mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-06-24 22:40:29 -04:00
style!: Make minor changes across recommendation pages for consistency (#2972)
- Grammar, Style, and Wording Changes - Remove commas where pauses or breaks in reading may not be needed - Reduce instances of comma splices by replacing commas with semicolons or em dashes where appropriate - Spell out abbreviations like E2EE for the first instance of the term on the page, then use the abbreviation for the subsequent instances - Add line breaks in card descriptions for a cleaner look, particularly for mentions of an accompanying blog review of a tool - Move more technical information from recommendation blurb to the description under the card - Format quotations from audits as block quotes - Standardize syntax for tooltips - Arrange download links according to the widely used order - Mobile app stores > alternative distribution methods (e.g., GitHub) > developer-owned or -operated F-Droid repositories >> desktop platforms > Flathub >> browsers >> web - Shorten Chrome extension links - Standardize icon for web download links - For "Repository" buttons, embed direct links to project's Readme to differentiate them from "Source Code" links - Other Changes - Add GitHub releases link for IVPN - Mention CryptPad's official public instance and add link to list of public instances - Replace current link to Miniflux docs with a direct link to the end user docs - Update version of Newsboat documentation link - Update and reword guidance on finding YouTube channel code for RSS feed - Remove F-Droid download link for Stingle since it is not owned by the developer or dev team Signed-off-by: Jonah Aragon <jonah@privacyguides.org> Signed-off-by: fria <fria@privacyguides.org> Signed-off-by: Daniel Gray <dngray@privacyguides.org>
This commit is contained in:
parent
353d1fed48
commit
06d2f0e3e1
32 changed files with 214 additions and 186 deletions
|
@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include:
|
||||||
- Those which are too difficult for us to administer.
|
- Those which are too difficult for us to administer.
|
||||||
- Those that are for purposes outside our general mission.
|
- Those that are for purposes outside our general mission.
|
||||||
|
|
||||||
An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum.
|
An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum.
|
||||||
|
|
||||||
Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee.
|
Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee.
|
||||||
|
|
||||||
|
|
|
@ -7,7 +7,7 @@ description: An overview of several network architectures commonly used by insta
|
||||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
||||||
|
|
||||||
[Recommended Instant Messengers](../real-time-communication.md){ .md-button }
|
[Recommended Instant Messengers](../real-time-communication.md){ .md-button }
|
||||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/){ .md-button }
|
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why){ .md-button }
|
||||||
|
|
||||||
## Centralized Networks
|
## Centralized Networks
|
||||||
|
|
||||||
|
|
|
@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the
|
||||||
|
|
||||||
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||||
|
|
||||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/){ .md-button }
|
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor){ .md-button }
|
||||||
|
|
||||||
Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
|
Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity.
|
||||||
|
|
||||||
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
|
||||||
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" }
|
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" }
|
||||||
|
@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas
|
||||||
|
|
||||||
Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions.
|
Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions.
|
||||||
|
|
||||||
Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like:
|
Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so:
|
||||||
|
|
||||||
- [x] You → VPN → Tor → Internet
|
- [x] You → VPN → Tor → Internet
|
||||||
|
|
||||||
From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you.
|
From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you.
|
||||||
|
|
||||||
This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP.
|
This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP.
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do
|
||||||
- You → VPN → Tor → VPN → Internet
|
- You → VPN → Tor → VPN → Internet
|
||||||
- Any other configuration
|
- Any other configuration
|
||||||
|
|
||||||
Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity.
|
Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity.
|
||||||
|
|
||||||
Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine.
|
Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine.
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus
|
||||||
<div class="admonition info" markdown>
|
<div class="admonition info" markdown>
|
||||||
<p class="admonition-title">VPN/SSH Fingerprinting</p>
|
<p class="admonition-title">VPN/SSH Fingerprinting</p>
|
||||||
|
|
||||||
The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns.
|
The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns.
|
||||||
|
|
||||||
Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind.
|
Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind.
|
||||||
|
|
||||||
|
@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels.
|
Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels.
|
||||||
|
|
||||||
## What Tor is Not
|
## What Tor is Not
|
||||||
|
|
||||||
The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you.
|
The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you.
|
||||||
|
|
||||||
### Tor is not a free VPN
|
### Tor is not a free VPN
|
||||||
|
|
||||||
|
@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a
|
||||||
|
|
||||||
Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent.
|
Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent.
|
||||||
|
|
||||||
As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc.
|
As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc.
|
||||||
|
|
||||||
### Tor usage is not undetectable
|
### Tor usage is not undetectable
|
||||||
|
|
||||||
**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established.
|
**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established.
|
||||||
|
|
||||||
Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored.
|
Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored.
|
||||||
|
|
||||||
It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network.
|
It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network.
|
||||||
|
|
||||||
### Tor Browser is not the most *secure* browser
|
### Tor Browser is not the most *secure* browser
|
||||||
|
|
||||||
Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity.
|
Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity.
|
||||||
|
|
||||||
Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example):
|
Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example):
|
||||||
|
|
||||||
1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks).
|
1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks).
|
||||||
2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer).
|
2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer).
|
||||||
|
|
||||||
Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks.
|
Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks.
|
||||||
|
|
||||||
## Path Building to Clearnet Services
|
## Path Building to Clearnet Services
|
||||||
|
|
||||||
|
@ -121,7 +121,7 @@ The entry node, often called the guard node, is the first node to which your Tor
|
||||||
|
|
||||||
Unlike the other nodes, the Tor client will randomly select an entry node and stick with it for two to three months to protect you from certain attacks.[^1]
|
Unlike the other nodes, the Tor client will randomly select an entry node and stick with it for two to three months to protect you from certain attacks.[^1]
|
||||||
|
|
||||||
[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2))
|
[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2))
|
||||||
|
|
||||||
### The Middle Node
|
### The Middle Node
|
||||||
|
|
||||||
|
@ -135,13 +135,13 @@ The exit node is the point in which your web traffic leaves the Tor network and
|
||||||
|
|
||||||
The exit node will be chosen at random from all available Tor nodes ran with an exit relay flag.[^2]
|
The exit node will be chosen at random from all available Tor nodes ran with an exit relay flag.[^2]
|
||||||
|
|
||||||
[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html))
|
[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag))
|
||||||
|
|
||||||
## Path Building to Onion Services
|
## Path Building to Onion Services
|
||||||
|
|
||||||
"Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`.
|
"Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`.
|
||||||
|
|
||||||
Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
|
Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
|
||||||
|
|
||||||
<figure style="width:100%" markdown>
|
<figure style="width:100%" markdown>
|
||||||

|

|
||||||
|
@ -151,15 +151,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl
|
||||||
|
|
||||||
## Encryption
|
## Encryption
|
||||||
|
|
||||||
Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order.
|
Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order.
|
||||||
|
|
||||||
Once Tor has built a circuit, data transmission is done as follows:
|
Once Tor has built a circuit, data transmission is done as follows:
|
||||||
|
|
||||||
1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node.
|
1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node.
|
||||||
|
|
||||||
2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node.
|
2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node.
|
||||||
|
|
||||||
3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address.
|
3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address.
|
||||||
|
|
||||||
Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back.
|
Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back.
|
||||||
|
|
||||||
|
@ -189,7 +189,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official**
|
||||||
|
|
||||||
Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis.
|
Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis.
|
||||||
|
|
||||||
To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately.
|
To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately.
|
||||||
|
|
||||||
Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time.
|
Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time.
|
||||||
|
|
||||||
|
@ -197,7 +197,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN.
|
||||||
|
|
||||||
Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability.
|
Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability.
|
||||||
|
|
||||||
Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind.
|
Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind.
|
||||||
|
|
||||||
If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake.
|
If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake.
|
||||||
|
|
||||||
|
|
|
@ -43,7 +43,7 @@ To run AI locally, you need both an AI model and an AI client.
|
||||||
|
|
||||||
There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_(deep_learning)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware.
|
There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_(deep_learning)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware.
|
||||||
|
|
||||||
To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards).
|
To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards).
|
||||||
|
|
||||||
## AI Chat Clients
|
## AI Chat Clients
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an
|
||||||
|
|
||||||
In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp).
|
In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary }
|
[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" }
|
[:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" }
|
||||||
[:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" }
|
[:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" }
|
||||||
|
@ -123,14 +123,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
|
||||||
|
|
||||||
<div class="admonition recommendation" markdown>
|
<div class="admonition recommendation" markdown>
|
||||||
|
|
||||||
{align=right}
|
{align=right}
|
||||||
|
|
||||||
**Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows.
|
**Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows.
|
||||||
|
|
||||||
Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation.
|
Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary }
|
[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" }
|
[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" }
|
||||||
[:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" }
|
[:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" }
|
||||||
|
|
||||||
|
|
|
@ -149,5 +149,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default,
|
||||||
|
|
||||||
There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard).
|
There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard).
|
||||||
|
|
||||||
[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people.
|
|
||||||
Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block.
|
Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block.
|
||||||
|
|
||||||
|
[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people.
|
||||||
|
|
|
@ -73,7 +73,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a
|
||||||
|
|
||||||
**Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices.
|
**Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices.
|
||||||
|
|
||||||
[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary }
|
[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation}
|
[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
|
||||||
|
@ -119,7 +119,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure
|
||||||
|
|
||||||
[Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content.
|
[Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content.
|
||||||
|
|
||||||
[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary }
|
[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary }
|
||||||
[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
|
|
@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p
|
||||||
|
|
||||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world.
|
||||||
|
|
||||||
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/){ .md-button }
|
[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn){ .md-button }
|
||||||
|
|
||||||
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||||
|
|
||||||
|
|
|
@ -11,7 +11,7 @@ Privacy is ultimately about human information, and this is important because we
|
||||||
|
|
||||||
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||||
|
|
||||||
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/){ .md-button }
|
[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security){ .md-button }
|
||||||
|
|
||||||
<!-- markdownlint-disable-next-line -->
|
<!-- markdownlint-disable-next-line -->
|
||||||
**Privacy**
|
**Privacy**
|
||||||
|
@ -52,7 +52,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times
|
||||||
|
|
||||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||||
|
|
||||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" }
|
||||||
|
|
||||||
## Sources
|
## Sources
|
||||||
|
|
||||||
|
|
|
@ -10,7 +10,7 @@ cover: cloud.webp
|
||||||
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }
|
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }
|
||||||
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
||||||
|
|
||||||
Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE.
|
Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption.
|
||||||
|
|
||||||
If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients.
|
If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients.
|
||||||
|
|
||||||
|
@ -27,7 +27,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB.
|
**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
||||||
|
|
||||||
|
The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
|
@ -46,9 +48,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source).
|
The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party.
|
||||||
|
|
||||||
Proton Drive's brand new mobile clients have not yet been publicly audited by a third party.
|
|
||||||
|
|
||||||
## Tresorit
|
## Tresorit
|
||||||
|
|
||||||
|
@ -83,7 +83,9 @@ Tresorit has received a number of independent security audits:
|
||||||
- Computest discovered two vulnerabilities which have been resolved.
|
- Computest discovered two vulnerabilities which have been resolved.
|
||||||
- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young.
|
- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young.
|
||||||
- This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf).
|
- This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf).
|
||||||
- Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims."
|
- Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded:
|
||||||
|
|
||||||
|
> Test results found no deviation from Tresorit’s data confidentiality claims.
|
||||||
|
|
||||||
[^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services.
|
[^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services.
|
||||||
|
|
||||||
|
@ -131,7 +133,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November
|
||||||
|
|
||||||
### Minimum Requirements
|
### Minimum Requirements
|
||||||
|
|
||||||
- Must enforce end-to-end encryption.
|
- Must enforce E2EE.
|
||||||
- Must offer a free plan or trial period for testing.
|
- Must offer a free plan or trial period for testing.
|
||||||
- Must support TOTP or FIDO2 multifactor authentication, or passkey logins.
|
- Must support TOTP or FIDO2 multifactor authentication, or passkey logins.
|
||||||
- Must offer a web interface which supports basic file management functionality.
|
- Must offer a web interface which supports basic file management functionality.
|
||||||
|
@ -142,8 +144,8 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November
|
||||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
- Clients should be open source.
|
- Clients should be open source.
|
||||||
- Clients should be audited in their entirety by an independent third-party.
|
- Clients should be audited in their entirety by an independent third party.
|
||||||
- Should offer native clients for Linux, Android, Windows, macOS, and iOS.
|
- Should offer native clients for Linux, Android, Windows, macOS, and iOS.
|
||||||
- These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android.
|
- These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android.
|
||||||
- Should support easy file-sharing with other users.
|
- Should support easy file sharing with other users.
|
||||||
- Should offer at least basic file preview and editing functionality on the web interface.
|
- Should offer at least basic file preview and editing functionality on the web interface.
|
||||||
|
|
|
@ -33,7 +33,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|
||||||
- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2)
|
- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy)
|
||||||
- [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew)
|
- [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew)
|
||||||
- [:simple-linux: Linux](https://pypi.org/project/mat2)
|
- [:simple-linux: Linux](https://pypi.org/project/mat2)
|
||||||
- [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface)
|
- [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface)
|
||||||
|
@ -50,10 +50,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
|
||||||
|
|
||||||
**ExifEraser** is a modern, permissionless image metadata erasing application for Android.
|
**ExifEraser** is a modern, permissionless image metadata erasing application for Android.
|
||||||
|
|
||||||
It currently supports JPEG, PNG and WebP files.
|
It currently supports JPEG, PNG, and WebP files.
|
||||||
|
|
||||||
[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary }
|
[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" }
|
[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
|
|
|
@ -90,7 +90,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins
|
||||||
|
|
||||||
Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*.
|
Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*.
|
||||||
|
|
||||||
Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen.
|
Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen.
|
||||||
|
|
||||||
Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead.
|
Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead.
|
||||||
|
|
||||||
|
|
|
@ -23,8 +23,8 @@ Linux distributions are commonly recommended for privacy protection and software
|
||||||
**Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general.
|
**Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation}
|
[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" }
|
||||||
[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -45,8 +45,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en
|
||||||
openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem.
|
openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation}
|
[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" }
|
||||||
[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -63,8 +63,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn
|
||||||
**Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions).
|
**Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation}
|
[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" }
|
||||||
[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -89,8 +89,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org)
|
||||||
**Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream.
|
**Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation}
|
[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" }
|
||||||
[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -115,8 +115,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo
|
||||||
NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability.
|
NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation}
|
[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" }
|
||||||
[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -144,8 +144,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary }
|
||||||
[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" }
|
[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" }
|
||||||
[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation}
|
[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" }
|
||||||
[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -166,8 +166,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh
|
||||||
**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off.
|
**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation}
|
[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" }
|
||||||
[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -203,9 +203,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
|
||||||
[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary }
|
||||||
[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" }
|
[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" }
|
||||||
[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation }
|
[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -246,9 +246,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation }
|
[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
|
12
docs/dns.md
12
docs/dns.md
|
@ -111,7 +111,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation}
|
[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
|
@ -138,7 +138,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation}
|
[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
|
@ -175,7 +175,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation}
|
[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
|
@ -198,10 +198,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot
|
||||||
|
|
||||||
**DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS).
|
**DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS).
|
||||||
|
|
||||||
[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary }
|
[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation}
|
[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|
|
@ -53,7 +53,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/)
|
**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review)
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" }
|
||||||
|
|
|
@ -64,7 +64,7 @@ Cryptomator's documentation details its intended [security target](https://docs.
|
||||||
|
|
||||||
**Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features.
|
**Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features.
|
||||||
|
|
||||||
[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary }
|
[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary }
|
||||||
[:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" }
|
[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" }
|
||||||
|
|
||||||
|
@ -206,7 +206,7 @@ We advise against using your iCloud account for recovery; instead, you should se
|
||||||
|
|
||||||
**LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers.
|
**LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary }
|
[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" }
|
[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
|
|
@ -1,8 +1,8 @@
|
||||||
---
|
---
|
||||||
meta_title: "Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides"
|
meta_title: "Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides"
|
||||||
title: "Health and Wellness Apps"
|
title: "Health and Wellness"
|
||||||
icon: material/heart-pulse
|
icon: material/heart-pulse
|
||||||
description: These applications are what we currently recommend for all health and fitness-related activites on your phone.
|
description: These applications are what we currently recommend for all health- and fitness-related activites on your phone.
|
||||||
cover: health.webp
|
cover: health.webp
|
||||||
---
|
---
|
||||||
<small>Protects against the following threat(s):</small>
|
<small>Protects against the following threat(s):</small>
|
||||||
|
@ -102,7 +102,7 @@ These general purpose apps can do everything from counting steps and tracking sl
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|
||||||
- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
|
- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
|
|
@ -113,6 +113,6 @@ In the modern age of digital data exploitation, your privacy has never been more
|
||||||
|
|
||||||
Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||||
|
|
||||||
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
|
[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" }
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
|
@ -9,7 +9,7 @@ cover: language-tools.webp
|
||||||
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
||||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
||||||
|
|
||||||
Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data.
|
Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data.
|
||||||
|
|
||||||
## LanguageTool
|
## LanguageTool
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation}
|
[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
|
@ -32,7 +32,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s
|
||||||
- [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop)
|
- [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop)
|
||||||
- [:simple-apple: macOS](https://languagetool.org/mac-desktop)
|
- [:simple-apple: macOS](https://languagetool.org/mac-desktop)
|
||||||
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool)
|
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool)
|
||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji)
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji)
|
||||||
- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc)
|
- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc)
|
||||||
- [:simple-safari: Safari](https://apps.apple.com/app/id1534275760)
|
- [:simple-safari: Safari](https://apps.apple.com/app/id1534275760)
|
||||||
|
|
||||||
|
|
10
docs/maps.md
10
docs/maps.md
|
@ -19,7 +19,7 @@ The recommendations here either do not collect any user data or at least do not
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline.
|
**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline.
|
||||||
|
|
||||||
Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities).
|
Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities).
|
||||||
|
|
||||||
|
@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data.
|
**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
|
@ -59,13 +59,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand)
|
||||||
- [:simple-android: Android](https://osmand.net/docs/versions/free-versions)
|
- [:simple-android: Android](https://osmand.net/docs/versions/free-versions)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257)
|
- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com).
|
OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com).
|
||||||
|
|
||||||
|
You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki.
|
||||||
|
|
||||||
## Criteria
|
## Criteria
|
||||||
|
|
||||||
|
|
|
@ -3,7 +3,7 @@ title: Admonitions
|
||||||
description: A guide for website contributors on creating admonitions.
|
description: A guide for website contributors on creating admonitions.
|
||||||
---
|
---
|
||||||
|
|
||||||
**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow.
|
**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.
|
||||||
|
|
||||||
<div class="admonition example" markdown>
|
<div class="admonition example" markdown>
|
||||||
<p class="admonition-title">Example Admonition</p>
|
<p class="admonition-title">Example Admonition</p>
|
||||||
|
@ -41,7 +41,7 @@ ENCLOSED TEXT
|
||||||
</details>
|
</details>
|
||||||
```
|
```
|
||||||
|
|
||||||
The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted.
|
The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted.
|
||||||
|
|
||||||
### Regular types
|
### Regular types
|
||||||
|
|
||||||
|
@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control.
|
**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation}
|
[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
|
@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control.
|
**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation}
|
[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
|
@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the
|
||||||
|
|
||||||
#### `downloads`
|
#### `downloads`
|
||||||
|
|
||||||
This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above.
|
This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above.
|
||||||
|
|
||||||
```markdown title="Downloads Section"
|
```markdown title="Downloads Section"
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
|
@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905)
|
||||||
- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases)
|
- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases)
|
||||||
- [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download)
|
- [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download)
|
||||||
- [:simple-apple: macOS](https://proton.me/mail/bridge#download)
|
- [:simple-apple: macOS](https://proton.me/mail/bridge#download)
|
||||||
- [:simple-linux: Linux](https://proton.me/mail/bridge#download)
|
- [:simple-linux: Linux](https://proton.me/mail/bridge#download)
|
||||||
|
@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905)
|
||||||
- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases)
|
- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases)
|
||||||
- [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download)
|
- [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download)
|
||||||
- [:simple-apple: macOS](https://proton.me/mail/bridge#download)
|
- [:simple-apple: macOS](https://proton.me/mail/bridge#download)
|
||||||
- [:simple-linux: Linux](https://proton.me/mail/bridge#download)
|
- [:simple-linux: Linux](https://proton.me/mail/bridge#download)
|
||||||
|
@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download
|
||||||
|
|
||||||
## Old Format
|
## Old Format
|
||||||
|
|
||||||
Throughout the site, you may see some admonitions formatted similarly to these examples:
|
Throughout the site, you may see some admonitions formatted like the following examples:
|
||||||
|
|
||||||
``` markdown title="Admonition"
|
``` markdown title="Admonition"
|
||||||
!!! note
|
!!! note
|
||||||
|
@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa.
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used.
|
**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used.
|
||||||
|
|
||||||
There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site.
|
There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site.
|
||||||
|
|
|
@ -41,9 +41,9 @@ A **news aggregator** is software which aggregates digital content from online n
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly.
|
**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly.
|
||||||
|
|
||||||
[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary }
|
[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary }
|
||||||
[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
|
@ -61,9 +61,11 @@ A **news aggregator** is software which aggregates digital content from online n
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed).
|
**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds.
|
||||||
|
|
||||||
[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary }
|
It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed).
|
||||||
|
|
||||||
|
[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary }
|
||||||
[:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" }
|
[:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" }
|
||||||
|
|
||||||
|
@ -84,10 +86,12 @@ A **news aggregator** is software which aggregates digital content from online n
|
||||||
{ align=right }
|
{ align=right }
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed).
|
**Miniflux** is a web-based news aggregator that you can self-host.
|
||||||
|
|
||||||
|
It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" }
|
[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" }
|
[:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" }
|
||||||
|
|
||||||
|
@ -99,7 +103,9 @@ A **news aggregator** is software which aggregates digital content from online n
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds.
|
**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set.
|
||||||
|
|
||||||
|
It supports conventional feed formats and includes built-in support for Reddit feeds.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" }
|
||||||
|
@ -125,7 +131,7 @@ A **news aggregator** is software which aggregates digital content from online n
|
||||||
**Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell).
|
**Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" }
|
[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" }
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
@ -163,7 +169,7 @@ You can subscribe to YouTube channels without logging in and associating usage i
|
||||||
<div class="admonition example" markdown>
|
<div class="admonition example" markdown>
|
||||||
<p class="admonition-title">Example</p>
|
<p class="admonition-title">Example</p>
|
||||||
|
|
||||||
To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below:
|
To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below:
|
||||||
|
|
||||||
```text
|
```text
|
||||||
https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID]
|
https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID]
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
title: "Notebooks"
|
title: "Notebooks"
|
||||||
icon: material/notebook-edit-outline
|
icon: material/notebook-edit-outline
|
||||||
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party.
|
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party.
|
||||||
cover: notebooks.webp
|
cover: notebooks.webp
|
||||||
---
|
---
|
||||||
<small>Protects against the following threat(s):</small>
|
<small>Protects against the following threat(s):</small>
|
||||||
|
@ -10,7 +10,7 @@ cover: notebooks.webp
|
||||||
|
|
||||||
Keep track of your notes and journals without giving them to a third party.
|
Keep track of your notes and journals without giving them to a third party.
|
||||||
|
|
||||||
If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE.
|
If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption.
|
||||||
|
|
||||||
## Cloud-based
|
## Cloud-based
|
||||||
|
|
||||||
|
@ -20,13 +20,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit).
|
**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors.
|
||||||
|
|
||||||
|
Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation}
|
[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
@ -37,7 +39,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso
|
||||||
- [:fontawesome-brands-windows: Windows](https://standardnotes.com)
|
- [:fontawesome-brands-windows: Windows](https://standardnotes.com)
|
||||||
- [:simple-apple: macOS](https://standardnotes.com)
|
- [:simple-apple: macOS](https://standardnotes.com)
|
||||||
- [:simple-linux: Linux](https://standardnotes.com)
|
- [:simple-linux: Linux](https://standardnotes.com)
|
||||||
- [:octicons-globe-16: Web](https://app.standardnotes.com)
|
- [:octicons-browser-16: Web](https://app.standardnotes.com)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -51,13 +53,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com).
