From 5bad28ff6d93ceb7ae8eb812cf5318b29c847e4a Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Tue, 7 Mar 2023 08:52:30 -0600 Subject: [PATCH] Add page descriptions to docs (#2075) Co-authored-by: mfwmyfacewhen <94880365+mfwmyfacewhen@users.noreply.github.com> Signed-off-by: Jonah Aragon Signed-off-by: Daniel Gray --- docs/advanced/communication-network-types.md | 1 + docs/advanced/dns-overview.md | 1 + docs/advanced/tor-overview.md | 1 + docs/android.md | 1 + docs/basics/account-creation.md | 1 + docs/basics/account-deletion.md | 1 + docs/basics/common-misconceptions.md | 1 + docs/basics/common-threats.md | 1 + docs/basics/email-security.md | 1 + docs/basics/multi-factor-authentication.md | 1 + docs/basics/passwords-overview.md | 1 + docs/basics/threat-modeling.md | 1 + docs/basics/vpn-overview.md | 3 ++- docs/calendar.md | 1 + docs/cloud.md | 1 + docs/data-redaction.md | 1 + docs/desktop-browsers.md | 1 + docs/desktop.md | 1 + docs/dns.md | 1 + docs/email-clients.md | 1 + docs/email.md | 1 + docs/encryption.md | 1 + docs/file-sharing.md | 1 + docs/frontends.md | 1 + docs/kb-archive.md | 1 + docs/mobile-browsers.md | 1 + docs/multi-factor-authentication.md | 1 + docs/news-aggregators.md | 3 ++- docs/notebooks.md | 1 + docs/os/android-overview.md | 1 + docs/os/linux-overview.md | 3 ++- docs/os/qubes-overview.md | 1 + docs/passwords.md | 1 + docs/productivity.md | 1 + docs/real-time-communication.md | 1 + docs/router.md | 1 + docs/search-engines.md | 1 + docs/tools.md | 1 + docs/tor.md | 1 + docs/video-streaming.md | 1 + docs/vpn.md | 1 + 41 files changed, 44 insertions(+), 3 deletions(-) diff --git a/docs/advanced/communication-network-types.md b/docs/advanced/communication-network-types.md index a41ff5424..b9d3867da 100644 --- a/docs/advanced/communication-network-types.md +++ b/docs/advanced/communication-network-types.md @@ -1,6 +1,7 @@ --- title: "Types of Communication Networks" icon: 'material/transit-connection-variant' +description: An overview of several network architectures commonly used by instant messaging applications. --- There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. diff --git a/docs/advanced/dns-overview.md b/docs/advanced/dns-overview.md index ea6dee146..771de594e 100644 --- a/docs/advanced/dns-overview.md +++ b/docs/advanced/dns-overview.md @@ -1,6 +1,7 @@ --- title: "DNS Overview" icon: material/dns +description: The Domain Name System is the "phonebook of the internet," helping your browser find the website it's looking for. --- The [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) is the 'phonebook of the Internet'. DNS translates domain names to IP addresses so browsers and other services can load Internet resources, through a decentralized network of servers. diff --git a/docs/advanced/tor-overview.md b/docs/advanced/tor-overview.md index 4658729ac..c3376e730 100644 --- a/docs/advanced/tor-overview.md +++ b/docs/advanced/tor-overview.md @@ -1,6 +1,7 @@ --- title: "Tor Overview" icon: 'simple/torproject' +description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. diff --git a/docs/android.md b/docs/android.md index f9a591517..40a46aae7 100644 --- a/docs/android.md +++ b/docs/android.md @@ -1,6 +1,7 @@ --- title: "Android" icon: 'simple/android' +description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. --- ![Android logo](assets/img/android/android.svg){ align=right } diff --git a/docs/basics/account-creation.md b/docs/basics/account-creation.md index 275a8e0f1..b39fefeb2 100644 --- a/docs/basics/account-creation.md +++ b/docs/basics/account-creation.md @@ -1,6 +1,7 @@ --- title: "Account Creation" icon: 'material/account-plus' +description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private. --- Often people sign up for services without thinking. Maybe it's a streaming service so you can watch that new show everyone's talking about, or an account that gives you a discount for your favorite fast food place. Whatever the case may be, you should consider the implications for your data now and later on down the line. diff --git a/docs/basics/account-deletion.md b/docs/basics/account-deletion.md index b9b3bf570..e6d4b3e89 100644 --- a/docs/basics/account-deletion.md +++ b/docs/basics/account-deletion.md @@ -1,6 +1,7 @@ --- title: "Account Deletion" icon: 'material/account-remove' +description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. diff --git a/docs/basics/common-misconceptions.md b/docs/basics/common-misconceptions.md index 8dee95f40..ed70fa3df 100644 --- a/docs/basics/common-misconceptions.md +++ b/docs/basics/common-misconceptions.md @@ -1,6 +1,7 @@ --- title: "Common Misconceptions" icon: 'material/robot-confused' +description: Privacy isn't a straightforward topic, and it's easy to get caught up in marketing claims and other disinformation. --- ## "Open-source software is always secure" or "Proprietary software is more secure" diff --git a/docs/basics/common-threats.md b/docs/basics/common-threats.md index 332f7e6dc..760b19d9c 100644 --- a/docs/basics/common-threats.md +++ b/docs/basics/common-threats.md @@ -1,6 +1,7 @@ --- title: "Common