diff --git a/_includes/card.html b/_includes/card.html index c1602c85..c678d677 100644 --- a/_includes/card.html +++ b/_includes/card.html @@ -26,7 +26,7 @@ {% endfor %} {% endif %} -

{{include.title}}{{include.description}}

+

{{include.title}}{{include.description}}

Website: @@ -37,7 +37,7 @@ {% endif %} {% if include.tor %} - Tor + Tor {% endif %} {% if include.extra_button %} diff --git a/_includes/sections/android-addons.html b/_includes/sections/android-addons.html index 0b41cfa8..b0d947a2 100644 --- a/_includes/sections/android-addons.html +++ b/_includes/sections/android-addons.html @@ -7,7 +7,7 @@

- NetGuard + NetGuard

Control your traffic with NetGuard

@@ -23,7 +23,7 @@
- XPrivacyLua + XPrivacyLua

Manage your apps' permissions with XPrivacyLua

diff --git a/_includes/sections/browser-addons.html b/_includes/sections/browser-addons.html index 318cf57a..27dd2e1b 100644 --- a/_includes/sections/browser-addons.html +++ b/_includes/sections/browser-addons.html @@ -7,7 +7,7 @@
- Privacy Badger + Privacy Badger

Stop Tracking with Privacy Badger

@@ -17,7 +17,7 @@
- uBlock + uBlock

Block Ads and Trackers with uBlock Origin

@@ -27,7 +27,7 @@
- Cookie AutoDelete + Cookie AutoDelete

Automatically Delete Cookies with Cookie AutoDelete

@@ -37,7 +37,7 @@
- HTTPS Everywhere + HTTPS Everywhere

Encryption with HTTPS Everywhere

@@ -47,7 +47,7 @@
- Decentraleyes + Decentraleyes

Block Content Delivery Networks with Decentraleyes

@@ -63,7 +63,7 @@
- uMatrix + uMatrix

Stop cross-site requests with uMatrix

@@ -73,7 +73,7 @@
- NoScript + NoScript

Be in total control with NoScript Security Suite

diff --git a/_includes/sections/browser-fingerprint.html b/_includes/sections/browser-fingerprint.html index 470a2442..133f9f57 100644 --- a/_includes/sections/browser-fingerprint.html +++ b/_includes/sections/browser-fingerprint.html @@ -4,7 +4,7 @@ Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.
-Fingerprint image +Fingerprint image

When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.

diff --git a/_includes/sections/email-providers.html b/_includes/sections/email-providers.html index 9874e102..9120e66a 100644 --- a/_includes/sections/email-providers.html +++ b/_includes/sections/email-providers.html @@ -27,7 +27,7 @@ Protonmail - WWW + WWW Tor 2013 @@ -44,7 +44,7 @@ Disroot - WWW + WWW 2015 Netherlands @@ -60,7 +60,7 @@ Tutanota - WWW + WWW 2011 Germany @@ -76,7 +76,7 @@ Mailfence - WWW + WWW 2013 Belgium @@ -93,7 +93,7 @@ - WWW + WWW 2014 Germany @@ -109,7 +109,7 @@ Posteo - WWW + WWW 2009 Germany @@ -126,7 +126,7 @@ - WWW + WWW 1999 Norway @@ -142,7 +142,7 @@ Neomailbox - WWW + WWW 2003 Switzerland @@ -158,7 +158,7 @@ StartMail - WWW + WWW 2014 Netherlands @@ -174,7 +174,7 @@ Kolab Now - WWW + WWW 2010 Switzerland @@ -195,7 +195,7 @@
  • Confidant Mail - An open-source non-SMTP cryptographic email system optimized for large file attachments. It is a secure and spam-resistant alternative to regular email and online file drop services. It uses GNU Privacy Guard (GPG) for content encryption and authentication, and TLS 1.2 with ephemeral keys for transport encryption.
  • Become Your Own Email Provider with Mail-in-a-Box

    -Mail-in-a-Box +Mail-in-a-Box

    Take it a step further and get control of your email with this easy-to-deploy mail server in a box. Mail-in-a-Box lets you become your own mail service provider in a few easy steps. It's sort of like making your own Gmail, but one you control from top to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a working mail server. But you don't need to be a technology expert to set it up. More: https://mailinabox.email/

    diff --git a/_includes/sections/footer.html b/_includes/sections/footer.html index 08fefe99..b0f114d5 100644 --- a/_includes/sections/footer.html +++ b/_includes/sections/footer.html @@ -6,15 +6,15 @@
    - WTFPLWTFPL + WTFPLWTFPL
    diff --git a/_includes/sections/fourteen-eyes.html b/_includes/sections/fourteen-eyes.html index 8fe0acf3..6c4e7185 100644 --- a/_includes/sections/fourteen-eyes.html +++ b/_includes/sections/fourteen-eyes.html @@ -1,6 +1,6 @@

    Global Mass Surveillance - The Fourteen Eyes

    -UKUSA Agreement +UKUSA Agreement

    The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.

    diff --git a/_includes/sections/header.html b/_includes/sections/header.html index 7e647eeb..67497527 100644 --- a/_includes/sections/header.html +++ b/_includes/sections/header.html @@ -1,5 +1,5 @@
    -

    privacytools.io

    +

    privacytools.io

    You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.

    @@ -35,7 +35,7 @@

    - Glenn Greenwald: Why privacy matters + Glenn Greenwald: Why privacy matters Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.

    diff --git a/_includes/sections/key-disclosure-law.html b/_includes/sections/key-disclosure-law.html index 637f9464..8bbd64b1 100644 --- a/_includes/sections/key-disclosure-law.html +++ b/_includes/sections/key-disclosure-law.html @@ -63,7 +63,7 @@

    Why is it not recommended to choose a US-based service?

    -USA +USA

    Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.

    diff --git a/_includes/sections/warrant-canary.html b/_includes/sections/warrant-canary.html index b2cd7bb5..f22af146 100644 --- a/_includes/sections/warrant-canary.html +++ b/_includes/sections/warrant-canary.html @@ -1,6 +1,6 @@

    What is a warrant canary?

    -Warrant Canary Example +Warrant Canary Example

    A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.

    diff --git a/_includes/sections/windows10.html b/_includes/sections/windows10.html index c43dc02a..afdc25ef 100644 --- a/_includes/sections/windows10.html +++ b/_includes/sections/windows10.html @@ -4,7 +4,7 @@ Microsoft introduced a lot of new features in Windows 10 such as Cortana. However, most of them are violating your privacy.
    -Windows 10 Privacy +Windows 10 Privacy
    1. Data syncing is by default enabled.