pomocou rozšírení. Medzi open-source riešenia patrí WebRTC Leak Prevent (v niektorých prípadoch je nutné zmeniť základné nastavenia tohto rozšírenia) a uBlock Origin (v nastaveniach vyberte "Prevent WebRTC from leaking local IP addresses").
Odporúčané rozšírenia pre webové prehliadače
uBlock Origin: Zablokovanie reklám a sledovacieho obsahu
uBlock Origin je efektívny wide-spectrum blocker [English], ktorý nezaťažuje operačnú pamäť, no aj tak dokáže načítať a aplikovať o tisíce viac filtrov ako iné populárne blokovače. Nemá žiadnu monetizačnú stratégiu a je plne open source. Pokročilý mód [English] umožňuje dynamické filtrovanie [English], ktoré sprostredkováva rozšírenie blokovania podobné ako NoScript alebo uMatrix (napríklad stredné [English] alebo tvrdé [English]) blokovanie.
HTTPS Everywhere: Bezpečné pripojenie
HTTPS Everywhere zabezpečí šifrovanie vášho internetového pripojenia k mnohým webstránkam, prepnutím pripojenia na https protokol. Rozšírenie vzniklo ako spoločný projekt organizácií Tor Project a Electronic Frontier Foundation.
Decentraleyes: Blokovanie sietí na doručovanie obsahu
Decentraleyes lokálne emuluje siete na doručovanie obsahu (Content Delivery Networks) tým, že automaticky blokuje požiadavky na tieto siete, sama nájde požadované zdroje a vloží ich do prostredia stránky. To všetko sa deje okamžite, automaticky a bez akejkoľvek potreby čokoľvek dopredu nastavovať.
ClearURLs
ClearURLs automaticky odstráni sledovacie prvky z URLs a pomáha tak ochraňovať vaše súkromie pri surfovaní na internete.
xBrowserSync
xBrowserSync synchronizuje záložky naprieč zariadeniami a webovými prehliadačmi pomocou šifrovania na oboch koncoch. Dáta sú šifrované a dešifrované výlučne na vašich zariadeniach, nikto okrem vás si ich nevie prečítať. Rozšírenie funguje úplne bez registrácie. Zadáte iba náhodne vygenerované ID alebo QR kóde. Služba je dostupná cez rôzne servery [English], prípadne si ju môžete nainštalovať na vlastný server [English].
Pozrite si tiež
- floccus - Synchronizuje záložky naprieč prehliadačmi prostredníctvom manuálne prenesených lokálnych súborov, Nextcloud, WebDAV alebo akéhokoľvek iného riešenia na synchronizáciu súborov. Rozšírenie je dostupné pre Firefox, Chrome, Edge.
Dodatočná funkcie
Terms of Service; Didn’t Read
Terms of Service; Didn’t Read je rozšírenie, ktoré poskytuje sumarizáciu podmienok ochrany súkromia a zmluvných podmienok, ktorých prečítanie musíte potvrdiť pri registrácií na akúkoľvek stránku. No v skutočnosti ich aj tak takmer nikto nečíta. Podmienky jednotlivých stránok známkuje a taktiež poskytuje krátku sumarizáciu ich obsahu. Analýzy a hodnotenia sú transparentne publikované komunitou recenzentov.
Snowflake
Snowflake je nový pluggable transport [English] od organizácie Tor Project. Ak máte necenzúrované pripojenie na internet, spustením tohoto rozšírenia dobrovoľne umožníte, aby vaše pripojenie bolo využité ako Snowflake proxy, ktoré pomôže používateľom, pre ktorých nie je možné sa priamo pripojiť do siete Tor. Vaša IP adresa nebude viditeľná pre stránky, ktoré používatelia cez vaše proxy navštívia, pretože rozšírenie vás nikdy nedá do úlohy výstupného bodu. Ak je váš prístup na sieť Tor zablokovaný, toto rozšírenie vám nepomôže a mali by ste používať Tor Browser. Poznámka: Toto rozšírenie nefunguje, ak máte vypnuté WebRTC.
Persistent storage management
Desktop
Temporary Containers
Temporary Containers umožňujú otvárať karty, webstránky a linky v automaticky riadených jednorázových kontajneroch. Kontajnery izolujú dáta, ktoré webstránka ukladá na váš počítač (súbory cookies a mnohé ďalšie) od dát iných webstránok, a tým vylepšujú bezpečnosť a ochranu súkromia vášho prehliadača: Vylepšite ochranu súkromia vo Firefoxe pomocou Temporary Containers [English].
Firefox Multi-Account Containers
Firefox Multi-Account Containers umožňujú vytvárať kontajnery pre izoláciu špecifických webstránok. Kontajnery sú izolované jeden od druhého ako aj od zvyšku stránok. Toto rozšírenie môžete používať namiesto Temporary Containers pre webstránky, kde sa plánujete pravidelne prihlasovať pod tým istým účtom.
Android
ETag Stoppa
ETag Stoppa zabraňuje Firefoxu ukladať entity tags tým, že vymaže ETag response headers vo všetkých prípadoch bez výnimky.
Cookie AutoDelete: automatické vymazávanie cookies
Cookie AutoDelete automaticky odstráni súbory cookies, pretrvávajúce relácie a iné informácie, ktoré môžu byť využité na špehovanie, aj keď ich už ďalej nevyužívajú otvorené karty prehliadača.
Pre pokročilých používateľov
uMatrix: Stop Cross-Site Requests
uMatrix umožní kontrolu požiadaviek, ktoré webstránky kladú na iné webstránky. Veľa webstránok má integrované funkcie, ktoré umožnia iným webstránkam sledovať vás, ako napríklad Facebook Like Buttons alebo Google Analytics. uMatrix v základnom nastavení povoľuje scripty, ktoré sú uložené priamo na webstránke, ktorú navštívite. Ak chcete, aby uMatrix poskytoval podobnú funkcionalitu ako NoScript, mali by ste zapnúť blokovanie všetkých 1st party scriptov [English]. Toto rozšírenie už nie je v aktívnom vývoji [English].
CanvasBlocker
CanvasBlocker zabraňuje webstránkam použiť Javascript APIs na analyzovanie odtlačku prehliadača. Je možné nastaviť úplné blokovanie JavaScript APIs na vybraných alebo úplne všetkých webstránkach (čo môže znefunkčniť niektoré webstránky), alebo iba zablokovať, prípadne poskytnúť falošnú readout API, ktorá zašle čo najmenej údajov použiteľných na analýzu odtlačku prehliadača.
Firefox: vylepšenia v "about:config" pre ochranu súkromia
Príprava
- Zadajte "about:config" do textového panela, kde inak zadávate webovú adresu a stlačte enter.
- Klinknite na tlačidlo "Rozumiem riziku a chcem pokračovať".
- Nakopírujte každú z preferencií uvedených nižšie (napríklad "webgl.disabled") do vyhľadávacieho panela (nie do toho, kde ste zadávali "about:config", ale do panela nižšie) a nastavte každú z nich na uvedenú hodnotu (napríklad "true").
Postup
- privacy.firstparty.isolate = true
- Výsledok Tor Uplift [English], toto nastavenie izoluje všetky identifikátory (napríklad súbory cookies) iba pre doménu, ktorú práve navštevujete, s cieľom zabránenia sledovania naprieč rôznymi doménami. Ak máte Firefox v58 alebo nižší a používate rozšírenie "Cookie AutoDelete", nemeňte toto nastavenie.
- privacy.resistFingerprinting = true
- Výsledok Tor Uplift [English], Firefox je vďaka tomuto nastaveniu odolnejší voči identifikácii pomocou odtlačku prehliadača.
- privacy.trackingprotection.fingerprinting.enabled = true
- [FF67+] Blokuje identifikáciu pomocou odtlačku prehliadača.