Threats" icon: 'material/eye-outline' +description: Your threat model is personal to you, but these are some of the things many visitors to this site care about. --- Broadly speaking, we categorize our recommendations into the [threats](threat-modeling.md) or goals that apply to most people. ==You may be concerned with none, one, a few, or all of these possibilities==, and the tools and services you use depend on what your goals are. You may have specific threats outside of these categories as well, which is perfectly fine! The important part is developing an understanding of the benefits and shortcomings of the tools you choose to use, because virtually none of them will protect you from every threat. diff --git a/docs/basics/email-security.md b/docs/basics/email-security.md index f2a99a3d9..f0c2fb579 100644 --- a/docs/basics/email-security.md +++ b/docs/basics/email-security.md @@ -1,6 +1,7 @@ --- title: Email Security icon: material/email +description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications. --- Email is an insecure form of communication by default. You can improve your email security with tools such as OpenPGP, which add End-to-End Encryption to your messages, but OpenPGP still has a number of drawbacks compared to encryption in other messaging applications, and some email data can never be encrypted inherently due to how email is designed. diff --git a/docs/basics/multi-factor-authentication.md b/docs/basics/multi-factor-authentication.md index 690cfcf0c..d82c23b9b 100644 --- a/docs/basics/multi-factor-authentication.md +++ b/docs/basics/multi-factor-authentication.md @@ -1,6 +1,7 @@ --- title: "Multi-Factor Authentication" icon: 'material/two-factor-authentication' +description: MFA is a critical security mechanism for securing your online accounts, but some methods are stronger than others. --- **Multi-Factor Authentication** (**MFA**) is a security mechanism that requires additional steps beyond entering your username (or email) and password. The most common method is time limited codes you might receive from SMS or an app. diff --git a/docs/basics/passwords-overview.md b/docs/basics/passwords-overview.md index eb5872656..9b33d731e 100644 --- a/docs/basics/passwords-overview.md +++ b/docs/basics/passwords-overview.md @@ -1,6 +1,7 @@ --- title: "Introduction to Passwords" icon: 'material/form-textbox-password' +description: These are some tips and tricks on how to create the strongest passwords and keep your accounts secure. --- Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices and our secrets. Despite often being the only thing between us and an adversary who's after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced. diff --git a/docs/basics/threat-modeling.md b/docs/basics/threat-modeling.md index cdcdec911..93a2de2ef 100644 --- a/docs/basics/threat-modeling.md +++ b/docs/basics/threat-modeling.md @@ -1,6 +1,7 @@ --- title: "Threat Modeling" icon: 'material/target-account' +description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. --- Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using! diff --git a/docs/basics/vpn-overview.md b/docs/basics/vpn-overview.md index f0744ca14..a1a007f52 100644 --- a/docs/basics/vpn-overview.md +++ b/docs/basics/vpn-overview.md @@ -1,11 +1,12 @@ --- title: VPN Overview icon: material/vpn +description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind. --- Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. An ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). -Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). +Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). A VPN can help as it can shift trust to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing into it. diff --git a/docs/calendar.md b/docs/calendar.md index c0dedcf21..458ddc62a 100644 --- a/docs/calendar.md +++ b/docs/calendar.md @@ -1,6 +1,7 @@ --- title: "Calendar Sync" icon: material/calendar +description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/docs/cloud.md b/docs/cloud.md index 1b4e49f2b..163a73ee3 100644 --- a/docs/cloud.md +++ b/docs/cloud.md @@ -1,6 +1,7 @@ --- title: "Cloud Storage" icon: material/file-cloud +description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by either putting you in control of your data or by implementing E2EE. diff --git a/docs/data-redaction.md b/docs/data-redaction.md index b905a349e..561d9201e 100644 --- a/docs/data-redaction.md +++ b/docs/data-redaction.md @@ -1,6 +1,7 @@ --- title: "Data and Metadata Redaction" icon: material/tag-remove +description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/docs/desktop-browsers.md b/docs/desktop-browsers.md index 870354432..de331cd1b 100644 --- a/docs/desktop-browsers.md +++ b/docs/desktop-browsers.md @@ -1,6 +1,7 @@ --- title: "Desktop Browsers" icon: material/laptop +description: Firefox and Brave are our recommendations for standard/non-anonymous browsing. --- These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. In general, we recommend keeping your browser extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. diff --git a/docs/desktop.md