diff --git a/_includes/legacy/cardv2.html b/_includes/legacy/cardv2.html index cd270fa5..73d65abd 100644 --- a/_includes/legacy/cardv2.html +++ b/_includes/legacy/cardv2.html @@ -57,7 +57,7 @@ {% assign tooltip = attr[1] %} {% endif %} {% endfor %} - {% include badge.html + {% include legacy/badge.html link=link color=color text=text diff --git a/_includes/legacy/head.html b/_includes/legacy/head.html index 26c31897..f5e9b754 100644 --- a/_includes/legacy/head.html +++ b/_includes/legacy/head.html @@ -17,7 +17,7 @@ {% endif %} - + @@ -35,7 +35,7 @@ "privacytoolsIO" ], "url": "{{ site.production_url }}", - "logo": "{{ site.production_url }}/assets/img/svg/layout/brand/square-transparent.svg", + "logo": "{{ site.production_url }}/assets/img/legacy_svg/layout/brand/square-transparent.svg", "sameAs": [ "https://blog.privacytools.io", "https://twitter.com/privacytoolsIO", @@ -48,14 +48,14 @@ {% endif %} - - - - - - + + + + + + - + diff --git a/_includes/legacy/nav.html b/_includes/legacy/nav.html index 21d80d1d..bf4ae4b0 100644 --- a/_includes/legacy/nav.html +++ b/_includes/legacy/nav.html @@ -2,7 +2,7 @@
-{% include cardv2.html +{% include legacy/cardv2.html title="ETag Stoppa" - image="/assets/img/svg/3rd-party/etag_stoppa.svg" + image="/assets/img/legacy_svg/3rd-party/etag_stoppa.svg" description="ETag Stoppa Prevents Firefox from storing entity tags by removing ETag response headers unconditionally and without exceptions." website="https://addons.mozilla.org/firefox/addon/etag-stoppa/" forum="" @@ -151,9 +151,9 @@ firefox="https://addons.mozilla.org/firefox/addon/etag-stoppa/" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Cookie AutoDelete: Automatically Delete Cookies" - image="/assets/img/png/3rd-party/cookie_autodelete.png" + image="/assets/img/legacy_png/3rd-party/cookie_autodelete.png" description="Cookie AutoDelete automatically removes cookies, lingering sessions, and other information that can be used to spy on you when they are no longer used by open browser tabs." website="https://addons.mozilla.org/firefox/addon/cookie-autodelete/" forum="https://forum.privacytools.io/t/discussion-cookie-autodelete/267" @@ -168,9 +168,9 @@ These addons require quite a lot of interaction from the user, and some of them completely replace the add-ons we've recommended above. Some sites may not work properly without careful configuration. -{% include cardv2.html +{% include legacy/cardv2.html title="uMatrix: Stop Cross-Site Requests" - image="/assets/img/png/3rd-party/umatrix.png" + image="/assets/img/legacy_png/3rd-party/umatrix.png" description="uMatrix gives you control over the requests that websites make to other websites. Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix allows 1st party scripts in its default configuration. If you want the default functionality of NoScript consider blocking 1st party scripts everywhere by default. This addon has been discontinued." website="https://addons.mozilla.org/firefox/addon/umatrix/" privacy-policy="https://github.com/gorhill/uMatrix/wiki/Privacy-policy" @@ -181,9 +181,9 @@ opera="https://addons.opera.com/extensions/details/umatrix" %} -{% include cardv2.html +{% include legacy/cardv2.html title="CanvasBlocker" - image="/assets/img/svg/3rd-party/canvasblocker.svg" + image="/assets/img/legacy_svg/3rd-party/canvasblocker.svg" description="CanvasBlocker allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API." website="https://github.com/kkapsner/CanvasBlocker/" privacy-policy="https://addons.mozilla.org/firefox/addon/canvasblocker/privacy/" diff --git a/_includes/legacy/sections/browser-recommendation.html b/_includes/legacy/sections/browser-recommendation.html index 96eca12f..2d68b290 100644 --- a/_includes/legacy/sections/browser-recommendation.html +++ b/_includes/legacy/sections/browser-recommendation.html @@ -3,9 +3,9 @@ Browser Recommendations For Desktop -{% include cardv2.html +{% include legacy/cardv2.html title="Firefox" - image="/assets/img/svg/3rd-party/firefox_browser.svg" + image="/assets/img/legacy_svg/3rd-party/firefox_browser.svg" description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our recommendations: Privacy Add-ons WebRTC about:config tweaks.' website="https://firefox.com" @@ -20,9 +20,9 @@ netbsd="http://pkgsrc.se/www/firefox" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Tor Browser - Provides Anonymity" - image="/assets/img/svg/3rd-party/tor_browser.svg" + image="/assets/img/legacy_svg/3rd-party/tor_browser.svg" description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy. How does Tor work?' website="https://www.torproject.org/" privacy-policy="https://support.torproject.org/tbb/tbb-3/" @@ -39,9 +39,9 @@ Browser Recommendations For Android -{% include cardv2.html +{% include legacy/cardv2.html title="Firefox" - image="/assets/img/svg/3rd-party/firefox_browser.svg" + image="/assets/img/legacy_svg/3rd-party/firefox_browser.svg" description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our recommendations: Privacy Add-ons WebRTC about:config tweaks.' website="https://www.mozilla.org/en-US/firefox/mobile/" @@ -53,9 +53,9 @@ android="https://www.mozilla.org/firefox/all/#product-android-release" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Tor Browser - Provides Anonymity" - image="/assets/img/svg/3rd-party/tor_browser.svg" + image="/assets/img/legacy_svg/3rd-party/tor_browser.svg" description='Tor Browser is your choice if you need an extra layer of anonymity. It\'s a modified version of Firefox ESR, which comes with pre-installed privacy add-ons, encryption and an advanced proxy. How does Tor work?' website="https://www.torproject.org/" privacy-policy="https://support.torproject.org/tbb/tbb-3/" @@ -67,9 +67,9 @@ googleplay="https://play.google.com/store/apps/details?id=org.torproject.torbrowser" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Bromite" - image="/assets/img/svg/3rd-party/bromite.svg" + image="/assets/img/legacy_svg/3rd-party/bromite.svg" description='Bromite is a Chromium-based browser with privacy and security enhancements, built-in adblocking and DNS over HTTPS support; it includes patches from ungoogled-chromium and other privacy-focused projects. More info can be found on the official website.' website="https://www.bromite.org/" forum="https://forum.privacytools.io/t/discussion-bromite-browsers/1521" @@ -84,7 +84,7 @@- Similar to DoT, but uses HTTPS instead, being indistinguishable from "normal" HTTPS traffic on port 443 and more difficult to block. {% include badge.html color="warning" text="Warning" tooltip="DoH contains metadata such as user-agent (which may include system information) that is sent to the DNS server." link="https://tools.ietf.org/html/rfc8484#section-8.2" icon="fas fa-exclamation-triangle" %} + Similar to DoT, but uses HTTPS instead, being indistinguishable from "normal" HTTPS traffic on port 443 and more difficult to block. {% include legacy/badge.html color="warning" text="Warning" tooltip="DoH contains metadata such as user-agent (which may include system information) that is sent to the DNS server." link="https://tools.ietf.org/html/rfc8484#section-8.2" icon="fas fa-exclamation-triangle" %}
ProtonMail.com is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. ProtonMail is based in Genève, Switzerland. Accounts start with 500 MB storage with their free plan.
