mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-05-07 16:55:27 -04:00
Move privacytools.io files to privacytools.io directory
This commit is contained in:
parent
9dc1727097
commit
269fe69aa1
609 changed files with 0 additions and 0 deletions
9
privacytools.io/pages/software/cal-card.html
Normal file
9
privacytools.io/pages/software/cal-card.html
Normal file
|
@ -0,0 +1,9 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/calendar-contacts/
|
||||
title: "Calendar and Contact Sync Tools"
|
||||
description: "Discover free, open-source, and secure ways to sync your contacts and calendars across your devices."
|
||||
breadcrumb: "Calendar and Contacts"
|
||||
---
|
||||
|
||||
{% include sections/calendar-contacts-sync.html %}
|
8
privacytools.io/pages/software/cloud.html
Normal file
8
privacytools.io/pages/software/cloud.html
Normal file
|
@ -0,0 +1,8 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/cloud/
|
||||
title: "Self Hosted \"Cloud\""
|
||||
description: "Discover how to securely and privately self-host your cloud with open-source software."
|
||||
---
|
||||
|
||||
{% include sections/selfhosted-cloud.html %}
|
11
privacytools.io/pages/software/email.html
Normal file
11
privacytools.io/pages/software/email.html
Normal file
|
@ -0,0 +1,11 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/email/
|
||||
title: "Email Clients"
|
||||
description: "Discover free, open-source, and secure email clients, along with some email alternatives you may not have considered."
|
||||
---
|
||||
|
||||
{% include sections/email-warning.html %}
|
||||
|
||||
{% include sections/email-clients.html %}
|
||||
|
8
privacytools.io/pages/software/encryption.html
Normal file
8
privacytools.io/pages/software/encryption.html
Normal file
|
@ -0,0 +1,8 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/encryption-tools/
|
||||
title: "Encryption Tools"
|
||||
description: "Discover free, open-source, and secure ways to encrypt your sensitive data to keep it from prying eyes."
|
||||
---
|
||||
|
||||
{% include sections/file-encryption.html %}
|
8
privacytools.io/pages/software/file-sharing.html
Normal file
8
privacytools.io/pages/software/file-sharing.html
Normal file
|
@ -0,0 +1,8 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/file-sharing/
|
||||
title: "File Sharing"
|
||||
description: "Discover how to share your files with your friends and family or anonymously, without a middleman."
|
||||
---
|
||||
|
||||
{% include sections/file-sharing.html %}
|
8
privacytools.io/pages/software/file-sync.html
Normal file
8
privacytools.io/pages/software/file-sync.html
Normal file
|
@ -0,0 +1,8 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/file-sync/
|
||||
title: "File Sync"
|
||||
description: "Discover free, open-source, and secure ways to sync your files across your devices."
|
||||
---
|
||||
|
||||
{% include sections/file-sync.html %}
|
15
privacytools.io/pages/software/networks.html
Normal file
15
privacytools.io/pages/software/networks.html
Normal file
|
@ -0,0 +1,15 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/networks/
|
||||
title: "Self-Contained Networks"
|
||||
description: "If you are currently browsing clearnet and want to access the dark web, this section is for you."
|
||||
hidedesc: true
|
||||
---
|
||||
|
||||
{% include sections/self-contained-networks.html %}
|
||||
|
||||
<h3>Related Information</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://darknetdiaries.com/">darknetdiaries.com</a> - True stories from the dark side of the Internet.</li>
|
||||
</ul>
|
8
privacytools.io/pages/software/notebooks.html
Normal file
8
privacytools.io/pages/software/notebooks.html
Normal file
|
@ -0,0 +1,8 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/notebooks/
|
||||
title: "Notebooks"
|
||||
description: "Keep track of your notes and journalings without giving them to a third party."
|
||||
---
|
||||
|
||||
{% include sections/notebooks.html %}
|
14
privacytools.io/pages/software/passwords.html
Normal file
14
privacytools.io/pages/software/passwords.html
Normal file
|
@ -0,0 +1,14 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/passwords/
|
||||
title: "Password Managers"
|
||||
description: "Stay safe and secure online with an encrypted and open-source password manager."