- privacy.trackingprotection.cryptomining.enabled = true
- [FF67+] Blokuje ťaženie kryptomien.
- privacy.trackingprotection.enabled = true
- Nová zabudovaná ochrana pred sledovaním od hlavného tvorcu prehliadača Firefox, spoločnosti Mozilla. Jednou z jej výhod je, že blokuje sledovače (napríklad Google Analytics) aj na privilegovaných stránkach [English], kde iné rozšírenia sú väčšinou automaticky vypnuté.
- browser.send_pings = false
- Vypne nastavenie v prehliadači, ktoré môže inak umožňovať stránke monitorovať kliknutia.
- browser.urlbar.speculativeConnect.enabled = false
- Vypne prednačítavanie automaticky doplnených stránok. Ak nie je vypnuté, Firefox prednačítava webové adresy, ktoré používateľom navrhuje počas zadávania adresy. Môže to byť problém, pretože takto sa prehliadač pripája sám na stránky, na ktoré sa vy nechcete pripojiť. Zdroj [English]
- dom.event.clipboardevents.enabled = false
- Vypne funkcie, ktoré umožňovali stránkam dostávať notifikácie, keď ste kopírovali obsah z ich stránky alebo kurzorom označili časť ich textu.
- media.eme.enabled = false
-
Vypne prehrávanie DRM-kontrolovaného HTML5 obsahu, ktorý, ak je zapnutý, automaticky stiahne Widevine Content Decryption Module od spoločnosti Google Inc. Detaily
Poznámka: Stránky, ktoré používajú Widevine DRM, napríklad Netflix, Spotify, nemusia následne fungovať.
DRM-kontrolovaný obsah, ktorý vyžaduje Adobe Flash alebo Microsoft Silverlight NPAPI plugins bude stále funkčný, ak je vo Firefoxe nainštalovaný a zapnutý.
- media.gmp-widevinecdm.enabled = false
- Vypne Widevine Content Decryption Module od spoločnosti Google Inc., ktorý sa využíva na prehrávanie DRM-kontrolovaného HTML5 obsahu. Detaily
- media.navigator.enabled = false
- Vypne funkciu, ktorá umožňovala webstránkam sledovanie kamery a mikrofónu.
- network.cookie.cookieBehavior = 1
-
Vypne prijímanie súborov cookies.
- 0 = Prijíma všetky súbory cookies.
- 1 = Prijíma súbory cookies iba zo stránok, ktoré priamo navštevuje (blokuje cookies od tretích strán).
- 2 = Blokuje všetky súbory cookies.
- network.http.referer.XOriginPolicy = 2
-
Odosiela
Refererheader iba vtedy, ak sa zhoduje celý hostname. Poznámka: ak toto nastavenie naruší fungovanie veľkého množstva stránok, možete skúsiť hodnotu1v kombinácii sXOriginTrimmingPolicynastavení popísaných nižšie. Zdroj [English]- 0 = Odosiela
Referervo všetkých prípadoch. - 1 = Odosiela
Refererstránkam s rovnakým eTLD. - 2 = Odosiela
Refereriba stránkam, kde sa zhoduje celý hostname.
- 0 = Odosiela
- network.http.referer.XOriginTrimmingPolicy = 2
-
Keď odosielate
Referercez origins, odošlú sa iba scheme, host a port vRefererheader danej cross-origin požiadavky. Zdroj [English]- 0 = Odosiela celú url v
Referer. - 1 = Odošle url bez query string v
Referer. - 2 = Odošle iba scheme, host a port v
Referer.
- 0 = Odosiela celú url v
- webgl.disabled = true
- Vypne WebGL, ktorý prináša potenciálne bezpečnostné riziká, keď je zapnutý. Zdroj [English]
- browser.sessionstore.privacy_level = 2
- Toto nastavenie mení množstvo informácií, ktoré sa uložia z predchádzaujúcej relácie, okná, karty, webstránky, ktoré boli naposledy vo Firefoxe otvorené, predtým než bol zatvorený alebo nečakane padol, ako aj obsah formulárov, pozíciu okna, cookies, POST data. Detaily [English]
- 0 = Ukladá dodatočné dáta o relácii pre akúkoľvek stránku (prednastavené od Firefox 4).
- 1 = Ukladá dodatočné dáta o relácii iba pre nešifrované stránky, teda bez HTTPS (prednastavené pred Firefox 4).
- 2 = Nikdy neukladá dodatočné dáta o relácii.
- beacon.enabled = false
- Vypne odosielanie dodatočných analytických dát na webové servery. Detaily [English]
- browser.safebrowsing.downloads.remote.enabled = false
- Zabráni Firefoxu odosielať informácie o stiahnutých súboroch do Google Safe Browsing, ktorý overuje, či by sťahovanie nemalo z bezpečnostných dôvodov byť zablokované. Detaily
- Zakázanie predbežného načítania stránok, o ktorých si Firefox myslí, že sa ich chystáte navštíviť:
-
Predbežné načítavanie stiahne cookies z takto načítaných stránok a môže spôsobiť ďalšie potenciálne nechcené správanie. Detaily tu [English] a tu [English].
- network.dns.disablePrefetch = true
- network.dns.disablePrefetchFromHTTPS = true
- network.predictor.enabled = false
- network.predictor.enable-prefetch = false
- network.prefetch-next = false
- network.IDN_show_punycode = true
- Zapne zobrazovanie IDNs ako ich Punycode ekvivalent, čo vám pomôže rozoznať phishingové útoky, ktoré by ste si inak pravdepodobne nevšimli. Zdroje [English]
- Hľadáte informácie o TRR, DoH alebo ESNI?
- Pozrite našu stránku o DNS.
- arkenfox user.js (predtým ghacks-user.js) - user.js šablóna na nastavenie a zabezpečenie Firefoxu pre ochranu súkromia, bezpečnosti a zabezpečenia proti skenovaniu odtlačku prehliadača.
- Firefox Privacy: Tips and Tricks for Better Browsing [English] - Úvodný návod od privacytools.io pre tých, čo chcú zabezpečiť svoj prehliadač Firefox.
- ffprofile.com [English] - Nástroj na ľahké vytvorenie Firefox profilu podľa vašich potrieb.
- Privacy Settings [English] - Rozšírenie pre Firefox, ktoré ľahko pomocou toolbaru zmení nastavenia ochrany súkromia vo Firefoxe.
- Firefox Privacy Guide For Dummies [English] - Návod na vylepšenie bezpečnosti a ochrany súkromia vo Firefoxe. Okrem už tu spomínaných tipov, obsahuje aj dodatočné rady.
- NeoMutt - NeoMutt is an open-source command line mail reader (or MUA) for Linux and BSD. It’s a fork of Mutt with added features.
- Letterbox - Letterbox is a free open-source mail client for iOS made as a part of an ongoing research project at the Freie Universität Berlin, Germany.
- MetaGer - An open-source, metasearch engine run as a non-profit based in Germany. (Privacy Policy)
- Mojeek - An independent search engine based in the UK, and the first search engine to have a policy of not tracking its users. (Privacy Policy)
- YaCy - An open-source, peer-to-peer search engine powered by its users.
- New features and changes can be implemented more quickly.
- Easier to get started with and to find contacts.
- Centralized services could be more susceptible to legislation requiring backdoor access.
- Can include restricted control or access. This can include things like:
- Being forbidden from connecting third-party clients to the centralized network that might provide for greater customization or better user experience. Often defined in Terms and Conditions of usage.
- Poor or no documentation for third-party developers.
- The ownership, privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on.
- Allows for greater control over your own data when running your own server.
- Allows you to choose who to trust your data with by choosing between multiple "public" servers.
- Often allows for third party clients which can provide a more native, customized, or accessible experience.