Free accounts have some limitations and do not allow the use of the ProtonMail Bridge, which is required to use a recommended email client (e.g. Thunderbird) or to search email by body text. Paid accounts are available starting at €48/y which include features like ProtonMail Bridge, additional storage, custom domain support, and more. The webmail and mobile apps can only search To:
, From:
, Date:
and Subject:
(this is likely to change when v4.0 of ProtonMail is released).
Paid ProtonMail users can use their own domain with the service. Catch-all addresses are supported with custom domains for Professional and Visionary plans. ProtonMail also supports subaddressing, which is useful for users who don't want to purchase a domain.
-ProtonMail accepts Bitcoin in addition to accepting credit/debit cards and PayPal.
-ProtonMail supports TOTP two factor authentication only. The use of a U2F security key is not yet supported. ProtonMail is planning to implement U2F upon completion of their Single Sign On (SSO) code.
-ProtonMail has zero access encryption at rest for your emails, address book contacts, and calendars. This means the messages and other data stored in your account are only readable by you.
-ProtonMail has integrated OpenPGP encryption in their webmail. Emails to other ProtonMail users are encrypted automatically, and encryption to non-ProtonMail users with an OpenPGP key can be enabled easily in your account settings. They also allow you to encrypt messages to non-ProtonMail users without the need for them to sign up for a ProtonMail account or use software like OpenPGP.
ProtonMail also supports the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of ProtonMail to find the OpenPGP keys of ProtonMail users easily, for cross-provider E2EE.
-ProtonMail is accessible via Tor at protonirockerxow.onion.
-ProtonMail offers a "Visionary" account for €24/Month, which also enables access to ProtonVPN in addition to providing multiple accounts, domains, aliases, and extra storage.
Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with 2 GB of storage, which can be upgraded as needed.
-Mailbox.org lets users use their own domain and they support catch-all addresses. Mailbox.org also supports subaddressing, which is useful for users who don't want to purchase a domain.
-Mailbox.org doesn't accept Bitcoin or any other cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung.
-Mailbox.org supports two factor authentication for their webmail only. You can use either TOTP or a Yubikey via the Yubicloud. Web standards such as U2F and WebAuthn are not yet supported.
-Mailbox.org allows for encryption of incoming mail using their encrypted mailbox. New messages that you receive will then be immediately encrypted with your public key.
However, Open-Exchange, the software platform used by Mailbox.org, does not support the encryption of your address book and calendar. A standalone option may be more appropriate for that information.
-Mailbox.org has integrated encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also allow remote recipients to decrypt an email on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.
Mailbox.org also supports the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of Mailbox.org to find the OpenPGP keys of Mailbox.org users easily, for cross-provider E2EE.
-You can access your Mailbox.org account via IMAP/SMTP using their .onion service. However, their webmail interface cannot be accessed via their .onion service, and users may experience TLS certificate errors.
-All accounts come with limited cloud storage that can be encrypted. Mailbox.org also offers the alias @secure.mailbox.org, which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports Exchange ActiveSync in addition to standard access protocols like IMAP and POP3.
Posteo.de is an email provider that focuses on anonymous, secure, and private email. Their servers are powered by 100% sustainable energy. They have been in operation since 2009. Posteo is based in Germany and has a free 14-day trial. Posteo comes with 2 GB for the monthly cost and an extra gigabyte can be purchased for €0.25 per month.
-Posteo does not allow the use of custom domains, however users may still make use of subaddressing.
-Posteo does not accept Bitcoin or other cryptocurrencies as a form of payment, however they do accept cash-by-mail. They also accept credit/debit cards, bank transfers, and PayPal, and remove PII (personally identifiable information) that they receive in connection with these payment methods.
-Posteo supports two factor authentication for their webmail only. You can use either TOTP a Yubikey with TOTP. Web standards such as U2F and WebAuthn are not yet supported.
-Posteo has zero access encryption for email storage. This means the messages stored in your account are only readable by you.
Posteo also supports the encryption of your address book contacts and calendars at rest. However, Posteo still uses standard CalDAV and CardDAV for calendars and contacts. These protocols do not support E2EE (End-To-End Encryption). A standalone option may be more appropiate.
-Posteo has integrated encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys. They also support the discovery of public keys via HTTP from their Web Key Directory (WKD). This allows users outside of Posteo to find the OpenPGP keys of Posteo users easily, for cross-provider E2EE.
-Posteo does not operate a .onion service.
-Posteo allows users to set up their own mailing lists. Each account can create one list for free.
Disroot offers email amongst other services. The service is maintained by volunteers and its community. They have been in operation since 2015. Disroot is based in Amsterdam. Disroot is free and uses open source software such as Rainloop to provide service. Users support the service through donations and buying extra storage. The mailbox limit is 1 GB, but extra storage can be purchased 0.15€ per GB per month paid yearly.
-Disroot lets users use their own domain. They have aliases, however you must manually apply for them.
-Disroot accepts Bitcoin and Faircoin as payment methods. They also accept PayPal, direct bank deposit, and Patreon payments. Disroot is a not-for-profit organization that also accepts donations through Liberapay, Flattr, and Monero, but these payment methods cannot be used to purchase services.
-Disroot supports TOTP two factor authentication for webmail only. They do not allow U2F security key authentication.
-Disroot uses full disk encryption. However, it doesn't appear to be "zero access", meaning it is technically possible for them to decrypt the data they have.
Disroot also uses the standard CalDAV and CardDAV protocols for calendars and contacts, which do not support E2EE. A standalone option may be more appropriate.
-Disroot allows for encrypted emails to be sent from their webmail application using OpenPGP. However, Disroot has not integrated a Web Key Directory (WKD) for users on their platform.
-Disroot does not operate a .onion service.
