privacyguides.org/_includes/sections/file-sharing.html

29 lines
2.0 KiB
HTML
Raw Normal View History

2019-01-20 11:54:01 -05:00
<h1 id="filesharing" class="anchor"><a href="#filesharing"><i class="fas fa-link anchor-icon"></i></a> File Sharing</h1>
<div class="row mb-2">
{% include card.html color="success"
title="OnionShare"
image="assets/img/tools/OnionShare.png"
url="https://onionshare.org/"
tor="http://elx57ue5uyfplgva.onion/"
footer="OS: Windows, macOS, Linux."
description="OnionShare is an open source tool that lets you securely and anonymously share a file of any size. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable URL to access and download the files. It doesn't require setting up a server on the internet somewhere or using a third-party filesharing service. You host the file on your own computer and use a Tor onion service to make it temporarily accessible over the internet."
%}
{% include card.html color="primary"
2019-03-31 04:18:55 -04:00
title="Firefox Send"
image="assets/img/tools/Firefox.png"
url="https://send.firefox.com/"
footer='OS: Browser and Android'
description="Send uses end-to-end encryption to keep your data secure from the moment you share to the moment your file is opened. It also offers security controls that you can set. You can choose when your file link expires, the number of downloads, and whether to add an optional password for an extra layer of security."
%}
{% include card.html color="warning"
2019-01-20 11:54:01 -05:00
title="Magic Wormhole"
image="assets/img/tools/Magic-Wormhole.png"
url="https://github.com/warner/magic-wormhole"
2019-03-31 07:27:28 -04:00
footer='OS: cross-platform <a href=https://github.com/warner/magic-wormhole#license-compatibility>(python)</a>'
2019-03-31 07:23:06 -04:00
description='Get things from one computer to another, safely. This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The two endpoints are identified by using identical "wormhole codes": in general, the sending machine generates and displays the code, which must then be typed into the receiving machine.
2019-01-20 11:54:01 -05:00
%}
</div>