- Generally a less juicy target for governments wanting backdoor access to everything as the trust is decentralized. The server may be hosted independently from the organization developing the software.
- Server software can be verified that it matches public source code, assuming you have access to the server or you trust the person who does (e.g., a family member)
- Third-party developers can contribute code and add new features, instead of waiting for a private development team to do so.
- Adding new features is more complex, because these features need to be standardized and tested to ensure they work with all servers on the network.
- Some metadata may be available (e.g., information like "who is talking to whom," but not actual message content if E2EE is used).
- Federated servers generally require trusting your server's administrator. They may be a hobbyist or otherwise not a "security professional," and may not serve standard documents like a privacy policy or terms of service detailing how your data is utilized.
- Server administrators sometimes choose to block other servers, which are a source of unmoderated abuse or break general rules of accepted behavior. This will hinder your ability to communicate with users on those servers.
- Status.im - Encrypted instant messenger with an integrated Ethereum wallet (cryptocurrency) that also includes support for DApps (decentralized apps) (web apps in a curated store). Uses the Waku protocol (a fork of Whisper) for P2P communication. Only available for iOS and Android.
- Minimal information is exposed to third parties.
- Modern P2P platforms implement end-to-end encryption by default. There are no servers that could potentially intercept and decrypt your transmissions, unlike centralized and federated models.
- Reduced feature set:
- Messages can only be sent when both peers are online, however, your client may store messages locally to wait for the contact to return online.
- Generally increases battery usage on mobile devices, because the client must stay connected to the distributed network to learn about who is online.
- Your IP address and that of the contacts you're communicating with may be visible if you do not use the software in conjunction with a self contained network, such as Tor or I2P. Many countries have some form of mass surveillance and/or metadata retention.
- More information about Mumble:
- Running Mumble Server and its config file, particularly obfuscating IPv4 addresses and logging
- Torifying Mumble
- FramaDrop - Stores a file of any size for 24h. Data is end-to-end encrypted from your browser, powered by LuFi.
- croc - Easily and securely send arbitrary-sized files from one computer to another. Similar to Magic Wormhole but without dependencies.
- FreedomBox - Designed to be your own inexpensive server at home. It runs free software and offers an increasing number of services ranging from a calendar or XMPP server, to a wiki, or VPN.
- Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
- CryptPad - Free and end-to-end encrypted real time collaboration sharing folders, media, and documents.
- CryptPad - An open-source and end-to-end encrypted real-time collaborative editor that lets you share folders, media, and documents.
- git-annex - Allows managing files with git, without checking the file contents into git. While that may seem paradoxical, it is useful when dealing with files larger than git can currently easily handle, whether due to limitations in memory, time, or disk space.
- Master Password - A password manager based on an ingenious password-generation algorithm that guarantees your passwords can never be lost. Its passwords aren't stored: they are generated on-demand from your name, the site, and your master password. No syncing, backups, or internet access needed.
- Psono - Free and open source password manager for teams with client side encryption and secure sharing of passwords, files, bookmarks, emails. All secrets are protected by a master password. Uses NACL Crypto, a combination of Curve25519, Salsa20 and Poly1305.
- Password Safe - Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted username/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire username/password list.
-
Pass - Pass is a bare-bones password store that keeps passwords using gpg2 encrypted files inside a simple directory tree residing at
~/.password-store. It has a simple terminal interface where the user can perform the usual actions, and it's functionality can be extended by plugins. It can also be used in scripts without having to input the actual password in plain text. - fruux - A unified contacts/calendaring system that works across platforms and devices.
- Cloud backups - Consider regularly exporting your calendar and or contacts and backing them up on a separate storage drive or uploading them to cloud storage (ideally after encrypting them).
- DecSync - DecSync can be used to synchronize RSS, contacts, and calendars without a server by using file synchronization software such as Syncthing.
- Cryptomator - Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration. Closed source
- Linux Unified Key Setup (LUKS) - A full disk encryption system for Linux using dm-crypt as the disk encryption backend. Included by default in Ubuntu. Available for Windows and Linux.
- Tomb - A simple zsh script for making LUKS containers on the commandline.
- Hat.sh - A cross-platform, serverless JavaScript web application that provides secure file encryption using the AES-256-GCM algorithm in your browser. It can also be downloaded and run offline.
- Kryptor is a file encryption program for Windows, MacOS, and Linux. Beta
- ZeroNet - Open, free, and uncensorable websites, using Bitcoin cryptography and BitTorrent network. Not anonymous
- RetroShare - An open source, cross-platform, friend-to-friend, secure, and decentralized communication platform.
- I2P-Bote - End-to-end encrypted decentralized mail system within the I2P network.
- GNUnet - GNUnet provides a strong foundation of free software for a global, distributed network that provides security and privacy.
- IPFS and IPFS Companion- A peer-to-peer hypermedia protocol to make the web faster, safer, and more open. IPFS Companion is a browser extension for redirecting queries to a gateway of your choice (generally local). Supercookie warning
- Yggdrasil - An early-stage implementation of a fully end-to-end encrypted IPv6 network. It is lightweight, self-arranging, supported on multiple platforms, and allows pretty much any IPv6-capable application to communicate securely with other Yggdrasil nodes. Yggdrasil does not require you to have IPv6 Internet connectivity - it also works over IPv4. Experimental Not anonymous by default
- Movim - A federated social platform that relies on the XMPP standard and therefore allows you to exchange with many other clients on all devices.
- Akasha - A decentralized online bulletin board using IPFS and Ethereum.
- Lemmy - An AGPL-licensed self-hostable link aggregator intended to work in the Fediverse.
- notabug.io - A free and open-source P2P link aggregator with a strong resemblance to old.reddit.com (not to be confused with NotABug.org).
- Signed profiles are offered by AdGuard and NextDNS.
- User contributed unsigned profiles for several DNS providers are hosted by encrypted-dns.party.
- Note: As of Dec 2018, Joplin does not support password/pin protection for the application itself or individual notes/notebooks. Data is still encrypted in transit and at sync location using your master key. See open issue.
- EteSync - Secure, end-to-end encrypted, and privacy respecting sync for your contacts, calendars, tasks and notes.
- Paperwork - An open-source and self-hosted solution. For PHP / MySQL servers.
- Org-mode - A major mode for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system.
- Cryptee - Free privacy-friendly service for storing Documents, files and Photos
- EtherCalc - EtherCalc is a web spreadsheet. Data is saved on the web, and people can edit the same document at the same time. Changes are instantly reflected on all screens. Work together on inventories, survey forms, list management, brainstorming sessions.
- Disroot - Free privacy-friendly service that offers Etherpad, EtherCalc and PrivateBin.
- dudle - An online scheduling application, free and open-source. Schedule meetings or make small online polls. No email collection or the need of registration.
- Framadate - A free and open-source online service for planning an appointment or making a decision quickly and easily. No registration is required.
- LibreOffice - Free and open-source office suite.
- VSCodium - Scripts to automatically build Microsoft's Visual Studio Code editor without branding or telemetry.
- MicroG Add-on Package - A project that aims to reimplement the proprietary Google Play Services in the Android operating system with a FLOSS replacement. The microG project also maintains a fork of LineageOS with microG and F-Droid preinstalled at Lineage for microG.
- Our DNS client recommendations, which have information on enabling encrypted DNS on Android.
- Data syncing is by default enabled.
- Browsing history and open websites.
- Apps settings.
- WiFi hotspot names and passwords.
- Your device is by default tagged with a unique advertising ID.
- Used to serve you with personalized advertisements by third-party advertisers and ad networks.
- Cortana can collect any of your data.
- Your keystrokes, searches and mic input.
- Calendar data.
- Music you listen to.
- Credit Card information.
- Purchases.
- Microsoft can collect any personal data.
- Your identity.
- Passwords.