-They offer other services such as NextCloud, XMPP Chat, Etherpad, Ethercalc, Pastebin, Online polls and a Gitea instance. They also have an app available in F-Droid.
Tutanota.com is an email service with a focus on security and privacy through the use of encryption. Tutanota has been in operation since 2011 and is based in Hanover, Germany. Accounts start with 1GB storage with their free plan.
Tutanota doesn't allow the use of third-party email clients. There are plans to allow Tutanota pull email from external email accounts using the IMAP protocol. Email import is currently not possible.
Emails can be exported individually or by bulk selection. Tutanota does not allow for subfolders as you might expect with other email providers.
Tutanota is working on a desktop client and they have an app available in F-Droid. They also have their app in conventional stores such as App Store on iOS and Google Play for Android.
-Paid Tutanota accounts can use up to 5 aliases and custom domains. Tutanota doesn't allow for subaddressing (plus addresses), but you can use a catch-all with a custom domain.
-Tutanota accepts only credit cards and PayPal.
-Tutanota supports two factor authentication. Users can either use TOTP or U2F. U2F support is not yet available on Android.
-Tutanota has zero access encryption at rest for your emails, address book contacts, and calendars. This means the messages and other data stored in your account are only readable by you.
-Tutanota does not use OpenPGP. Tutanota users can only receive encrypted emails when external users send them through a temporary Tutanota mailbox.
Tutanota does have plans to support AutoCrypt. This would allow for external users to send encrypted emails to Tutanota users as long as their email client supports the AutoCrypt headers.
-Tutanota does not operate a .onion service but may consider it in the future.
-Tutanota offers the business version of Tutanota to non-profit organizations for free or with a heavy discount.
Tutanota also has a business feature called Secure Connect. This ensures customer contact to the business uses E2EE. The feature costs €240/y.
@@ -199,38 +199,38 @@StartMail.com is an email service with a focus on security and privacy through the use of standard OpenPGP encryption. StartMail has been in operation since 2014 and is based in Boulevard 11, Zeist Netherlands. Accounts start with 10GB. They offer a 30-day trial.
-Personal accounts can use Custom or Generated aliases. Business accounts can use Domain aliases.
-StartMail accepts Visa, MasterCard, American Express and Paypal. StartMail also has other payment options such as Bitcoin (currently only for Personal accounts) and SEPA Direct Debit for accounts older than a year.
-StartMail supports TOTP two factor authentication for webmail only. They do not allow U2F security key authentication.
-StartMail has zero access encryption at rest, using their "user vault" system. When a user logs in, the vault is opened, and the email is then moved to the vault out of the queue where it is decrypted by the corresponding private key.
StartMail supports importing contacts however, they are only accessible in the webmail and not through protocols such as CalDAV. Contacts are also not stored using zero knowledge encryption, so a standalone option may be more appropriate.
-StartMail has integrated encryption in their webmail, which simplifies sending messages to users with public OpenPGP keys.
-StartMail does not operate a .onion service.
-StartMail allows for proxying of images within emails. If a user allows the remote image to be loaded, the sender won't know what the user's IP address is.
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.
Centralized messengers are those where every participant is on the same server or network of servers controlled by the same organization.
{% - include cardv2.html + include legacy/cardv2.html title="Signal" - image="/assets/img/svg/3rd-party/signal.svg" + image="/assets/img/legacy_svg/3rd-party/signal.svg" description='Signal is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling. All communications are E2EE unless you choose to send as SMS. Its protocol has also been indepedently audited (PDF)' labels="color==warning::text==Requires phone number::tooltip==Signal requires your phone number as an personal identifier which means anyone you communicate with will see it.|text==VoIP" website="https://signal.org/" @@ -70,9 +70,9 @@Federated messengers use multiple, independent servers that are able to talk to each other (email is one example of a federated service). Federation allows system administrators to control their own server and still be a part of the larger communications network.
{% - include cardv2.html + include legacy/cardv2.html title="Element" - image="/assets/img/svg/3rd-party/element.svg" + image="/assets/img/legacy_svg/3rd-party/element.svg" description='Element (formerly Riot) is the reference client for the Matrix network. The Matrix open standard is an open-source standard for secure, decentralized, real-time communication.' labels="text==VoIP" website="https://element.io" @@ -128,9 +128,9 @@Peer-to-Peer instant messengers connect directly to each other without requiring third-party servers. Clients (peers) usually find each other through the use of a distributed computing network. Examples of this include DHT (distributed hash table) (used with technologies like torrents and IPFS, for example). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the Scuttlebutt social networking protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made.
{% - include cardv2.html + include legacy/cardv2.html title="Briar" - image="/assets/img/svg/3rd-party/briar.svg" + image="/assets/img/legacy_svg/3rd-party/briar.svg" description="Encrypted instant messenger that connects to contacts via Wi-Fi, Bluetooth, or Tor over the internet to synchronize messages. Technology such as this has proven to be useful when Internet availability is an issue, such as in times of crisis." website="https://briarproject.org" privacy-policy="https://briarproject.org/privacy-policy/" @@ -141,9 +141,9 @@ %} {% - include cardv2.html + include legacy/cardv2.html title="Jami" - image="/assets/img/svg/3rd-party/jami.svg" + image="/assets/img/legacy_svg/3rd-party/jami.svg" description="Encrypted instant messaging and video calling software. All communications are E2EE using TLS 1.3 and never stored elsewhere than on user's devices, even when TURN servers are used." labels="color==warning::link==https://git.jami.net/savoirfairelinux/ring-project/issues/765::text==Warning::tooltip==This software is partially centralized but can be self-hosted.|text==VoIP" website="https://jami.net/" diff --git a/_includes/legacy/sections/key-disclosure-law.html b/_includes/legacy/sections/key-disclosure-law.html index c51e857f..990b2126 100644 --- a/_includes/legacy/sections/key-disclosure-law.html +++ b/_includes/legacy/sections/key-disclosure-law.html @@ -6,7 +6,7 @@Services based in the United States are not recommended because of the country's surveillance programs and use of National Security Letters (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
diff --git a/_includes/legacy/sections/notebooks.html b/_includes/legacy/sections/notebooks.html index 09fbafee..dd3e688d 100644 --- a/_includes/legacy/sections/notebooks.html +++ b/_includes/legacy/sections/notebooks.html @@ -4,9 +4,9 @@ If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, you should pick an alternative here.-Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer.