b/docs/desktop.md index fbc73f94b..a4c16976c 100644 --- a/docs/desktop.md +++ b/docs/desktop.md @@ -1,6 +1,7 @@ --- title: "Desktop/PC" icon: simple/linux +description: Linux distributions are commonly recommended for privacy protection and software freedom. --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/docs/dns.md b/docs/dns.md index 6c2e76bb1..9c5d5041e 100644 --- a/docs/dns.md +++ b/docs/dns.md @@ -1,6 +1,7 @@ --- title: "DNS Resolvers" icon: material/dns +description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/docs/email-clients.md b/docs/email-clients.md index bdc839ba8..6c8b482c0 100644 --- a/docs/email-clients.md +++ b/docs/email-clients.md @@ -1,6 +1,7 @@ --- title: "Email Clients" icon: material/email-open +description: These email clients are privacy-respecting and support OpenPGP email encryption. --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/docs/email.md b/docs/email.md index 633390c91..c112a01cd 100644 --- a/docs/email.md +++ b/docs/email.md @@ -1,6 +1,7 @@ --- title: "Email Services" icon: material/email +description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/docs/encryption.md b/docs/encryption.md index f130a214a..39e917750 100644 --- a/docs/encryption.md +++ b/docs/encryption.md @@ -1,6 +1,7 @@ --- title: "Encryption Software" icon: material/file-lock +description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/docs/file-sharing.md b/docs/file-sharing.md index 57c0c16a6..21f48c980 100644 --- a/docs/file-sharing.md +++ b/docs/file-sharing.md @@ -1,6 +1,7 @@ --- title: "File Sharing and Sync" icon: material/share-variant +description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/docs/frontends.md b/docs/frontends.md index 5f4d7c28a..33238f539 100644 --- a/docs/frontends.md +++ b/docs/frontends.md @@ -1,6 +1,7 @@ --- title: "Frontends" icon: material/flip-to-front +description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/docs/kb-archive.md b/docs/kb-archive.md index 483f3ef36..a825f1d8a 100644 --- a/docs/kb-archive.md +++ b/docs/kb-archive.md @@ -1,6 +1,7 @@ --- title: KB Archive icon: material/archive +description: Some pages that used to be in our knowledge base can now be found on our blog. --- # Pages Moved to Blog diff --git a/docs/mobile-browsers.md b/docs/mobile-browsers.md index b4c1193e8..76dfeb3ed 100644 --- a/docs/mobile-browsers.md +++ b/docs/mobile-browsers.md @@ -1,6 +1,7 @@ --- title: "Mobile Browsers" icon: material/cellphone-information +description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. --- These are our currently recommended mobile web browsers and configurations for standard/non-anonymous internet browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. In general, we recommend keeping extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. diff --git a/docs/multi-factor-authentication.md b/docs/multi-factor-authentication.md index c0ea71c54..626f20db1 100644 --- a/docs/multi-factor-authentication.md +++ b/docs/multi-factor-authentication.md @@ -1,6 +1,7 @@ --- title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' +description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. --- ## Hardware Security Keys diff --git a/docs/news-aggregators.md b/docs/news-aggregators.md index 39c4b6142..193cedac5 100644 --- a/docs/news-aggregators.md +++ b/docs/news-aggregators.md @@ -1,9 +1,10 @@ --- title: "News Aggregators" icon: material/rss +description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. --- -A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favourite blogs and news sites. +A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. ## Aggregator clients diff --git a/docs/notebooks.md b/docs/notebooks.md index 7977f35aa..a705b1a72 100644 --- a/docs/notebooks.md +++ b/docs/notebooks.md @@ -1,6 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/docs/os/android-overview.md b/docs/os/android-overview.md index 5a2f42958..4d242b561 100644 --- a/docs/os/android-overview.md +++ b/docs/os/android-overview.md @@ -1,6 +1,7 @@ --- title: Android Overview icon: simple/android +description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones. --- Android is a secure operating system that has strong [app sandboxing](https://source.android.com/security/app-sandbox), [Verified Boot](https://source.android.com/security/verifiedboot) (AVB), and a robust [permission](https://developer.android.com/guide/topics/permissions/overview) control system. diff --git a/docs/os/linux-overview.md b/docs/os/linux-overview.md index dd2119c77..5a2e3a135 100644 --- a/docs/os/linux-overview.md +++ b/docs/os/linux-overview.md @@ -1,8 +1,9 @@ --- title: Linux Overview icon: simple/linux +description: Linux is an open-source, privacy-focused desktop operating system alternative, but not all distribitions are created equal. --- -It is often believed that [open-source](https://en.wikipedia.org/wiki/Open-source_software) software is inherently secure because the source code is available. There is an expectation that community verification occurs regularly; however, this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). It