- Demographics.
- Interests and habits.
- Usage data.
- Contacts and relationships.
- Location data.
- Content like emails, instant messages, caller list, audio and video recordings.
- Your data can be shared.
- When downloading Windows 10, you are authorizing Microsoft to share any of above-mentioned data with any third-party, with or without your consent.
- Microsoft Privacy Statement - Microsoft collects, uses and discloses personal information as described here. This allows OneDrive data, Cortana searches, and MS browser history to be sold to third parties.
- Cortana and privacy - To personalize your experience and provide the best possible suggestions, Cortana accesses your email and other communications and collects data about your contacts (People), like their title, suffix, first name, last name, middle name, nicknames, and company name. If you call, email, or text someone or they call, email, or text you, Cortana collects that person’s email address or phone number.
- WindowsSpyBlocker - Open-source tool that blocks data collection.
- Comparison of Windows 10 Privacy tools - ghacks.net
- Windows 10 Sends Your Data 5500 Times Every Day Even After Tweaking Privacy Settings - The Hacker News.
- Even when told not to, Windows 10 just can't stop talking to Microsoft. It's no wonder that privacy activists are up in arms. - Ars Technica.
- Windows 10 Reserves The Right To Block Pirated Games And 'Unauthorized' Hardware. - Techdirt.
- Surveillance Self-Defense by EFF - Guide to defending yourself from surveillance by using secure technology and developing careful practices.
- The Crypto Paper - Privacy, Security and Anonymity for Every Internet User.
- Email Self-Defense by FSF - A guide to fighting surveillance with GnuPG encryption.
- The Ultimate Privacy Guide - Excellent privacy guide written by the creators of the bestVPN.com website.
- IVPN Privacy Guides - These privacy guides explain how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation.
- The Ultimate Guide to Online Privacy - Comprehensive "Ninja Privacy Tips" and 150+ tools.
- Freedom of the Press Foundation - Supporting and defending journalism dedicated to transparency and accountability since 2012.
- Erfahrungen.com - German review aggregator website of privacy-related services.
- Open Wireless Movement - a coalition of Internet freedom advocates, companies, organizations, and technologists working to develop new wireless technologies and to inspire a movement of Internet openness.
- privacy.net - What does the US government know about you?
- r/privacytoolsIO Wiki - Our Wiki on reddit.com.
- Security Now! - Weekly Internet Security Podcast by Steve Gibson and Leo Laporte.
- TechSNAP - Weekly Systems, Network, and Administration Podcast. Every week TechSNAP covers the stories that impact those of us in the tech industry.
- Terms of Service; Didn't Read - "I have read and agree to the Terms" is the biggest lie on the web. We aim to fix that.
- ipleak.net - IP/DNS Detect - What is your IP, what is your DNS, what informations you send to websites.
- The ultimate Online Privacy Test Resource List - A collection of Internet sites that check whether your web browser leaks information.
- PRISM Break - We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
- Security in-a-Box - A guide to digital security for activists and human rights defenders throughout the world.
- SecureDrop - An open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. It was originally created by the late Aaron Swartz and is currently managed by Freedom of the Press Foundation.
- Security First - Umbrella is an Android app that provides all the advice needed to operate safely in a hostile environment.
- Osalt - A directory to help you find open source alternatives to proprietary tools.
- AlternativeTo - A directory to help find alternatives to other software, with the option to only show open source software
Firefox user.js šablóna
Súvisiace informácie
Recommended Email Services
ProtonMail Free
ProtonMail.com is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. ProtonMail is based in Genève, Switzerland. Accounts start with 500 MB storage with their free plan.
Free accounts have some limitations and do not allow the use of the ProtonMail Bridge, which is required to use a recommended email client (e.g. Thunderbird) or to search email by body text. Paid accounts are available starting at €48/y which include features like ProtonMail Bridge, additional storage, custom domain support, and more. The webmail and mobile apps can only search To:, From:, Date: and Subject: (this is likely to change when v4.0 of ProtonMail is released).
Domains and Aliases
Paid ProtonMail users can use their own domain with the service. Catch-all addresses are supported with custom domains for Professional and Visionary plans. ProtonMail also supports subaddressing, which is useful for users who don't want to purchase a domain.
Payment Methods
ProtonMail accepts Bitcoin in addition to accepting credit/debit cards and PayPal.
Account Security
ProtonMail supports TOTP two factor authentication only. The use of a U2F security key is not yet supported. ProtonMail is planning to implement U2F upon completion of their Single Sign On (SSO) code.
Data Security
ProtonMail has zero access encryption at rest for your emails, address book contacts, and calendars. This means the messages and other data stored in your account are only readable by you.
Email Encryption
ProtonMail has integrated OpenPGP encryption in their webmail. Emails to other ProtonMail users are encrypted automatically, and encryption to non-ProtonMail users with an OpenPGP key can be enabled easily in your account settings. They also allow you to encrypt messages to non-ProtonMail users without the need for them to sign up for a ProtonMail account or use software like OpenPGP.
ProtonMail also supports the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of ProtonMail to find the OpenPGP keys of ProtonMail users easily, for cross-provider E2EE.
.onion Service
ProtonMail is accessible via Tor at protonirockerxow.onion.
Extra Functionality
ProtonMail offers a "Visionary" account for €24/Month, which also enables access to ProtonVPN in addition to providing multiple accounts, domains, aliases, and extra storage.
Mailbox.org €12/y
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with 2 GB of storage, which can be upgraded as needed.
Domains and Aliases
Mailbox.org lets users use their own domain and they support catch-all addresses. Mailbox.org also supports subaddressing, which is useful for users who don't want to purchase a domain.
Payment Methods
Mailbox.org doesn't accept Bitcoin or any other cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung.
Account Security
Mailbox.org supports two factor authentication for their webmail only. You can use either TOTP or a Yubikey via the Yubicloud. Web standards such as U2F and WebAuthn are not yet supported.
Data Security
Mailbox.org allows for encryption of incoming mail using their encrypted mailbox. New messages that you receive will then be immediately encrypted with your public key.
However, Open-Exchange, the software platform used by Mailbox.org, does not support the encryption of your address book and calendar. A standalone option may be more appropriate for that information.
Email Encryption
Mailbox.org has integrated encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also allow remote recipients to decrypt an email on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.
Mailbox.org also supports the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of Mailbox.org to find the OpenPGP keys of Mailbox.org users easily, for cross-provider E2EE.
.onion Service
You can access your Mailbox.org account via IMAP/SMTP using their .onion service. However, their webmail interface cannot be accessed via their .onion service, and users may experience TLS certificate errors.
Extra Functionality
All accounts come with limited cloud storage that can be encrypted. Mailbox.org also offers the alias @secure.mailbox.org, which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports Exchange ActiveSync in addition to standard access protocols like IMAP and POP3.
Posteo €12/y
Posteo.de is an email provider that focuses on anonymous, secure, and private email. Their servers are powered by 100% sustainable energy. They have been in operation since 2009. Posteo is based in Germany and has a free 14-day trial. Posteo comes with 2 GB for the monthly cost and an extra gigabyte can be purchased for €0.25 per month.
Domains and Aliases
Posteo does not allow the use of custom domains, however users may still make use of subaddressing.
Payment Methods
Posteo does not accept Bitcoin or other cryptocurrencies as a form of payment, however they do accept cash-by-mail. They also accept credit/debit cards, bank transfers, and PayPal, and remove PII (personally identifiable information) that they receive in connection with these payment methods.
Account Security
Posteo supports two factor authentication for their webmail only. You can use either TOTP a Yubikey with TOTP. Web standards such as U2F and WebAuthn are not yet supported.
Data Security
Posteo has zero access encryption for email storage. This means the messages stored in your account are only readable by you.
Posteo also supports the encryption of your address book contacts and calendars at rest. However, Posteo still uses standard CalDAV and CardDAV for calendars and contacts. These protocols do not support E2EE (End-To-End Encryption). A standalone option may be more appropiate.
Email Encryption
Posteo has integrated encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also support the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of Posteo to find the OpenPGP keys of Posteo users easily, for cross-provider E2EE.
.onion Service
Posteo does not operate a .onion service.
Extra Functionality
Posteo allows users to set up their own mailing lists. Each account can create one list for free.
Disroot Free
Disroot offers email amongst other services. The service is maintained by volunteers and its community. They have been in operation since 2015. Disroot is based in Amsterdam. Disroot is free and uses open source software such as Rainloop to provide service. Users support the service through donations and buying extra storage. The mailbox limit is 1 GB, but extra storage can be purchased 0.15€ per GB per month paid yearly.
Domains and Aliases
Disroot lets users use their own domain. They have aliases, however you must manually apply for them.
Payment Methods
Disroot accepts Bitcoin and Faircoin as payment methods. They also accept PayPal, direct bank deposit, and Patreon payments. Disroot is a not-for-profit organization that also accepts donations through Liberapay, Flattr, and Monero, but these payment methods cannot be used to purchase services.
Account Security
Disroot supports TOTP two factor authentication for webmail only. They do not allow U2F security key authentication.
Data Security
Disroot uses full disk encryption. However, it doesn't appear to be "zero access", meaning it is technically possible for them to decrypt the data they have.
Disroot also uses the standard CalDAV and CardDAV protocols for calendars and contacts, which do not support E2EE. A standalone option may be more appropriate.
Email Encryption
Disroot allows for encrypted emails to be sent from their webmail application using OpenPGP. However, Disroot has not integrated a Web Key Directory (WKD) for users on their platform.
.onion Service
Disroot does not operate a .onion service.
Extra Functionality
They offer other services such as NextCloud, XMPP Chat, Etherpad, Ethercalc, Pastebin, Online polls and a Gitea instance. They also have an app available in F-Droid.
Tutanota Free
Tutanota.com is an email service with a focus on security and privacy through the use of encryption. Tutanota has been in operation since 2011 and is based in Hanover, Germany. Accounts start with 1GB storage with their free plan.
Tutanota doesn't allow the use of third-party email clients. There are plans to allow Tutanota pull email from external email accounts using the IMAP protocol. Email import is currently not possible.
Emails can be exported individually or by bulk selection. Tutanota does not allow for subfolders as you might expect with other email providers.
Tutanota is working on a desktop client and they have an app available in F-Droid. They also have their app in conventional stores such as App Store on iOS and Google Play for Android.
Domains and Aliases
Paid Tutanota accounts can use up to 5 aliases and custom domains. Tutanota doesn't allow for subaddressing (plus addresses), but you can use a catch-all with a custom domain.
Payment Methods
Tutanota accepts only credit cards and PayPal.
Account Security
Tutanota supports two factor authentication. Users can either use TOTP or U2F. U2F support is not yet available on Android.
Data Security
Tutanota has zero access encryption at rest for your emails, address book contacts, and calendars. This means the messages and other data stored in your account are only readable by you.
Email Encryption
Tutanota does not use OpenPGP. Tutanota users can only receive encrypted emails when external users send them through a temporary Tutanota mailbox.
Tutanota does have plans to support AutoCrypt. This would allow for external users to send encrypted emails to Tutanota users as long as their email client supports the AutoCrypt headers.
.onion Service
Tutanota does not operate a .onion service but may consider it in the future.
Extra Functionality
Tutanota offers the business version of Tutanota to non-profit organizations for free or with a heavy discount.
Tutanota also has a business feature called Secure Connect. This ensures customer contact to the business uses E2EE. The feature costs €240/y.
StartMail Personal USD $59.95/y
StartMail.com is an email service with a focus on security and privacy through the use of standard OpenPGP encryption. StartMail has been in operation since 2014 and is based in Boulevard 11, Zeist Netherlands. Accounts start with 10GB. They offer a 30-day trial.
Domains and Aliases
Personal accounts can use Custom or Generated aliases. Business accounts can use Domain aliases.
Payment Methods
StartMail accepts Visa, MasterCard, American Express and Paypal. StartMail also has other payment options such as Bitcoin (currently only for Personal accounts) and SEPA Direct Debit for accounts older than a year.
Account Security
StartMail supports TOTP two factor authentication for webmail only. They do not allow U2F security key authentication.
Data Security
StartMail has zero access encryption at rest, using their "user vault" system. When a user logs in, the vault is opened, and the email is then moved to the vault out of the queue where it is decrypted by the corresponding private key.
StartMail supports importing contacts however, they are only accessible in the webmail and not through protocols such as CalDAV. Contacts are also not stored using zero knowledge encryption, so a standalone option may be more appropriate.
Email Encryption
StartMail has integrated encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys.
.onion Service
StartMail does not operate a .onion service.
Extra Functionality
StartMail allows for proxying of images within emails. If a user allows the remote image to be loaded, the sender won't know what the user's IP address is.
Desktop Email Clients
Thunderbird
Thunderbird is a free, open source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Twitter) client developed by the Thunderbird community, and previously by the Mozilla Foundation.
Mailpile
Mailpile is a free, community funded, open source email client with user-friendly encryption and privacy features.
Mailvelope
Mailvelope is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard.
Worth Mentioning
Mobile Email Clients
Android Email Clients
FairEmail
FairEmail is a minimal, open source email app, using open standards (IMAP, SMTP, OpenPGP) with a low data and battery usage.
K-9 Mail
K-9 Mail is an independent mail application that supports both POP3 and IMAP mailboxes, but only supports push mail for IMAP.
iOS Email Clients
Canary Mail
Canary Mail is a paid email client designed to make end-to-end encryption seamless with security features such as a biometric app lock.
Closed source
Worth Mentioning
Privacy Respecting Search Engines
If you are currently using search engines like Google, Bing, or Yahoo, you should pick an alternative here.
Searx
Searx is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing information about its users. There is a list of public instances or you can try the PrivacyTools instance.
DuckDuckGo
DuckDuckGo is a "search engine that doesn't track you." Some of DuckDuckGo's code is free software hosted at GitHub, but the core is proprietary. The company is based in the USA.
Qwant
Qwant is a search engine with its philosophy based on two principles: no user tracking and no filter bubble. The company is based in France.
Startpage.com
Startpage.com is a search engine that provides Google search results with complete privacy protection. Startpage BV is a Netherlands-based company that has been dedicated to privacy-respecting search since 2006.
Warning
Worth Mentioning
Encrypted Instant Messengers
If you are currently using an Instant Messenger like Telegram, LINE, Viber, WhatsApp, or plain SMS, you should pick an alternative here.
FairEmail
FairEmail is a minimal, open source email app, using open standards (IMAP, SMTP, OpenPGP) with a low data and battery usage.
K-9 Mail
K-9 Mail is an independent mail application that supports both POP3 and IMAP mailboxes, but only supports push mail for IMAP.
Canary Mail
Canary Mail is a paid email client designed to make end-to-end encryption seamless with security features such as a biometric app lock.
Closed source
Worth Mentioning
Privacy Respecting Search Engines
Searx
Searx is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing information about its users. There is a list of public instances or you can try the PrivacyTools instance.
DuckDuckGo
DuckDuckGo is a "search engine that doesn't track you." Some of DuckDuckGo's code is free software hosted at GitHub, but the core is proprietary. The company is based in the USA.
Qwant
Qwant is a search engine with its philosophy based on two principles: no user tracking and no filter bubble. The company is based in France.
Startpage.com
Startpage.com is a search engine that provides Google search results with complete privacy protection. Startpage BV is a Netherlands-based company that has been dedicated to privacy-respecting search since 2006.