diff --git a/_includes/legacy/sections/resources.html b/_includes/legacy/sections/resources.html index 66e6c395..03db019b 100644 --- a/_includes/legacy/sections/resources.html +++ b/_includes/legacy/sections/resources.html @@ -4,7 +4,7 @@- {% include card.html color="success" + {% include legacy/card.html color="success" title="Providers" icon="fas fa-server" iconcolor="dark" @@ -12,7 +12,7 @@ description="Discover privacy-centric online services, including email providers, VPN operators, DNS administrators, and more!" %} - {% include card.html color="primary" + {% include legacy/card.html color="primary" title="Web Browsers" icon="far fa-compass" iconcolor="dark" @@ -20,7 +20,7 @@ description="Find a web browser that respects your privacy, and discover how to harden your browser against tracking and leaks." %} - {% include card.html color="warning" + {% include legacy/card.html color="warning" title="Software" icon="far fa-window-restore" iconcolor="dark" @@ -28,7 +28,7 @@ description="Discover a variety of open source software built to protect your privacy and keep your digital data secure." %} - {% include card.html color="info" + {% include legacy/card.html color="info" title="Operating Systems" icon="fas fa-desktop" iconcolor="dark" @@ -36,7 +36,7 @@ description="Find out how your operating system is compromising your privacy, and what simple alternatives exist." %} - {% include card.html color="secondary" + {% include legacy/card.html color="secondary" title="PrivacyTools Services" icon="far fa-eye-slash" iconcolor="dark" @@ -44,7 +44,7 @@ description="The PrivacyTools team is proud to launch a variety of privacy-centric online services, including a Mastodon instance, search engine, and more!" %} - {% include card.html color="danger" + {% include legacy/card.html color="danger" title="Donate" icon="fas fa-donate" iconcolor="dark" diff --git a/_includes/legacy/sections/router-firmware.html b/_includes/legacy/sections/router-firmware.html index c9d36cf6..c198bc5e 100644 --- a/_includes/legacy/sections/router-firmware.html +++ b/_includes/legacy/sections/router-firmware.html @@ -1,19 +1,19 @@{% - include cardv2.html + include legacy/cardv2.html title="Searx" - image="/assets/img/svg/3rd-party/searx.svg" + image="/assets/img/legacy_svg/3rd-party/searx.svg" description='Searx is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing information about its users. There is a list of public instances or you can try the PrivacyTools instance.' website="https://searx.me/" tor="http://ulrn6sryqaifefld.onion" @@ -16,9 +16,9 @@ %} {% - include cardv2.html + include legacy/cardv2.html title="DuckDuckGo" - image="/assets/img/svg/3rd-party/duckduckgo.svg" + image="/assets/img/legacy_svg/3rd-party/duckduckgo.svg" description='DuckDuckGo is a "search engine that doesn\'t track you." Some of DuckDuckGo\'s code is free software hosted at GitHub, but the core is proprietary. The company is based in the USA.' website="https://duckduckgo.com/" privacy-policy="https://duckduckgo.com/privacy" @@ -28,9 +28,9 @@ %} {% - include cardv2.html + include legacy/cardv2.html title="Qwant" - image="/assets/img/svg/3rd-party/qwant.svg" + image="/assets/img/legacy_svg/3rd-party/qwant.svg" description='Qwant is a search engine with its philosophy based on two principles: no user tracking and no filter bubble. The company is based in France.' website="https://www.qwant.com/" privacy-policy="https://about.qwant.com/legal/privacy/" @@ -38,9 +38,9 @@ github="https://github.com/Qwant/" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Startpage.com" - image="/assets/img/svg/3rd-party/startpage.svg" + image="/assets/img/legacy_svg/3rd-party/startpage.svg" description='Startpage.com is a search engine that provides Google search results with complete privacy protection. Startpage BV is a Netherlands-based company that has been dedicated to privacy-respecting search since 2006.' labels="color==warning::link==https://support.startpage.com/index.php?/Knowledgebase/Article/View/1277/0/startpage-ceo-robert-beens-discusses-the-investment-from-privacy-one--system1::text==Warning::tooltip==Startpage.com was recently acquired by United States-based System1." website="https://www.startpage.com/" diff --git a/_includes/legacy/sections/self-contained-networks.html b/_includes/legacy/sections/self-contained-networks.html index a467ab96..53ea6782 100644 --- a/_includes/legacy/sections/self-contained-networks.html +++ b/_includes/legacy/sections/self-contained-networks.html @@ -4,9 +4,9 @@ If you are currently browsing clearnet and want to access the dark web, this section is for you. -{% include cardv2.html +{% include legacy/cardv2.html title="Tor" - image="/assets/img/svg/3rd-party/tor.svg" + image="/assets/img/legacy_svg/3rd-party/tor.svg" description="The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Tor is an effective censorship circumvention tool." website="https://www.torproject.org/" tor="http://expyuzz4wqqyqhjn.onion" @@ -23,10 +23,10 @@ git="https://gitweb.torproject.org/tor.git" %} -{% include cardv2.html +{% include legacy/cardv2.html title="I2P Anonymous Network" - image="/assets/img/svg/3rd-party/i2p.svg" - image-dark="/assets/img/svg/3rd-party/i2p-dark.svg" + image="/assets/img/legacy_svg/3rd-party/i2p.svg" + image-dark="/assets/img/legacy_svg/3rd-party/i2p-dark.svg" description="The Invisible Internet Project (I2P) is a computer network layer that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous Web surfing, chatting, blogging, and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node. The software is free and open-source and is published under multiple licenses." website="https://geti2p.net/" forum="https://forum.privacytools.io/t/discussion-i2p/1590" @@ -43,9 +43,9 @@ source="https://geti2p.net/en/get-involved/guides/new-developers#getting-the-i2p-code" %} -{% include cardv2.html +{% include legacy/cardv2.html title="The Freenet Project" - image="/assets/img/svg/3rd-party/freenet.svg" + image="/assets/img/legacy_svg/3rd-party/freenet.svg" description="Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools were originally designed by Ian Clarke, who defined Freenet's goal as providing freedom of speech on the Internet with strong anonymity protection." website="https://freenetproject.org/" forum="https://forum.privacytools.io/t/discussion-freenet/1591" @@ -63,7 +63,7 @@Open Source Router Firmware