|
||||
---
|
||||
|
||||
{% include sections/password-managers.html %}
|
||||
|
||||
<h3>Related Information</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://peertube.mastodon.host/videos/watch/4cdedd90-a5b4-4022-b93d-828e85ed58cd">Edward Snowden on Passwords on Peertube</a></li>
|
||||
</ul>
|
8
privacytools.io/pages/software/productivity.html
Normal file
8
privacytools.io/pages/software/productivity.html
Normal file
|
@ -0,0 +1,8 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/productivity/
|
||||
title: "Productivity Tools"
|
||||
description: "Get working and collaborating without sharing your documents with a middleman or trusting a cloud provider."
|
||||
---
|
||||
|
||||
{% include sections/productivity-tools.html %}
|
91
privacytools.io/pages/software/real-time-communication.html
Normal file
91
privacytools.io/pages/software/real-time-communication.html
Normal file
|
@ -0,0 +1,91 @@
|
|||
---
|
||||
layout: page
|
||||
permalink: /software/real-time-communication/
|
||||
title: "Real-Time Communication"
|
||||
description: "Discover secure and private ways to communicate with others online without letting any third parties read your messages."
|
||||
---
|
||||
|
||||
{% include sections/instant-messenger.html %}
|
||||
|
||||
<h3 id="exploiting-centralized-networks" class="anchor">
|
||||
<a href="#exploiting-centralized-networks">
|
||||
<i class="fas fa-link anchor-icon"></i>
|
||||
</a>
|
||||
Recent news about breaking E2EE on centralized instant messengers
|
||||
</h3>
|
||||
|
||||
<h5>June 2020</h5>
|
||||
<ul>
|
||||
<li><a href="https://www.eff.org/deeplinks/2020/06/senates-new-anti-encryption-bill-even-worse-earn-it-and-thats-saying-something">The Senate’s New Anti-Encryption Bill Is Even Worse Than EARN IT, and That’s Saying Something (EFF)</a></li>
|
||||
<li><a href="https://cyberlaw.stanford.edu/blog/2020/06/there%E2%80%99s-now-even-worse-anti-encryption-bill-earn-it-doesn%E2%80%99t-make-earn-it-bill-ok">There’s Now an Even Worse Anti-Encryption Bill Than EARN IT. That Doesn’t Make the EARN IT Bill OK. (Stanford)</a></li>
|
||||
</ul>
|
||||
|
||||
<h5>March 2020</h5>
|
||||
<ul>
|
||||
<li><a href="https://www.eff.org/deeplinks/2020/03/graham-blumenthal-bill-new-path-doj-finally-break-encryption">The Graham-Blumenthal Bill: A New Path for DOJ to Finally Break Encryption (EFF)</a></li>
|
||||
</ul>
|
||||
|
||||
<h5>January 2020</h5>
|
||||
<ul>
|
||||
<li><a href="https://cyberlaw.stanford.edu/blog/2020/01/earn-it-act-how-ban-end-end-encryption-without-actually-banning-it">The EARN IT Act: How to Ban End-to-End Encryption Without Actually Banning It (Stanford)</a></li>
|
||||
</ul>
|
||||
|
||||
<h5>November 2019</h5>
|
||||
<ul>
|
||||
<li><a href="https://www.reuters.com/article/us-interpol-encryption-exclusive-idUSKBN1XR0S7">Exclusive: Interpol plans to condemn encryption spread, citing predators, sources say (Reuters)</a></li>
|
||||
<li><a href="https://arstechnica.com/tech-policy/2019/11/think-of-the-children-fbi-sought-interpol-statement-against-end-to-end-crypto/">Think of the children: FBI sought Interpol statement against end-to-end crypto (ArsTechnica)</a></li>
|
||||
</ul>
|
||||
|
||||
<h5>October 2019</h5>
|
||||
<ul>
|
||||
<li><a href="https://www.eff.org/deeplinks/2019/10/open-letter-governments-us-uk-and-australia-facebook-all-out-attack-encryption">The Open Letter from the Governments of US, UK, and Australia to Facebook is An All-Out Attack on Encryption (EFF)</a></li>
|
||||
<li><a href="https://arstechnica.com/tech-policy/2019/10/the-broken-record-why-barrs-call-against-end-to-end-encryption-is-nuts/">The broken record: Why Barr’s call against end-to-end encryption is nuts (ArsTechnica)</a></li>
|
||||
<li><a href="https://arstechnica.com/information-technology/2019/10/ag-barr-is-pushing-facebook-to-backdoor-whatsapp-and-halt-encryption-plans">US wants Facebook to backdoor WhatsApp and halt encryption plans (ArsTechnica)</a></li>
|
||||
</ul>
|
||||
|
||||
<h5>August 2019</h5>
|
||||
<ul>
|
||||
<li><a href="https://arstechnica.com/tech-policy/2019/08/post-snowden-tech-became-more-secure-but-is-govt-really-at-risk-of-going-dark">Post Snowden tech became more secure, but is government really at risk of going dark? (ArsTechnica)</a></li>
|
||||
</ul>
|
||||
|
||||
<h5>July 2019</h5>
|
||||
<ul>
|
||||
<li><a href="https://techcrunch.com/2019/07/23/william-barr-consumers-security-risks-backdoors/">US attorney general William Barr says Americans should accept security risks of encryption backdoors (TechCrunch)</a></li>
|
||||
<li><a href="https://www.theregister.co.uk/2019/07/23/us_encryption_backdoor/">Low Barr: Don't give me that crap about security, just put the backdoors in the encryption, roars US Attorney General (The Register)</a></li>
|
||||
</ul>
|
||||
|
||||
<h5>May 2019</h5>
|
||||
<ul>
|
||||
<li><a href="https://www.theguardian.com/uk-news/2019/may/30/apple-and-whatsapp-condemn-gchq-plans-to-eavesdrop-on-encrypted-chats">Apple and WhatsApp condemn GCHQ plans to eavesdrop on encrypted chats (The Guardian)</a></li>
|
||||
</ul>
|
||||
|
||||
<h5>January 2019</h5>
|
||||
<ul>
|
||||
<li><a href="https://www.justsecurity.org/62114/give-ghost-backdoor/">Give Up the Ghost: A Backdoor by Another Name (Just Security)</a></li>
|
||||
</ul>
|
||||
|
||||
<h5>December 2018</h5>
|
||||
<ul>
|
||||
<li><a href="https://www.zdnet.com/article/whats-actually-in-australias-encryption-laws-everything-you-need-to-know/">What's actually in Australia's encryption laws? Everything you need to know (ZDnet)</a></li>
|
||||
</ul>
|
||||
|
||||
<h3>Complete Comparison</h3>
|
||||
<ul>
|
||||
<li><a href="https://securechatguide.org/effguide.html">securechatguide.org</a> - Guide to Choosing a Messenger.</li>
|
||||
<li><a href="https://www.securemessagingapps.com/">securemessagingapps.com</a> - Secure Messaging Apps Comparison.</li>
|
||||
</ul>
|
||||
|
||||
<h3 id="#rtc-independent-security-audits">Independent security audits</h3>
|
||||
<ul>
|
||||
<li><a href="https://eprint.iacr.org/2016/1013.pdf">A Formal Security Analysis of the Signal Messaging Protocol (2019)</a> by Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt and Douglas Stebila</li>
|
||||
<li><a href="https://www.nccgroup.trust/us/our-research/matrix-olm-cryptographic-review/">Matrix Olm Cryptographic Review</a></li>
|
||||
<li><a href="https://briarproject.org/news/2017-beta-released-security-audit">Briar - Darknet Messenger Releases Beta, Passes Security Audit</a></li>
|
||||
</ul>
|
||||
|
||||
<hr/>
|
||||
|
||||
{% include sections/voice-video-messenger.html %}
|
||||
|
||||
<hr/>
|
||||
|
||||
{% include sections/teamchat.html %}
|
Loading…
Add table
Add a link
Reference in a new issue