Warning
Worth Mentioning
Encrypted Instant Messengers
We only recommend instant messenger programs or apps that support end-to-end encryption (E2EE). When E2EE is used, all transmissions (messages, voice, video, etc.) are encrypted before they are sent from your device. E2EE protects both the authenticity and confidentiality of the transmission as they pass through any part of the network (servers, etc.).
All the client programs/apps we chose are free and open-source software unless otherwise mentioned. This to ensure that the code can be independently verified by experts now and in the future.
We have described the three main types of messaging programs that exist: Centralized, Federated and Peer-to-Peer (P2P), with the advantages and disadvantages of each.
Centralized
Centralized messengers are those where every participant is on the same server or network of servers controlled by the same organization.
Signal
Signal is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling. All communications are E2EE unless you choose to send as SMS. Its protocol has also been indepedently audited (PDF)
Requires phone number
VoIP
Advantages
Disadvantages
Federated
Federated messengers use multiple, independent servers that are able to talk to each other (email is one example of a federated service). Federation allows system administrators to control their own server and still be a part of the larger communications network.
Element
Element (formerly Riot) is the reference client for the Matrix network. The Matrix open standard is an open-source standard for secure, decentralized, real-time communication.
VoIP
Advantages
Disadvantages
Worth Mentioning
Peer to Peer (P2P)
Peer-to-Peer instant messengers connect directly to each other without requiring third-party servers. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made.
Briar
Encrypted instant messenger that connects to contacts via Wi-Fi, Bluetooth, or Tor over the internet to synchronize messages. Technology such as this has proven to be useful when Internet availability is an issue, such as in times of crisis.
Jami
Encrypted instant messaging and video calling software. All communications are E2EE using TLS 1.3 and never stored elsewhere than on user's devices, even when TURN servers are used.
Warning
VoIP
Advantages
Disadvantages
Video/Voice Calling
Linphone
Linphone is an open-source SIP Phone and a free voice over IP service, available on mobile and desktop environments and on web browsers. It supports ZRTP for end-to-end encrypted voice and video communication.
Jitsi Meet
Jitsi Meet is a free and open-source multiplatform voice (VoIP), video conferencing, and instant messaging application with optional E2EE. It can be used from the browser, in desktop applications or on smartphones. Additional features include screen sharing for presentations and an always-on-top floating call window when minimized. See the list of public Jitsi Meet instances.
Requires WebRTC
Experimental E2EE
Mumble
Mumble is an open-source, low-latency, and high quality voice chat application primarily intended for use while gaming. Note that while Mumble doesn't log messages or record by default, it's missing end-to-end encryption, so self-hosting is recommended.
Related Information
Team Chat Platforms
Element
Element (formerly Riot) is the reference client for the Matrix network. The Matrix open standard is an open-source standard for secure, decentralized, real-time communication.
VoIP
Rocket.chat
Rocket.chat is an self-hostable open source platform for team communication. It has optional federation and experimental E2EE.
Experimental E2EE
VoIP
File Sharing
OnionShare
OnionShare is an open-source tool that lets you securely and anonymously share a file of any size. It works by starting a web server accessible as a Tor onion service, with an unguessable URL that you can share with the recipients to download or send files.
Magic Wormhole
Magic Wormhole is a package that provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. Their motto: "Get things from one computer to another, safely."
Worth Mentioning
Encrypted Cloud Storage Services
Nextcloud - Choose your hoster
Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. The only limits on storage and bandwidth are the limits on the server provider you choose.
Worth Mentioning
Self-Hosted Cloud Server Software
Nextcloud
Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. The only limits on storage and bandwidth are the limits on the server provider you choose.
Tahoe-LAFS
Tahoe-LAFS is a free and open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security.
Worth Mentioning
Secure Hosting Provider
Data Center: Bahnhof
Bahnhof is one of Sweden’s largest network operators, founded in 1994. They specialize in innovative data center construction: Extreme security coupled with low-cost green energy has made them world famous.
VPS & Domain: Njalla
Njalla is a privacy-aware domain registration service and VPS provider based in Nevis (with VPS data centers in Sweden). It is created by people from The Pirate Bay and IPredator VPN. Accepted payments: Bitcoin, Litecoin, Monero, Zcash, DASH, Bitcoin Cash and PayPal.
Warning
File Sync
Syncthing
Syncthing replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to choose where it is stored, if it is shared with some third-party, and how it is transmitted over the Internet.
Worth Mentioning
Password Manager Software
Bitwarden - Cloud/Self-host
Bitwarden is a free and open-source password manager. It aims to solve password management problems for individuals, teams, and business organizations. Bitwarden is among the easiest and safest solutions to store all of your logins and passwords while conveniently keeping them synced between all of your devices. If you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden server.
KeePassXC - Local
KeePassXC is a community fork of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal to extend and improve it with new features and bugfixes to provide a feature-rich, fully cross-platform and modern open-source password manager.
LessPass - Browser
LessPass is a free and open-source password manager that generates unique passwords for websites, email accounts, or anything else based on a master password and information you know. No sync needed. Uses PBKDF2 and SHA-256. It's advised to use the browser addons for more security.
Worth Mentioning
Calendar and Contacts Sync
Nextcloud
Nextcloud is a suite of client-server software for creating and using file hosting services. This includes calendar sync via CalDAV and contacts sync via CardDAV. Nextcloud is free and open-source, thereby allowing anyone to install and operate it without charge on a private server.
EteSync
EteSync is a secure, end-to-end encrypted, and privacy-respecting cloud backup and synchronization software for your personal information (e.g. contacts and calendars). There are native clients for Android, iOS, and the web, and an adapter layer for most desktop clients. It costs $24 per year to use, or you can host the server yourself for free.
Email Providers
Many email providers also offer calendar and or contacts sync services. Refer to our Email Provider recommendations to choose an email provider and see if they also offer calendar and/or contacts sync.
Worth Mentioning
File Encryption Software
VeraCrypt - Disk Encryption
VeraCrypt is a source-available freeware utility used for on-the-fly encryption. It can create a virtual encrypted disk within a file or encrypt a partition or the entire storage device with pre-boot authentication. VeraCrypt is a fork of the discontinued TrueCrypt project. It was initially released on June 22, 2013. According to its developers, security improvements have been implemented and issues raised by the initial TrueCrypt code audit have been addressed.
GNU Privacy Guard - Email Encryption
GnuPG is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. Current versions of PGP (and Veridis' Filecrypt) are interoperable with GnuPG and other OpenPGP-compliant systems. GnuPG is a part of the Free Software Foundation's GNU software project, and has received major funding from the German government.
7 Zip
7-Zip is a free and open-source file archiver, a utility used to place groups of files within compressed containers. On Linux, MacOS etc. the command-line tool p7zip is used and integrates into various interfaces such as FileRoller, Xarchiver, Ark.
Worth Mentioning
Self-contained Networks
Tor
The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Tor is an effective censorship circumvention tool.
I2P Anonymous Network
The Invisible Internet Project (I2P) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous Web surfing, chatting, blogging, and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. The software is free and open-source and is published under multiple licenses.
The Freenet Project
Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools were originally designed by Ian Clarke, who defined Freenet's goal as providing freedom of speech on the Internet with strong anonymity protection.
Worth Mentioning
Decentralized Social Networks
Mastodon - Twitter Alternative
Mastodon is a social network based on open web protocols and free, open-source software. It is decentralized like email, users can exist on different servers or even different platforms but still communicate with each other. It also has the most users, and the most diverse (in terms of interests) users, it looks good, and it is easy to setup yourself. If you are looking for a server to join, you are welcome to join our hosted instance: social.privacytools.io
diaspora* - Google+ Alternative
diaspora* is based on three key philosophies: Decentralization, Freedom, and Privacy. It is intended to address privacy concerns related to centralized social networks by allowing users set up their own server (or "pod") to host content. Pods can then interact to share status updates, photographs, and other social data.
Friendica - Facebook Alternative
Friendica has an emphasis on extensive privacy settings and easy server installation. It aims to federate with as many other social networks as possible. Currently, Friendica users can integrate contacts from Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io and other services in their social streams.
PixelFed - Instagram Alternative
PixelFed is a free and ethical photo sharing platform, powered by ActivityPub federation. Pixelfed is an open-source, federated platform. You can run your own instance or join an existing one.
Pleroma - Twitter Alternative
Pleroma is a free, federated social networking server built on open protocols. It is compatible with Mastodon and many other ActivityPub and OStatus implementations.
Worth Mentioning
Social News Aggregators
Aether
Aether is a free and open-source decentralized social news aggregator with a built-in voting system.
Tildes
Tildes is a web-based self-hostable online bulletin board. It is licensed under AGPLv3.
Raddle
Raddle is a public Postmill instance focused on privacy and anti-censorship.
Worth Mentioning
Decentralized Video Platforms
PeerTube
PeerTube, developed by Framasoft, is a free and decentralized alternative to video platforms, with over 400,000 videos published by over 50,000 users and viewed over 10 million times. If you are looking for a server to join, you are welcome to join our hosted instance: tube.privacytools.io
Frontends and Proxies
Invidious
Invidious is an alternative front-end to YouTube. It is free software, with no advertising or Javascript dependency to play videos, with lots of other features that allow you to have a complete YouTube experience, sans Google.
Encrypted DNS Resolvers
| DNS Provider | Server Locations | Privacy Policy | Type | Logging | Protocols | DNSSEC | QNAME Minimization | Filtering | Source Code | Hosting Provider |
|---|---|---|---|---|---|---|---|---|---|---|
| AdGuard | Anycast (based in Cyprus) | Commercial | Some | DoH, DoT, DNSCrypt | Yes | Yes | Based on server choice | Choopa, LLC, Serveroid, LLC | ||
| BlahDNS | Finland, Germany, Japan Singapore | Hobby Project | No | DoH, DoT , DNSCrypt | Yes | Yes | Ads, trackers, malicious domains Based on server choice only for DoH | Choopa, LLC, Hetzner Online GmbH | ||
| Cloudflare | Anycast (based in US) | Commercial | Some | DoH, DoT | Yes | Yes | Based on server choice | ? | Self | |
| CZ.NIC | Czech Republic | Association | No | DoH, DoT | Yes | Yes | ? | ? | Self | |
| Foundation for Applied Privacy | Austria | Non-Profit | Some | DoH, DoT | Yes | Yes | No | ? | IPAX OG | |
| LibreDNS | Germany | Informal collective | No | DoH, DoT | Yes | Yes | Based on server choice only for DoH | Hetzner Online GmbH | ||
| NextDNS | Anycast (based in US) | Commercial | Based on user choice | DoH, DoT, DNSCrypt | Yes | Yes | Based on server choice | ? | Self | |
| NixNet | Anycast (based in US), US, Luxembourg | Informal collective | No | DoH, DoT | Yes | Yes | Based on server choice | FranTech Solutions | ||
| PowerDNS | The Netherlands | Hobby Project | No | DoH | Yes | No | No | TransIP B.V. Admin | ||
| Quad9 | Anycast (based in US) | Non-Profit | Some | DoH, DoT, DNSCrypt | Yes | Yes | Malicious domains | ? | Self, Packet Clearing House | |
| Snopyta | Finland | Informal collective | No | DoH, DoT | Yes | Yes | No | ? | Hetzner Online GmbH | |
| UncensoredDNS | Anycast (based in Denmark), Denmark, US | Hobby Project | No | DoT | Yes | No | No | ? | Self, Telia Company AB |
Encrypted DNS Client Recommendations for Desktop
Unbound
A validating, recursive, caching DNS resolver, supporting DNS-over-TLS, and has been independently audited.
dnscrypt-proxy
A DNS proxy with support for DNSCrypt, DNS-over-HTTPS, and Anonymized DNSCrypt, a relay-based protocol that the hides client IP address.
Stubby
An application that acts as a local DNS-over-TLS stub resolver. Stubby can be used in combination with Unbound by managing the upstream TLS connections (since Unbound cannot yet re-use TCP/TLS connections) with Unbound providing a local cache.
Firefox's built-in DNS-over-HTTPS resolver
Firefox comes with built-in DNS-over-HTTPS support for NextDNS and Cloudflare but users can manually use any other DoH resolver.
Warning
Encrypted DNS Client Recommendations for Android
Android 9's built-in DNS-over-TLS resolver
Android 9 (Pie) comes with built-in DNS-over-TLS support without the need for a 3rd-party application.
Warning
Nebulo
An open-source Android client supporting DNS-over-HTTPS and DNS-over-TLS, caching DNS responses, and locally logging DNS queries.
Encrypted DNS Client Recommendations for iOS
DNSCloak
An open-source iOS client supporting DNS-over-HTTPS, DNSCrypt, and dnscrypt-proxy options such as caching DNS responses, locally logging DNS queries, and custom block lists. Users can add custom resolvers by DNS stamp.
Apple's native support
In iOS, iPadOS, tvOS 14 and macOS 11, DoT and DoH were introduced. DoT and DoH are supported natively by installation of profiles (through mobileconfig files opened in Safari). After installation, the encrypted DNS server can be selected in Settings → General → VPN and Network → DNS.
Definitions
DNS-over-TLS (DoT)
A security protocol for encrypted DNS on a dedicated port 853. Some providers support port 443 which generally works everywhere while port 853 is often blocked by restrictive firewalls.
DNS-over-HTTPS (DoH)
Similar to DoT, but uses HTTPS instead, being indistinguishable from "normal" HTTPS traffic on port 443 and more difficult to block. Warning
DNSCrypt
With an open specification, DNSCrypt is an older, yet robust method for encrypting DNS.
Anonymized DNSCrypt
A lightweight protocol that hides the client IP address by using pre-configured relays to forward encrypted DNS data. This is a relatively new protocol created in 2019 currently only supported by dnscrypt-proxy and a limited number of relays.
Digital Notebook
Joplin
Joplin is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers end-to-end encryption and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes.
Standard Notes
Standard Notes is a simple and private notes app that makes your notes easy and available everywhere you are. It features end-to-end encryption on every platform, and a powerful desktop experience with themes and custom editors. It has also been independently audited (PDF).
Turtl
Turtl lets you take notes, bookmark websites, and store documents for sensitive projects. From sharing passwords with your coworkers to tracking research on an article you're writing, Turtl keeps it all safe from everyone but you and those you share with.
Warning
Worth Mentioning
Pastebin Services
PrivateBin
PrivateBin is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin.
CryptPad
CryptPad is an open-source, zero knowledge, and real-time collaborative editor. Data is encrypted/decrypted in the browser, using Salsa20 with Poly1305 to encrypt pads.
Productivity Tools
CryptPad
CryptPad is a private-by-design alternative to popular office tools and cloud services. All content is end-to-end encrypted. It is free and open-source, enabling anyone to verify its security by auditing the code. The development team is supported by donations and grants. No registration is required, and it can be used anonymously via Tor Browser.
Etherpad
Etherpad is a highly customizable open-source online editor providing collaborative editing in real time. Here are a list of sites that run Etherpad.
Write.as
Write.as is a cross-platform, privacy-oriented blogging platform. It's anonymous by default, letting you publish without signing up. If you create an account, it doesn't require any personal information. No ads, distraction-free, and built on a sustainable business model.
Worth Mentioning
Metadata Removal Tools
MAT2
MAT2 is free software, which allows the removal of metadata of image, audio, torrent, and document file types. It provides both a command line tool and a graphical user interface via an extension for Nautilus, the default file manager of GNOME.
ExifCleaner
Introductory Operating Systems
Fedora Workstation Linux
Fedora is a Linux distribution developed by the Fedora Project and sponsored by Red Hat. Fedora Workstation is a secure, reliable, and user-friendly edition developed for desktops and laptops. Fedora by default comes with the GNOME desktop environment, other desktop environments are also available.
Ubuntu Linux
Ubuntu is a Linux distribution developed by Canonical Ltd. Ubuntu is a reliable and distribution that is user-friendly and can be run on desktops, servers, and IoT devices. Ubuntu uses GNOME as the default desktop environment, while other desktop environments are also available.
Advanced Operating Systems
Alpine Linux Linux
Alpine Linux is a very minimal distribution designed to be secure and very resource efficient. Alpine Linux can run from RAM, and merge configuration files into the system on boot using Alpine local backup. Alpine Linux is often used on servers and in Linux containers.
Arch Linux Linux
A simple, lightweight Linux distribution. It is composed predominantly of free and open-source software, and supports community involvement.
Reproducible builds
Debian Linux
Debian is a Unix-like computer operating system and a Linux distribution that is composed entirely of free and open-source software, most of which is under the GNU General Public License, and packaged by a group of individuals known as the Debian project.
Reproducible builds
NixOS Linux
NixOS is a Linux distribution with a unique approach to package and configuration management. Built on top of the Nix package manager, it is completely declarative, makes upgrading systems reliable, and has many other advantages.
Reproducible builds
Qubes OS Xen
Qubes is an open-source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, the X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers.
Tor-Focused Distributions
Tails Linux
Tails is a live operating system that can boot on almost any computer from a DVD, USB stick, or SD card you control. It aims at preserving privacy and anonymity, and circumventing censorship by forcing Internet connections through the Tor network; leaving no trace on the computer; and using state-of-the-art cryptographic tools to encrypt files, emails, and instant messages.
Whonix Linux
A Debian-based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway". All communication are forced through the Tor network to accomplish this. Whonix is best used in conjunction with Qubes.
Mobile Operating Systems
Android-based Operating Systems
Even though the source code of the following operating systems is provided, installing Google Apps may compromise your setup.
CalyxOS
AOSP
CalyxOS is a custom ROM based on the Android Open Source Project with Pixel phones. It aims to be secure and private by default including a number of good choices for default applications. It also supports verified boot.
GrapheneOS
AOSP
GrapheneOS (formerly known as CopperheadOS) is a free and open-source security- and privacy-focused mobile operating system built on top of the Android Open Source Project. It currently specifically targets devices offering strong hardware security.
LineageOS (Official Builds)
AOSP
LineageOS is a custom ROM based on the Android Open Source Project with official support for a wide variety of devices. The project is the successor to the popular CyanogenMod project, focusing on system control and customization, device longevity, and privacy. For security reasons, we do not recommend third-party builds of LineageOS for unsupported devices.
Worth Mentioning
Android Privacy Add-ons
Control your traffic with NetGuard
NetGuard provides simple and advanced methods to block certain apps from accessing the internet, without requiring root privileges. Applications and addresses can be individually allowed or denied access to your Wi-Fi and/or mobile connections, allowing you to control exactly which apps are able to phone home or not.
Tor for Android with Orbot
Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world.
See also
Other Mobile Operating Systems
Ubuntu Touch
Linux
Ubuntu Touch is a free and open-source operating system for smartphones and tablets. It's an alternative to the current popular mobile operating systems on the market. Only a few devices are supported.
Open Source Router Firmware
OpenWrt
Linux
OpenWrt is an operating system (in particular, an embedded operating system) based on the Linux kernel, primarily used on embedded devices to route network traffic. The main components are the Linux kernel, util-linux, uClibc and BusyBox. All components have been optimized for size, to be small enough for fitting into the limited storage and memory available in home routers.
pfSense
BSD
pfSense is an open source firewall/router computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for a network and is noted for its reliability and offering features often only found in expensive commercial firewalls. pfSense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and as a VPN endpoint.
LibreCMC
GNU/Linux
LibreCMC is a GNU/Linux-libre distribution for computers with minimal resources, such as the Ben Nanonote, ath9k-based Wi-Fi routers, and other hardware with emphasis on free software. The project's current goal is to aim for compliance with the GNU Free System Distribution Guidelines (GNU FSDG) and ensure that the project continues to meet these requirements set forth by the Free Software Foundation (FSF).
Don't use Windows 10 - It's a privacy nightmare
Microsoft introduced a lot of new features in Windows 10 such as Cortana. However, most of them are violating your privacy.
CalyxOS AOSP
CalyxOS is a custom ROM based on the Android Open Source Project with Pixel phones. It aims to be secure and private by default including a number of good choices for default applications. It also supports verified boot.
GrapheneOS AOSP
GrapheneOS (formerly known as CopperheadOS) is a free and open-source security- and privacy-focused mobile operating system built on top of the Android Open Source Project. It currently specifically targets devices offering strong hardware security.
LineageOS (Official Builds) AOSP
LineageOS is a custom ROM based on the Android Open Source Project with official support for a wide variety of devices. The project is the successor to the popular CyanogenMod project, focusing on system control and customization, device longevity, and privacy. For security reasons, we do not recommend third-party builds of LineageOS for unsupported devices.
Control your traffic with NetGuard
NetGuard provides simple and advanced methods to block certain apps from accessing the internet, without requiring root privileges. Applications and addresses can be individually allowed or denied access to your Wi-Fi and/or mobile connections, allowing you to control exactly which apps are able to phone home or not.
Tor for Android with Orbot
Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world.
Ubuntu Touch Linux
Ubuntu Touch is a free and open-source operating system for smartphones and tablets. It's an alternative to the current popular mobile operating systems on the market. Only a few devices are supported.
Open Source Router Firmware
OpenWrt Linux
OpenWrt is an operating system (in particular, an embedded operating system) based on the Linux kernel, primarily used on embedded devices to route network traffic. The main components are the Linux kernel, util-linux, uClibc and BusyBox. All components have been optimized for size, to be small enough for fitting into the limited storage and memory available in home routers.
pfSense BSD
pfSense is an open source firewall/router computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for a network and is noted for its reliability and offering features often only found in expensive commercial firewalls. pfSense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and as a VPN endpoint.
LibreCMC GNU/Linux
LibreCMC is a GNU/Linux-libre distribution for computers with minimal resources, such as the Ben Nanonote, ath9k-based Wi-Fi routers, and other hardware with emphasis on free software. The project's current goal is to aim for compliance with the GNU Free System Distribution Guidelines (GNU FSDG) and ensure that the project continues to meet these requirements set forth by the Free Software Foundation (FSF).
Don't use Windows 10 - It's a privacy nightmare
This tool uses some known methods that attempt to disable major tracking features in Windows 10.
Related Information
Some good news
More bad news
More Privacy Resources
Guides
Information
Tools
Note: Just being open source does not make software secure!
It's important for a website like PrivacyTools to stay up-to-date. Keep an eye on software updates for the applications listed on our site. Follow recent news about providers that we recommend. We try our best to keep up, but we're not perfect and the internet is changing fast. If you find an error, or you think a provider should not be listed here, or a qualified service provider is missing, or a browser plugin is not the best choice anymore, or anything else... Talk to us please. You can also find us on several Matrix rooms, primarily #general:privacytools.io. XMPP users can join there via #general#privacytools.io@matrix.org. When using our services, users should follow our Code of Conduct.
Develop on GitHub
The complete website source code is available on GitHub. Join our developer team!
This is a community project aiming to deliver the best information available to improve privacy online. Thank you for participating. This project needs you.