-{% include cardv2.html +{% include legacy/cardv2.html title="OpenWrt" - image="/assets/img/svg/3rd-party/openwrt.svg" - image-dark="/assets/img/svg/3rd-party/openwrt-dark.svg" + image="/assets/img/legacy_svg/3rd-party/openwrt.svg" + image-dark="/assets/img/legacy_svg/3rd-party/openwrt-dark.svg" description="OpenWrt is an operating system (in particular, an embedded operating system) based on the Linux kernel, primarily used on embedded devices to route network traffic. The main components are the Linux kernel, util-linux, uClibc and BusyBox. All components have been optimized for size, to be small enough for fitting into the limited storage and memory available in home routers." badges="info:Linux" website="https://openwrt.org/" git="https://git.openwrt.org/" %} -{% include cardv2.html +{% include legacy/cardv2.html title="pfSense" - image="/assets/img/svg/3rd-party/pfsense.svg" - image-dark="/assets/img/svg/3rd-party/pfsense-dark.svg" + image="/assets/img/legacy_svg/3rd-party/pfsense.svg" + image-dark="/assets/img/legacy_svg/3rd-party/pfsense-dark.svg" description="pfSense is an open source firewall/router computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for a network and is noted for its reliability and offering features often only found in expensive commercial firewalls. pfSense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and as a VPN endpoint." badges="info:BSD" website="https://www.pfsense.org/" @@ -21,10 +21,10 @@ github="https://github.com/pfsense/" %} -{% include cardv2.html +{% include legacy/cardv2.html title="LibreCMC" - image="/assets/img/svg/3rd-party/librecmc.svg" - image-dark="/assets/img/svg/3rd-party/librecmc-dark.svg" + image="/assets/img/legacy_svg/3rd-party/librecmc.svg" + image-dark="/assets/img/legacy_svg/3rd-party/librecmc-dark.svg" description="LibreCMC is a GNU/Linux-libre distribution for computers with minimal resources, such as the Ben Nanonote, ath9k-based Wi-Fi routers, and other hardware with emphasis on free software. The project's current goal is to aim for compliance with the GNU Free System Distribution Guidelines (GNU FSDG) and ensure that the project continues to meet these requirements set forth by the Free Software Foundation (FSF)." badges="info:GNU/Linux" website="https://librecmc.org" diff --git a/_includes/legacy/sections/search-engines.html b/_includes/legacy/sections/search-engines.html index dc2d5c4b..8ce0d505 100644 --- a/_includes/legacy/sections/search-engines.html +++ b/_includes/legacy/sections/search-engines.html @@ -5,9 +5,9 @@
- ZeroNet - Open, free, and uncensorable websites, using Bitcoin cryptography and BitTorrent network. - {% include badge.html + {% include legacy/badge.html color="danger" icon="fas fa-exclamation-triangle" tooltip="Your IP address isn't hidden by default and won't be, unless you enforce Tor usage." @@ -75,7 +75,7 @@
- GNUnet - GNUnet provides a strong foundation of free software for a global, distributed network that provides security and privacy.
- IPFS and IPFS Companion- A peer-to-peer hypermedia protocol to make the web faster, safer, and more open. IPFS Companion is a browser extension for redirecting queries to a gateway of your choice (generally local). - {% include badge.html + {% include legacy/badge.html color="warning" icon="fas fa-exclamation-triangle" link="https://github.com/privacytools/privacytools.io/pull/361#issuecomment-344414022" @@ -86,13 +86,13 @@ Yggdrasil - An early-stage implementation of a fully end-to-end encrypted IPv6 network. It is lightweight, self-arranging, supported on multiple platforms, and allows pretty much any IPv6-capable application to communicate securely with other Yggdrasil nodes. Yggdrasil does not require you to have IPv6 Internet connectivity - it also works over IPv4. - {% include badge.html + {% include legacy/badge.html color="warning" icon="far fa-question-circle" tooltip="The project is currently in early stages but it is being actively developed." text="Experimental" %} - {% include badge.html + {% include legacy/badge.html color="danger" icon="fas fa-exclamation-triangle" link="" diff --git a/_includes/legacy/sections/selfhosted-cloud.html b/_includes/legacy/sections/selfhosted-cloud.html index ff6899c5..ae17e7d2 100644 --- a/_includes/legacy/sections/selfhosted-cloud.html +++ b/_includes/legacy/sections/selfhosted-cloud.html @@ -4,9 +4,9 @@ If you are currently using a Cloud Storage Services like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you should think about hosting it on your own. -{% include cardv2.html +{% include legacy/cardv2.html title="Nextcloud" - image="/assets/img/svg/3rd-party/nextcloud.svg" + image="/assets/img/legacy_svg/3rd-party/nextcloud.svg" description="Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. The only limits on storage and bandwidth are the limits on the server provider you choose." website="https://nextcloud.com/" privacy-policy="https://nextcloud.com/privacy/" @@ -23,10 +23,10 @@ github="https://github.com/nextcloud" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Tahoe-LAFS" - image="/assets/img/svg/3rd-party/tahoe-lafs.svg" - image-dark="/assets/img/svg/3rd-party/tahoe-lafs-dark.svg" + image="/assets/img/legacy_svg/3rd-party/tahoe-lafs.svg" + image-dark="/assets/img/legacy_svg/3rd-party/tahoe-lafs-dark.svg" website="https://www.tahoe-lafs.org/" forum="https://forum.privacytools.io/t/discussion-tahoe-lafs/1662" description="Tahoe-LAFS is a free and open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security." diff --git a/_includes/legacy/sections/social-networks.html b/_includes/legacy/sections/social-networks.html index 25a498d2..937c12a8 100644 --- a/_includes/legacy/sections/social-networks.html +++ b/_includes/legacy/sections/social-networks.html @@ -4,9 +4,9 @@ If you are currently using Social Networks like Facebook or Twitter, you should pick an alternative here. -{% include cardv2.html +{% include legacy/cardv2.html title="Mastodon - Twitter Alternative" - image="/assets/img/svg/3rd-party/mastodon.svg" + image="/assets/img/legacy_svg/3rd-party/mastodon.svg" description='Mastodon is a social network based on open web protocols and free, open-source software. It is decentralized like email, users can exist on different servers or even different platforms but still communicate with each other. It also has the most users, and the most diverse (in terms of interests) users, it looks good, and it is easy to setup yourself. If you are looking for a server to join, you are welcome to join our hosted instance: social.privacytools.io' website="https://joinmastodon.org/" forum="https://forum.privacytools.io/t/discussion-mastodon/289" @@ -23,9 +23,9 @@ web="https://joinmastodon.org/#getting-started" %} -{% include cardv2.html +{% include legacy/cardv2.html title="diaspora* - Google+ Alternative" - image="/assets/img/svg/3rd-party/diaspora.svg" + image="/assets/img/legacy_svg/3rd-party/diaspora.svg" description="diaspora* is based on three key philosophies: Decentralization, Freedom, and Privacy. It is intended to address privacy concerns related to centralized social networks by allowing users set up their own server (or \"pod\") to host content. Pods can then interact to share status updates, photographs, and other social data." website="https://diasporafoundation.org/" forum="https://forum.privacytools.io/t/discussion-diaspora/290" @@ -34,9 +34,9 @@ web="https://diasporafoundation.org/" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Friendica - Facebook Alternative" - image="/assets/img/svg/3rd-party/friendica.svg" + image="/assets/img/legacy_svg/3rd-party/friendica.svg" description="Friendica has an emphasis on extensive privacy settings and easy server installation. It aims to federate with as many other social networks as possible. Currently, Friendica users can integrate contacts from Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io and other services in their social streams." website="https://friendi.ca/" forum="https://forum.privacytools.io/t/discussion-friendica/291" @@ -48,9 +48,9 @@ web="https://friendi.ca/" %} -{% include cardv2.html +{% include legacy/cardv2.html title="PixelFed - Instagram Alternative" - image="/assets/img/svg/3rd-party/pixelfed.svg" + image="/assets/img/legacy_svg/3rd-party/pixelfed.svg" description='PixelFed is a free and ethical photo sharing platform, powered by ActivityPub federation. Pixelfed is an open-source, federated platform. You can run your own instance or join an existing one.' website="https://pixelfed.org/" forum="https://forum.privacytools.io/t/discussion-pixelfed/293" @@ -58,9 +58,9 @@ web="https://pixelfed.org/" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Pleroma - Twitter Alternative" - image="/assets/img/svg/3rd-party/pleroma.svg" + image="/assets/img/legacy_svg/3rd-party/pleroma.svg" description="Pleroma is a free, federated social networking server built on open protocols. It is compatible with Mastodon and many other ActivityPub and OStatus implementations." website="https://pleroma.social" forum="https://forum.privacytools.io/t/discussion-pleroma/2307" diff --git a/_includes/legacy/sections/social-news-aggregator.html b/_includes/legacy/sections/social-news-aggregator.html index 70805e56..dde90e8d 100644 --- a/_includes/legacy/sections/social-news-aggregator.html +++ b/_includes/legacy/sections/social-news-aggregator.html @@ -4,9 +4,9 @@ If you are currently using a online bulletin board like Reddit, you should pick an alternative here. -{% include cardv2.html +{% include legacy/cardv2.html title="Aether" -image="/assets/img/svg/3rd-party/aether.svg" +image="/assets/img/legacy_svg/3rd-party/aether.svg" description='Aether is a free and open-source decentralized social news aggregator with a built-in voting system.' website="https://getaether.net/" privacy-policy="https://getaether.net/privacypolicy/" @@ -17,9 +17,9 @@ mac="https://getaether.net/download/" linux="https://getaether.net/download/" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Tildes" -image="/assets/img/svg/3rd-party/tildes.svg" +image="/assets/img/legacy_svg/3rd-party/tildes.svg" description='Tildes is a web-based self-hostable online bulletin board. It is licensed under AGPLv3.' website="https://tildes.net" privacy-policy="https://docs.tildes.net/policies/privacy-policy" @@ -28,9 +28,9 @@ gitlab="https://gitlab.com/tildes/tildes" web="https://tildes.net" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Raddle" -image="/assets/img/png/3rd-party/raddle.png" +image="/assets/img/legacy_png/3rd-party/raddle.png" description="Raddle is a public Postmill instance focused on privacy and anti-censorship." website="https://raddle.me" privacy-policy="https://raddle.me/wiki/privacy_policy" diff --git a/_includes/legacy/sections/teamchat.html b/_includes/legacy/sections/teamchat.html index 6a86d563..576e4f67 100644 --- a/_includes/legacy/sections/teamchat.html +++ b/_includes/legacy/sections/teamchat.html @@ -9,9 +9,9 @@ {% - include cardv2.html + include legacy/cardv2.html title="Element" - image="/assets/img/svg/3rd-party/element.svg" + image="/assets/img/legacy_svg/3rd-party/element.svg" description='Element (formerly Riot) is the reference client for the Matrix network. The Matrix open standard is an open-source standard for secure, decentralized, real-time communication.' labels="text==VoIP" website="https://element.io" @@ -28,9 +28,9 @@ %} {% - include cardv2.html + include legacy/cardv2.html title="Rocket.chat" - image="/assets/img/svg/3rd-party/rocketchat.svg" + image="/assets/img/legacy_svg/3rd-party/rocketchat.svg" description="Rocket.chat is an self-hostable open source platform for team communication. It has optional federation and experimental E2EE." labels="color==warning::link==https://rocket.chat/docs/user-guides/end-to-end-encryption/::text==Experimental E2EE::tooltip==Regarding E2EE their documentation states 'This feature is currently in alpha. It's also not yet supported on mobile'. There is no forward secrecy so compromised decryption password would leak all messages. Federation was also added afterwards, potentially causing room for mistakes.|text==VoIP" website="https://rocket.chat/" diff --git a/_includes/legacy/sections/tor-operating-systems.html b/_includes/legacy/sections/tor-operating-systems.html index 835df24f..8ba64222 100644 --- a/_includes/legacy/sections/tor-operating-systems.html +++ b/_includes/legacy/sections/tor-operating-systems.html @@ -4,18 +4,18 @@ These Linux distributions are developed with the purpose of directing all network traffic through Tor. -{% include cardv2.html +{% include legacy/cardv2.html title="Tails" - image="/assets/img/svg/3rd-party/tails.svg" + image="/assets/img/legacy_svg/3rd-party/tails.svg" description='Tails is a live operating system that can boot on almost any computer from a DVD, USB stick, or SD card you control. It aims at preserving privacy and anonymity, and circumventing censorship by forcing Internet connections through the Tor network; leaving no trace on the computer; and using state-of-the-art cryptographic tools to encrypt files, emails, and instant messages.' badges="info:Linux" website="https://tails.boum.org/" git="https://git-tails.immerda.ch/tails/" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Whonix" - image="/assets/img/svg/3rd-party/whonix.svg" + image="/assets/img/legacy_svg/3rd-party/whonix.svg" description='A Debian-based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway". All communication are forced through the Tor network to accomplish this. Whonix is best used in conjunction with Qubes.' badges="info:Linux" website="https://www.whonix.org/" diff --git a/_includes/legacy/sections/video-frontends.html b/_includes/legacy/sections/video-frontends.html index c790135b..b1b4f062 100644 --- a/_includes/legacy/sections/video-frontends.html +++ b/_includes/legacy/sections/video-frontends.html @@ -4,9 +4,9 @@ If you are currently using a platform like YouTube, you can keep watching videos without sharing your IP. -{% include cardv2.html +{% include legacy/cardv2.html title="Invidious" - image="/assets/img/svg/3rd-party/invidious.svg" + image="/assets/img/legacy_svg/3rd-party/invidious.svg" description='Invidious is an alternative front-end to YouTube. It is free software, with no advertising or Javascript dependency to play videos, with lots of other features that allow you to have a complete YouTube experience, sans Google.' website="https://invidio.us" github="https://github.com/omarroth/invidious" diff --git a/_includes/legacy/sections/voice-video-messenger.html b/_includes/legacy/sections/voice-video-messenger.html index f3e39871..ff8eed93 100644 --- a/_includes/legacy/sections/voice-video-messenger.html +++ b/_includes/legacy/sections/voice-video-messenger.html @@ -1,12 +1,12 @@
Video/Voice Calling
- If you are currently using a Video/Voice Calling app like Google Hangouts, Skype, Viber or Zoom, you should pick an alternative here. Please note that many of the above instant messengers also support {% include badge.html color="info" text="VoIP" %}. The software listed below are primarily Voice/Video focused. + If you are currently using a Video/Voice Calling app like Google Hangouts, Skype, Viber or Zoom, you should pick an alternative here. Please note that many of the above instant messengers also support {% include legacy/badge.html color="info" text="VoIP" %}. The software listed below are primarily Voice/Video focused.-{% include cardv2.html +{% include legacy/cardv2.html title="Linphone" - image="/assets/img/svg/3rd-party/linphone.svg" + image="/assets/img/legacy_svg/3rd-party/linphone.svg" website="https://www.linphone.org/" privacy-policy="https://www.linphone.org/terms-and-privacy" description="Linphone is an open-source SIP Phone and a free voice over IP service, available on mobile and desktop environments and on web browsers. It supports ZRTP for end-to-end encrypted voice and video communication." @@ -20,9 +20,9 @@ ios="https://apps.apple.com/us/app/linphone/id360065638" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Jitsi Meet" - image="/assets/img/svg/3rd-party/jitsi.svg" + image="/assets/img/legacy_svg/3rd-party/jitsi.svg" website="https://jitsi.org/jitsi-meet/" privacy-policy="https://jitsi.org/security/" description='Jitsi Meet is a free and open-source multiplatform voice (VoIP), video conferencing, and instant messaging application with optional E2EE. It can be used from the browser, in desktop applications or on smartphones. Additional features include screen sharing for presentations and an always-on-top floating call window when minimized. See the list of public Jitsi Meet instances.' @@ -37,9 +37,9 @@ ios="https://apps.apple.com/us/app/jitsi-meet/id1165103905" %} -{% include cardv2.html +{% include legacy/cardv2.html title="Mumble" - image="/assets/img/svg/3rd-party/mumble.svg" + image="/assets/img/legacy_svg/3rd-party/mumble.svg" website="https://mumble.info/" description="Mumble is an open-source, low-latency, and high quality voice chat application primarily intended for use while gaming. Note that while Mumble doesn't log messages or record by default, it's missing end-to-end encryption, so self-hosting is recommended." forum="https://forum.privacytools.io/t/discussion-mumble/1289" diff --git a/_includes/legacy/sections/vpn.html b/_includes/legacy/sections/vpn.html index 7f7ba113..5d7c4d9c 100644 --- a/_includes/legacy/sections/vpn.html +++ b/_includes/legacy/sections/vpn.html @@ -9,8 +9,8 @@Mullvad - {% include badge.html color="info" text="EUR €60/y" %} + {% include legacy/badge.html color="info" text="EUR €60/y" %}
Mullvad.net is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since 2009. Mullvad is based in Sweden and does not have a free trial.
-{% include badge.html color="success" text="35 Countries" %}
+{% include legacy/badge.html color="success" text="35 Countries" %}
Mullvad has servers in 35 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.
We also think it's better for the security of the VPN provider's private keys if they use dedicated servers, instead of cheaper shared solutions (with other customers) such as virtual private servers.
-{% include badge.html color="success" text="Independently Audited" %}
+{% include legacy/badge.html color="success" text="Independently Audited" %}
Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest report published at cure53.de. The security researchers concluded:
...Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint.
In 2020 a second audit was announced and the final audit report was made available on Cure53's website.
-{% include badge.html color="success" text="Open Source Clients" %}
+{% include legacy/badge.html color="success" text="Open Source Clients" %}
Mullvad provides the source code for their desktop and mobile clients in their GitHub organization.
-{% include badge.html color="success" text="Accepts Bitcoin" %}
+{% include legacy/badge.html color="success" text="Accepts Bitcoin" %}
Mullvad in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, and cash/local currency as anonymous forms of payment. They also accept Swish and bank wire transfers.
-{% include badge.html color="success" text="WireGuard Support" %}
+{% include legacy/badge.html color="success" text="WireGuard Support" %}
In addition to standard OpenVPN connections, Mullvad supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
-{% include badge.html color="success" text="IPv6 Support" %}
+{% include legacy/badge.html color="success" text="IPv6 Support" %}
Mullvad supports the future of networking IPv6. Their network allows users to access services hosted on IPv6 as opposed to other providers who block IPv6 connections.
-{% include badge.html color="success" text="Remote Port Forwarding" %}
+{% include legacy/badge.html color="success" text="Remote Port Forwarding" %}
Remote port forwarding is allowed on Mullvad, see Port forwarding with Mullvad VPN.
-{% include badge.html color="success" text="Mobile Clients" %}
+{% include legacy/badge.html color="success" text="Mobile Clients" %}
Mullvad has published App Store and Google Play clients, both supporting an easy-to use interface as opposed to requiring users to manual configure their WireGuard connections. The mobile client on Android is also available in F-Droid, which ensures that it is compiled with reproducible builds.
-{% include badge.html color="info" text="Extra Functionality" %}
+{% include legacy/badge.html color="info" text="Extra Functionality" %}
The Mullvad VPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. The Mullvad website is also accessible via Tor at xcln5hkbriyklr6n.onion.
- +ProtonVPN - {% include badge.html color="info" text="Free" %} - {% include badge.html color="info" text="Basic USD $48/y" %} - {% include badge.html color="secondary" text="Plus USD $96/y" %} + {% include legacy/badge.html color="info" text="Free" %} + {% include legacy/badge.html color="info" text="Basic USD $48/y" %} + {% include legacy/badge.html color="secondary" text="Plus USD $96/y" %}
ProtonVPN.com is a strong contender in the VPN space, and they have been in operation since 2016. ProtonVPN is based in Switzerland and offers a limited free pricing tier, as well as premium options. They offer a further 14% discount for buying a 2 year subscription.
-{% include badge.html color="success" text="44 Countries" %}
+{% include legacy/badge.html color="success" text="44 Countries" %}
ProtonVPN has servers in 44 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.
We also think it's better for the security of the VPN provider's private keys if they use dedicated servers, instead of cheaper shared solutions (with other customers) such as virtual private servers.
-{% include badge.html color="success" text="Independently Audited" %}
+{% include legacy/badge.html color="success" text="Independently Audited" %}
As of January 2020 ProtonVPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in ProtonVPN's Windows, Android, and iOS applications, all of which were "properly fixed" by ProtonVPN before the reports were published. None of the issues identified would have provided an attacker remote access to a user's device or traffic. You can view individual reports for each platform at protonvpn.com. -
{% include badge.html color="success" text="Open Source Clients" %}
+{% include legacy/badge.html color="success" text="Open Source Clients" %}
ProtonVPN provides the source code for their desktop and mobile clients in their GitHub organization.
-{% include badge.html color="success" text="Accepts Bitcoin" %}
+{% include legacy/badge.html color="success" text="Accepts Bitcoin" %}
ProtonVPN does technically accept Bitcoin payments; however, you either need to have an existing account, or contact their support team in advance to register with Bitcoin.
-{% include badge.html color="success" text="Mobile Clients" %}
+{% include legacy/badge.html color="success" text="Mobile Clients" %}
In addition to providing standard OpenVPN configuration files, ProtonVPN has mobile clients for App Store and Google Play allowing for easy connections to their servers. The mobile client on Android is also available in F-Droid, which ensures that it is compiled with reproducible builds.
-{% include badge.html color="warning" text="No Port Forwarding" %}
+{% include legacy/badge.html color="warning" text="No Port Forwarding" %}
ProtonVPN does not currently support remote port forwarding, which may impact some applications. Especially Peer-to-Peer applications like Torrent clients.
-{% include badge.html color="info" text="Extra Functionality" %}
+{% include legacy/badge.html color="info" text="Extra Functionality" %}
The ProtonVPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. ProtonVPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using the official Tor Browser for this purpose.
diff --git a/_includes/legacy/sections/warrant-canary.html b/_includes/legacy/sections/warrant-canary.html index d5cf761e..93edcb3c 100644 --- a/_includes/legacy/sections/warrant-canary.html +++ b/_includes/legacy/sections/warrant-canary.html @@ -1,6 +1,6 @@- +IVPN - {% include badge.html color="info" text="Standard USD $60/y" %} - {% include badge.html color="secondary" text="Pro USD $100/y" %} + {% include legacy/badge.html color="info" text="Standard USD $60/y" %} + {% include legacy/badge.html color="secondary" text="Pro USD $100/y" %}
IVPN.net is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar and offers a 3 day free trial.
-{% include badge.html color="success" text="32 Countries" %}
+{% include legacy/badge.html color="success" text="32 Countries" %}
IVPN has servers in 32 countries at the time of writing this page. Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (less hops) to the destination.
We also think it's better for the security of the VPN provider's private keys if they use dedicated servers, instead of cheaper shared solutions (with other customers) such as virtual private servers.
-{% include badge.html color="success" text="Independently Audited" %}
+{% include legacy/badge.html color="success" text="Independently Audited" %}
IVPN has undergone a no-logging audit from Cure53 which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a comprehensive pentest report Cure53 in January 2020. IVPN has also said they plan to have annual reports in the future.
-{% include badge.html color="success" text="Open Source Clients" %}
+{% include legacy/badge.html color="success" text="Open Source Clients" %}
As of Feburary 2020 IVPN applications are now open source. Source code can be obtained from their GitHub organization.
-{% include badge.html color="success" text="Accepts Bitcoin" %}
+{% include legacy/badge.html color="success" text="Accepts Bitcoin" %}
In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin and cash/local currency (on annual plans) as anonymous forms of payment.
-{% include badge.html color="success" text="WireGuard Support" %}
+{% include legacy/badge.html color="success" text="WireGuard Support" %}
In addition to standard OpenVPN connections, IVPN supports WireGuard. WireGuard is an experimental protocol with theoretically better security and higher reliability, although it is not currently recommended for production use.
-{% include badge.html color="success" text="Remote Port Forwarding" %}
+{% include legacy/badge.html color="success" text="Remote Port Forwarding" %}
Remote port forwarding is possible with a Pro plan. Port forwarding can be activated via the client area. Port forwarding is only available on IVPN when using OpenVPN and is disabled on US servers.
-{% include badge.html color="success" text="Mobile Clients" %}
+{% include legacy/badge.html color="success" text="Mobile Clients" %}
In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for App Store and Google Play allowing for easy connections to their servers. The mobile client on Android is also available in F-Droid, which ensures that it is compiled with reproducible builds.
-{% include badge.html color="info" text="Extra Functionality" %}
+{% include legacy/badge.html color="info" text="Extra Functionality" %}
The IVPN clients have a built-in killswitch to block internet connections outside of the VPN. They also are able to automatically start on boot. IVPN also provides "AntiTracker" functionality, which blocks advertising networks and trackers from the network level.
What is a warrant canary?
- +A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.
diff --git a/_includes/legacy/sections/windows10.html b/_includes/legacy/sections/windows10.html index 5717ded8..739ce6aa 100644 --- a/_includes/legacy/sections/windows10.html +++ b/_includes/legacy/sections/windows10.html @@ -4,7 +4,7 @@ Microsoft introduced a lot of new features in Windows 10 such as Cortana. However, most of them are violating your privacy. - +
- Data syncing is by default enabled. diff --git a/_includes/legacy/sponsors/gold.html b/_includes/legacy/sponsors/gold.html index c1496050..4b6e387d 100644 --- a/_includes/legacy/sponsors/gold.html +++ b/_includes/legacy/sponsors/gold.html @@ -1,30 +1,30 @@
diff --git a/_includes/legacy/sponsors/silver.html b/_includes/legacy/sponsors/silver.html index 55f493d5..1e2db96a 100644 --- a/_includes/legacy/sponsors/silver.html +++ b/_includes/legacy/sponsors/silver.html @@ -1,6 +1,6 @@- +Techlore
https://techlore.tech @@ -9,7 +9,7 @@- +Awesome Resources Ltd
https://www.awesomeresources.co.uk @@ -18,7 +18,7 @@- +Look To The Right
https://looktotheright.com @@ -27,7 +27,7 @@- +scams.info
https://www.scams.info diff --git a/_includes/nav.html b/_includes/nav.html index d210127a..bc97e830 100644 --- a/_includes/nav.html +++ b/_includes/nav.html @@ -3,15 +3,58 @@Privacy Guides
-