|
**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy.
|
||||||
|
|
||||||
|
It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation}
|
[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
@ -68,10 +72,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for
|
||||||
- [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads)
|
- [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads)
|
||||||
- [:simple-apple: macOS](https://notesnook.com/downloads)
|
- [:simple-apple: macOS](https://notesnook.com/downloads)
|
||||||
- [:simple-linux: Linux](https://notesnook.com/downloads)
|
- [:simple-linux: Linux](https://notesnook.com/downloads)
|
||||||
- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper)
|
|
||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
|
|
||||||
- [:octicons-globe-16: Web](https://app.notesnook.com)
|
|
||||||
- [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook)
|
- [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook)
|
||||||
|
- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper)
|
||||||
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj)
|
||||||
|
- [:octicons-browser-16: Web](https://app.notesnook.com)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -83,13 +87,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes.
|
**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags.
|
||||||
|
|
||||||
|
It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation}
|
[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
@ -101,14 +107,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for
|
||||||
- [:simple-apple: macOS](https://joplinapp.org/#desktop-applications)
|
- [:simple-apple: macOS](https://joplinapp.org/#desktop-applications)
|
||||||
- [:simple-linux: Linux](https://joplinapp.org/#desktop-applications)
|
- [:simple-linux: Linux](https://joplinapp.org/#desktop-applications)
|
||||||
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper)
|
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper)
|
||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key.
|
Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS.
|
||||||
Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS.
|
|
||||||
|
|
||||||
### Cryptee
|
### Cryptee
|
||||||
|
|
||||||
|
@ -117,23 +122,25 @@ Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/jo
|
||||||
{ align=right }
|
{ align=right }
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform.
|
**Cryptee** is an open-source, web-based E2EE document editor and photo storage application.
|
||||||
|
|
||||||
|
Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation}
|
[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|
||||||
- [:octicons-globe-16: PWA](https://crypt.ee/download)
|
- [:octicons-browser-16: Web](https://crypt.ee/download)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information.
|
Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform.
|
||||||
|
|
||||||
## Local notebooks
|
## Local notebooks
|
||||||
|
|
||||||
|
@ -143,12 +150,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more.
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
|
|
@ -127,14 +127,14 @@ schema:
|
||||||
|
|
||||||
**Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password.
|
**Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password.
|
||||||
|
|
||||||
[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md)
|
[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)
|
||||||
|
|
||||||
<div class="admonition info" markdown>
|
<div class="admonition info" markdown>
|
||||||
<p class="admonition-title">Info</p>
|
<p class="admonition-title">Info</p>
|
||||||
|
|
||||||
Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have.
|
Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have.
|
||||||
|
|
||||||
For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
|
For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
@ -166,15 +166,15 @@ These password managers sync your passwords to a cloud server for easy accessibi
|
||||||
- [:simple-linux: Linux](https://bitwarden.com/download)
|
- [:simple-linux: Linux](https://bitwarden.com/download)
|
||||||
- [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop)
|
- [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop)
|
||||||
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager)
|
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager)
|
||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb)
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb)
|
||||||
- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh)
|
- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh)
|
||||||
- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147)
|
- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault.
|
Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault:
|
||||||
|
|
||||||
- [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id**
|
- [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id**
|
||||||
|
|
||||||
|
@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629)
|
||||||
- [:fontawesome-brands-windows: Windows](https://proton.me/pass/download)
|
- [:fontawesome-brands-windows: Windows](https://proton.me/pass/download)
|
||||||
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass)
|
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass)
|
||||||
- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde)
|
- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde)
|
||||||
- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde)
|
- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie)
|
||||||
- [:octicons-browser-16: Web](https://pass.proton.me)
|
- [:octicons-browser-16: Web](https://pass.proton.me)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf).
|
**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up).
|
||||||
|
|
||||||
|
1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
|
@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
|
||||||
- [:simple-apple: macOS](https://1password.com/downloads/mac)
|
- [:simple-apple: macOS](https://1password.com/downloads/mac)
|
||||||
- [:simple-linux: Linux](https://1password.com/downloads/linux)
|
- [:simple-linux: Linux](https://1password.com/downloads/linux)
|
||||||
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager)
|
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager)
|
||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa)
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa)
|
||||||
- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem)
|
- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem)
|
||||||
- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296)
|
- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296)
|
||||||
- [:octicons-browser-16: Web](https://my.1password.com/signin)
|
- [:octicons-browser-16: Web](https://my.1password.com/signin)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients.
|
Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients.
|
||||||
|
|
||||||
Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data.
|
Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data.
|
||||||
|
|
||||||
|
@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224)
|
||||||
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager)
|
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager)
|
||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo)
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo)
|
||||||
- [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
|
- [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally.
|
||||||
- [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows)
|
- [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows)
|
||||||
- [:simple-apple: macOS](https://keepassxc.org/download/#mac)
|
- [:simple-apple: macOS](https://keepassxc.org/download/#mac)
|
||||||
- [:simple-linux: Linux](https://keepassxc.org/download/#linux)
|
- [:simple-linux: Linux](https://keepassxc.org/download/#linux)
|
||||||
- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC)
|
- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC)
|
||||||
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser)
|
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser)
|
||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk)
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development.
|
**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" }
|
[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" }
|
||||||
|
@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development.
|
||||||
|
|
||||||
### Gopass (CLI)
|
### Gopass (CLI)
|
||||||
|
|
||||||
<div class="admonition recommendation" markdown>
|
<div class="admonition recommendation" markdown>
|
||||||
|
|
|
@ -16,11 +16,11 @@ cover: pastebins.webp
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin.
|
**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary }
|
||||||
[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"}
|
[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"}
|
||||||
[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation}
|
[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
@ -48,11 +48,11 @@ cover: pastebins.webp
|
||||||
### Minimum Requirements
|
### Minimum Requirements
|
||||||
|
|
||||||
- Must be open source.
|
- Must be open source.
|
||||||
- Must implement "zero-trust" end-to-end encryption.
|
- Must implement "zero-trust" E2EE.
|
||||||
- Must support password-protected files.
|
- Must support password-protected files.
|
||||||
|
|
||||||
### Best-Case
|
### Best-Case
|
||||||
|
|
||||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
- Should have a published audit from a reputable, independent third-party.
|
- Should have a published audit from a reputable, independent third party.
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
title: "Photo Management"
|
title: "Photo Management"
|
||||||
icon: material/image
|
icon: material/image
|
||||||
description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access.
|
description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties.
|
||||||
cover: photo-management.webp
|
cover: photo-management.webp
|
||||||
---
|
---
|
||||||
<small>Protects against the following threat(s):</small>
|
<small>Protects against the following threat(s):</small>
|
||||||
|
@ -17,24 +17,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year.
|
**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting).
|
||||||
|
|
||||||
|
The free plan offers 5 GB of storage as long as you use the service at least once a year.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation}
|
[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||||
- [:simple-android: Android](https://ente.io/download)
|
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904)
|
||||||
- [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos)
|
- [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos)
|
||||||
|
- [:simple-android: Android](https://ente.io/download)
|
||||||
- [:fontawesome-brands-windows: Windows](https://ente.io/download)
|
- [:fontawesome-brands-windows: Windows](https://ente.io/download)
|
||||||
- [:simple-apple: macOS](https://ente.io/download)
|
- [:simple-apple: macOS](https://ente.io/download)
|
||||||
- [:simple-linux: Linux](https://ente.io/download)
|
- [:simple-linux: Linux](https://ente.io/download)
|
||||||
- [:octicons-globe-16: Web](https://web.ente.io)
|
- [:octicons-browser-16: Web](https://web.ente.io)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -49,18 +51,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud
|
||||||
{ align=right }
|
{ align=right }
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence.
|
**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos.
|
||||||
|
|
||||||
|
Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation}
|
[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos)
|
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448)
|
||||||
- [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases)
|
- [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases)
|
||||||
|
|
||||||
|
@ -96,7 +99,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud
|
||||||
|
|
||||||
### Minimum Requirements
|
### Minimum Requirements
|
||||||
|
|
||||||
- Cloud-hosted providers must enforce end-to-end encryption.
|
- Cloud-hosted providers must enforce E2EE.
|
||||||
- Must offer a free plan or trial period for testing.
|
- Must offer a free plan or trial period for testing.
|
||||||
- Must support TOTP or FIDO2 multifactor authentication, or passkey logins.
|
- Must support TOTP or FIDO2 multifactor authentication, or passkey logins.
|
||||||
- Must offer a web interface which supports basic file management functionality.
|
- Must offer a web interface which supports basic file management functionality.
|
||||||
|
@ -105,4 +108,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud
|
||||||
|
|
||||||
### Best Case
|
### Best Case
|
||||||
|
|
||||||
- Should have a published audit from a reputable, independent third-party.
|
- Should have a published audit from a reputable, independent third party.
|
||||||
|
|
|
@ -4,7 +4,7 @@ description: We do not sell or share your data with any third-parties.
|
||||||
---
|
---
|
||||||
## What is Privacy Guides?
|
## What is Privacy Guides?
|
||||||
|
|
||||||
Privacy Guides is a community project operated by a number of active contributors. The public list of team members [can be found on our forum](https://discuss.privacyguides.net/u?group=team&order=solutions&period=all). Privacy Guides is legally administered by [MAGIC Grants](https://magicgrants.org/), a 501(c)(3) public charity acting as our fiscal host.
|
Privacy Guides is a community project operated by a number of active contributors. The public list of team members [can be found on our forum](https://discuss.privacyguides.net/u?group=team&order=solutions&period=all). Privacy Guides is legally administered by [MAGIC Grants](https://magicgrants.org), a 501(c)(3) public charity acting as our fiscal host.
|
||||||
|
|
||||||
As a project, we make available to the public:
|
As a project, we make available to the public:
|
||||||
|
|
||||||
|
@ -173,7 +173,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade
|
||||||
|
|
||||||
## Where does Privacy Guides store data about me?
|
## Where does Privacy Guides store data about me?
|
||||||
|
|
||||||
Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States.
|
Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States.
|
||||||
|
|
||||||
Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website.
|
Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website.
|
||||||
|
|
||||||
|
@ -288,16 +288,16 @@ Privacy Guides uses the following subprocessors, and may share personal data wit
|
||||||
|
|
||||||
| Subprocessor | Service | Function | Processing | Links |
|
| Subprocessor | Service | Function | Processing | Links |
|
||||||
| ------------ | ------- | -------- | ---------- | ----- |
|
| ------------ | ------- | -------- | ---------- | ----- |
|
||||||
| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) |
|
| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) |
|
||||||
| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) |
|
| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) |
|
||||||
| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) |
|
| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) |
|
||||||
| [GitHub](https://github.com/) (USA) | Git Repositories | *For visitors to this website*: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) |
|
| [GitHub](https://github.com) (USA) | Git Repositories | *For visitors to this website*: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) |
|
||||||
| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | *For contributors to this website*: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) |
|
| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | *For contributors to this website*: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) |
|
||||||
| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) |
|
| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) |
|
||||||
| [Stripe](https://stripe.com) (USA) | Connect | *For certain donations via GitHub Sponsors*: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) |
|
| [Stripe](https://stripe.com) (USA) | Connect | *For certain donations via GitHub Sponsors*: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) |
|
||||||
| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) |
|
| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) |
|
||||||
| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) |
|
| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) |
|
||||||
| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) |
|
| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) |
|
||||||
|
|
||||||
## Does Privacy Guides delete inactive accounts?
|
## Does Privacy Guides delete inactive accounts?
|
||||||
|
|
||||||
|
|
|
@ -14,7 +14,7 @@ cover: real-time-communication.webp
|
||||||
|
|
||||||
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md).
|
||||||
|
|
||||||
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/){ .md-button }
|
[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why){ .md-button }
|
||||||
|
|
||||||
## Encrypted Messengers
|
## Encrypted Messengers
|
||||||
|
|
||||||
|
|
|
@ -360,7 +360,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
|
||||||
<div class="grid cards" markdown>
|
<div class="grid cards" markdown>
|
||||||
|
|
||||||
- { .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp)
|
- { .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp)
|
||||||
- { .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile)
|
- { .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile)
|
||||||
- { .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
|
- { .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
20
docs/tor.md
20
docs/tor.md
|
@ -31,7 +31,7 @@ schema:
|
||||||
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
|
||||||
|
|
||||||
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button .md-button--primary }
|
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button .md-button--primary }
|
||||||
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/){ .md-button }
|
[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor){ .md-button }
|
||||||
|
|
||||||
<div class="admonition tip" markdown>
|
<div class="admonition tip" markdown>
|
||||||
<p class="admonition-title">Tip</p>
|
<p class="admonition-title">Tip</p>
|
||||||
|
@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor-
|
||||||
|
|
||||||
There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } browsing for desktop computers and Android.
|
There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } browsing for desktop computers and Android.
|
||||||
|
|
||||||
Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile.
|
Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile.
|
||||||
|
|
||||||
If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization.
|
If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization.
|
||||||
|
|
||||||
|
@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*.
|
**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary }
|
||||||
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" }
|
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" }
|
||||||
[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation }
|
[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen.
|
The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen.
|
||||||
|
|
||||||
In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone.
|
In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone.
|
||||||
|
|
||||||
|
@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/)
|
**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser).
|
||||||
|
|
||||||
|
[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review)
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation}
|
[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" }
|
||||||
[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
|
||||||
|
|
||||||
<details class="downloads" markdown>
|
<details class="downloads" markdown>
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|
|
@ -142,8 +142,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit
|
||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client)
|
||||||
- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client)
|
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683)
|
||||||
|
- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client)
|
||||||
|
- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases)
|
||||||
- [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows)
|
- [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows)
|
||||||
- [:simple-apple: macOS](https://ivpn.net/apps-macos)
|
- [:simple-apple: macOS](https://ivpn.net/apps-macos)
|
||||||
- [:simple-linux: Linux](https://ivpn.net/apps-linux)
|
- [:simple-linux: Linux](https://ivpn.net/apps-linux)
|
||||||
|
|
Binary file not shown.
Before Width: | Height: | Size: 46 KiB |
BIN
theme/assets/img/ai-chat/llamafile.webp
Normal file
BIN
theme/assets/img/ai-chat/llamafile.webp
Normal file
Binary file not shown.
After Width: | Height: | Size: 260 KiB |
Loading…
Add table
Add a link
Reference in a new issue