does depend on a number of factors, such as project activity, developer experience, level of rigour applied to [code reviews](https://en.wikipedia.org/wiki/Code_review), and how often attention is given to specific parts of the [codebase](https://en.wikipedia.org/wiki/Codebase) that may go untouched for years. +It is often believed that [open-source](https://en.wikipedia.org/wiki/Open-source_software) software is inherently secure because the source code is available. There is an expectation that community verification occurs regularly; however, this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). It does depend on a number of factors, such as project activity, developer experience, level of rigor applied to [code reviews](https://en.wikipedia.org/wiki/Code_review), and how often attention is given to specific parts of the [codebase](https://en.wikipedia.org/wiki/Codebase) that may go untouched for years. At the moment, desktop Linux does have some areas that could be better improved when compared to their proprietary counterparts, e.g.: diff --git a/docs/os/qubes-overview.md b/docs/os/qubes-overview.md index c3d568c81..bc2008e55 100644 --- a/docs/os/qubes-overview.md +++ b/docs/os/qubes-overview.md @@ -1,6 +1,7 @@ --- title: "Qubes Overview" icon: simple/qubesos +description: Qubes is an operating system built around isolating apps within virtual machines for heightened security. --- [**Qubes OS**](../desktop.md#qubes-os) is an operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated virtual machines. Each VM is called a *Qube* and you can assign each Qube a level of trust based on its purpose. As Qubes OS provides security by using isolation, and only permitting actions on a per case basis, it is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). diff --git a/docs/passwords.md b/docs/passwords.md index ecd60ecce..e6b72371f 100644 --- a/docs/passwords.md +++ b/docs/passwords.md @@ -1,6 +1,7 @@ --- title: "Password Managers" icon: material/form-textbox-password +description: Password managers allow you to securely store and manage passwords and other credentials. --- Password managers allow you to securely store and manage passwords and other credentials with the use of a master password. diff --git a/docs/productivity.md b/docs/productivity.md index 1a8308333..03889af4d 100644 --- a/docs/productivity.md +++ b/docs/productivity.md @@ -1,6 +1,7 @@ --- title: "Productivity Tools" icon: material/file-sign +description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/docs/real-time-communication.md b/docs/real-time-communication.md index bd48d685e..27ece963a 100644 --- a/docs/real-time-communication.md +++ b/docs/real-time-communication.md @@ -1,6 +1,7 @@ --- title: "Real-Time Communication" icon: material/chat-processing +description: Other instant messengers make all of your private conversations available to the company that runs them. --- These are our recommendations for encrypted real-time communication. diff --git a/docs/router.md b/docs/router.md index 06019ebaa..1b1de7731 100644 --- a/docs/router.md +++ b/docs/router.md @@ -1,6 +1,7 @@ --- title: "Router Firmware" icon: material/router-wireless +description: These alternative operating systems can be used to secure your router or Wi-Fi access point. --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/docs/search-engines.md b/docs/search-engines.md index c60d7e677..9a3b07883 100644 --- a/docs/search-engines.md +++ b/docs/search-engines.md @@ -1,6 +1,7 @@ --- title: "Search Engines" icon: material/search-web +description: These privacy-respecting search engines don't build an advertising profile based on your searches. --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/docs/tools.md b/docs/tools.md index 7fc1c9c65..7cfe7b9a1 100644 --- a/docs/tools.md +++ b/docs/tools.md @@ -3,6 +3,7 @@ title: "Privacy Tools" icon: material/tools hide: - toc +description: Privacy Guides is the most transparent and reliable website for finding software, apps, and services that protect your personal data from mass surveillance programs and other internet threats. --- If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. diff --git a/docs/tor.md b/docs/tor.md index c2ab0be70..428b108b3 100644 --- a/docs/tor.md +++ b/docs/tor.md @@ -1,6 +1,7 @@ --- title: "Tor Network" icon: simple/torproject +description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. --- ![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } diff --git a/docs/video-streaming.md b/docs/video-streaming.md index a4a12a9b0..bd3bb8bec 100644 --- a/docs/video-streaming.md +++ b/docs/video-streaming.md @@ -1,6 +1,7 @@ --- title: "Video Streaming" icon: material/video-wireless +description: These networks allow you to stream internet content without building an advertising profile based on your interests. --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/docs/vpn.md b/docs/vpn.md index 6ef37fc56..b826f3ece 100644 --- a/docs/vpn.md +++ b/docs/vpn.md @@ -1,6 +1,7 @@ --- title: "VPN Services" icon: material/vpn +description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: