diff --git a/_data/nav/1_providers.yml b/_data/nav/1_providers.yml index b8171e41..b3616337 100644 --- a/_data/nav/1_providers.yml +++ b/_data/nav/1_providers.yml @@ -4,7 +4,7 @@ items: - type: link title: Cloud Storage icon: fad fa-cloud - file: _evergreen/cloud.html + file: _pages/providers/cloud.md - type: link title: DNS Servers icon: fad fa-map-signs @@ -16,7 +16,7 @@ items: - type: link title: Search Engines icon: fad fa-search-location - file: _evergreen/search-engines.html + file: _pages/providers/search-engines.md - type: link title: Social Networks icon: fad fa-thumbs-up diff --git a/_data/nav/2_software.yml b/_data/nav/2_software.yml index 0fa4c616..f6548c1d 100644 --- a/_data/nav/2_software.yml +++ b/_data/nav/2_software.yml @@ -4,7 +4,7 @@ items: - type: link title: Browsers icon: fad fa-browser - file: _evergreen/browsers.html + file: _evergreen/browsers.md - type: link title: Operating Systems (Legacy) icon: fad fa-compact-disc @@ -47,7 +47,7 @@ items: - type: link title: Real-Time Communication icon: fad fa-comments-alt - file: _evergreen/real-time-communication.html + file: _pages/software/real-time-communication.md - type: link title: Self-Contained Networks icon: fad fa-chart-network @@ -55,4 +55,4 @@ items: - type: link title: Video Streaming icon: fad fa-video - file: _evergreen/video-streaming.html + file: _pages/software/video-streaming.md diff --git a/_data/nav/3._operating_systems.yml b/_data/nav/3_operating_systems.yml similarity index 75% rename from _data/nav/3._operating_systems.yml rename to _data/nav/3_operating_systems.yml index 133e4fbd..b8db54a7 100644 --- a/_data/nav/3._operating_systems.yml +++ b/_data/nav/3_operating_systems.yml @@ -4,4 +4,4 @@ items: - type: link title: Android icon: fab fa-android - file: _evergreen/android.html + file: _evergreen/android.md diff --git a/_data/nav/4_privacy.yml b/_data/nav/4_privacy.yml index f9c79c0c..569291f4 100644 --- a/_data/nav/4_privacy.yml +++ b/_data/nav/4_privacy.yml @@ -4,4 +4,4 @@ items: - type: link title: Threat Modeling icon: fad fa-bullseye-arrow - file: _evergreen/threat-modeling.html + file: _evergreen/threat-modeling.md diff --git a/_data/operating-systems/android-applications/1_orbot.yml b/_data/operating-systems/android-applications/1_orbot.yml index 1941da49..46f90104 100644 --- a/_data/operating-systems/android-applications/1_orbot.yml +++ b/_data/operating-systems/android-applications/1_orbot.yml @@ -2,14 +2,14 @@ title: Orbot type: Recommendation logo: /assets/img/android/orbot.svg description: | - Orbot is a free proxy app that routes your connections through the Tor Network. + **Orbot** is a free proxy app that routes your connections through the Tor Network. - Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using the VpnService and can be used with the VPN killswitch (⚙️ Settings → Network & internet → VPN → ⚙️ → Block connections without VPN). + Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using the [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN killswitch (⚙️ Settings → Network & internet → VPN → ⚙️ → Block connections without VPN). - For resistance against traffic analysis attacks, consider enabling Isolate Destination Address ( ⁝ →Settings → Connectivity). This will use a completely different Tor Circuit (different middle relay and exit nodes) for every domain you connect to. + For resistance against traffic analysis attacks, consider enabling *Isolate Destination Address* ( ⁝ →Settings → Connectivity). This will use a completely different Tor Circuit (different middle relay and exit nodes) for every domain you connect to. -

Notes

- Orbot is often outdated on the Guardian Project's F-Droid repository and Google Play so consider downloading directly from the GitHub repository instead. + #### Notes + Orbot is often outdated on the Guardian Project's [F-Droid repository](https://guardianproject.info/fdroid) and [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) so consider downloading directly from the [GitHub repository](https://github.com/guardianproject/orbot) instead. All versions are signed using the same signature so they should be compatible with each other. website: 'https://guardianproject.info/apps/org.torproject.android' diff --git a/_data/operating-systems/android-applications/2_shelter.yml b/_data/operating-systems/android-applications/2_shelter.yml index 2f819b40..0af2ec7f 100644 --- a/_data/operating-systems/android-applications/2_shelter.yml +++ b/_data/operating-systems/android-applications/2_shelter.yml @@ -2,11 +2,11 @@ title: Shelter type: Recommendation logo: /assets/img/android/shelter.svg description: | - Shelter is an app that helps you leverage the Android work profile to isolate other apps. + **Shelter** is an app that helps you leverage the Android work profile to isolate other apps. - Shelter supports blocking contact search cross profiles and sharing files across profiles via the default file manager (DocumentsUI). + Shelter supports blocking contact search cross profiles and sharing files across profiles via the default file manager ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)). -

Notes

+ #### Notes CalyxOS includes a device controller so we recommend using their built in work profile instead. website: 'https://gitea.angry.im/PeterCxy/Shelter' downloads: diff --git a/_data/operating-systems/android-applications/3_auditor.yml b/_data/operating-systems/android-applications/3_auditor.yml index c88ef90d..1debfda5 100644 --- a/_data/operating-systems/android-applications/3_auditor.yml +++ b/_data/operating-systems/android-applications/3_auditor.yml @@ -2,20 +2,19 @@ title: Auditor type: Recommendation logo: /assets/img/android/auditor.svg description: | - Auditor is an app which leverages hardware security features to provide device integrity monitoring for supported devices. It currently works with GrapheneOS and the stock operating system. It performs attestation and intrusion detection by: - + **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). It currently works with GrapheneOS and the stock operating system. It performs attestation and intrusion detection by: + + * Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an *auditor* and *auditee*, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the *Auditor*. + * The *auditor* can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). + * The *auditor* records the current state and configuration of the *auditee*. + * Should tampering with the operating system of the *auditee* after the pairing is complete, the auditor will be aware of the change in the device state and configurations. + * The user will be alerted to the change. No personally identifiable information is submitted to the attestation service. We recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring. - If your threat model requires privacy you could consider using Orbot or a VPN to hide your IP address from the attestation service. + If your [threat model](/threat-modeling/) requires privacy you could consider using Orbot or a VPN to hide your IP address from the attestation service. - To make sure that your hardware and operating system is genuine, perform local attestation immediately after the device has been installed and prior to any internet connection. + To make sure that your hardware and operating system is genuine, [perform local attestation](https://grapheneos.org/install/web#verifying-installation) immediately after the device has been installed and prior to any internet connection. website: 'https://attestation.app' privacy_policy: 'https://attestation.app/privacy-policy' diff --git a/_data/operating-systems/android/1_grapheneos.yml b/_data/operating-systems/android/1_grapheneos.yml index 919c98a8..c21197de 100644 --- a/_data/operating-systems/android/1_grapheneos.yml +++ b/_data/operating-systems/android/1_grapheneos.yml @@ -3,15 +3,15 @@ type: Recommendation logo: /assets/img/android/grapheneos.svg logo_dark: /assets/img/android/grapheneos-dark.svg description: | - GrapheneOS is the best choice when it comes to privacy and security. + **GrapheneOS** is the best choice when it comes to privacy and security. - GrapheneOS has a lot of security hardening and privacy improvements. It has a hardened memory allocator, network and sensor permissions, and various other security features. GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. + GrapheneOS has a lot of security hardening and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so [verified boot](https://source.android.com/security/verifiedboot) is fully supported. - Notably, GrapheneOS supports Sandboxed Play Services. Google Play Services can be run fully sandboxed like a regular user app and contained in a work profile or user profile of your choice. This means that you can run apps dependant on Play Services, such as those that require push notifications using Google's Firebase Cloud Messaging service. GrapheneOS allows you to take advantage of most Google Play Services whilst having full user control over their permissions and access. + Notably, GrapheneOS supports [Sandboxed Play Services](https://grapheneos.org/usage#sandboxed-play-services). Google Play Services can be run fully sandboxed like a regular user app and contained in a work profile or user [profile](/android/#android-security-privacy) of your choice. This means that you can run apps dependant on Play Services, such as those that require push notifications using Google's [Firebase Cloud Messaging](https://firebase.google.com/docs/cloud-messaging/) service. GrapheneOS allows you to take advantage of most [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) whilst having full user control over their permissions and access. - Currently, only Pixel phones meet its hardware security requirement and are supported. + Currently, only [Pixel phones](https://grapheneos.org/faq#device-support) meet its hardware security requirement and are supported. -

Notes

+ #### Notes GrapheneOS's "extended support" devices do not have full security patches (firmware updates) due to the original equipment manufacturer (OEM) discontinuing support. These devices cannot be considered completely secure. website: 'https://grapheneos.org/' privacy_policy: 'https://grapheneos.org/faq#privacy-policy' diff --git a/_data/operating-systems/android/2_calyxos.yml b/_data/operating-systems/android/2_calyxos.yml index 86b6d96d..bac11b96 100644 --- a/_data/operating-systems/android/2_calyxos.yml +++ b/_data/operating-systems/android/2_calyxos.yml @@ -2,20 +2,20 @@ title: CalyxOS type: Recommendation logo: /assets/img/android/calyxos.svg description: | - CalyxOS is a decent alternative to GrapheneOS. + **CalyxOS** is a decent alternative to GrapheneOS. - It has some privacy features on top of AOSP, such as the Datura firewall, Signal integration in the dialer app, and a built in panic button. CalyxOS also comes with firmware updates and signed builds, so verified boot is fully supported. + It has some privacy features on top of AOSP, such as the [Datura firewall](https://calyxos.org/docs/tech/datura-details), [Signal](https://signal.org) integration in the dialer app, and a built in panic button. CalyxOS also comes with firmware updates and signed builds, so [verified boot](https://source.android.com/security/verifiedboot) is fully supported. - To accomodate users who need Google Play Services, CalyxOS optionally includes MicroG. With MicroG, CalyxOS also bundles in the Mozilla and DejaVu location services. + To accomodate users who need Google Play Services, CalyxOS optionally includes [MicroG](https://microg.org/). With MicroG, CalyxOS also bundles in the [Mozilla](https://location.services.mozilla.com/) and [DejaVu](https://github.com/n76/DejaVu) location services. - Currently, CalyxOS supports Google Pixel phones and the Xiaomi Mi A2. For legacy devices, CalyxOS offers "extended support" for much longer than GrapheneOS, making it a good choice once GrapheneOS has dropped support. + Currently, CalyxOS [supports](https://calyxos.org/docs/guide/device-support/) Google Pixel phones and the Xiaomi Mi A2. For legacy devices, CalyxOS offers "extended support" for much longer than GrapheneOS, making it a good choice once GrapheneOS has dropped support. -

Notes

+ #### Notes CalyxOS's "extended support" does not have full security patches due to the original equipment manufacturer (OEM) discontinuing support, therefore they cannot be considered completely secure. With the Xiaomi Mi A2, CalyxOS does not distribute the latest firmware. Newer versions of the firmware prevented the device from performing verified boot. - The Datura firewall can leak in some circumstances (see #572 and #581). + The Datura firewall can leak in some circumstances (see [#572](https://gitlab.com/CalyxOS/calyxos/-/issues/572) and [#581](https://gitlab.com/CalyxOS/calyxos/-/issues/581)). website: 'https://calyxos.org' privacy_policy: 'https://calyxinstitute.org/legal/privacy-policy' downloads: diff --git a/_data/operating-systems/android/3_divestos.yml b/_data/operating-systems/android/3_divestos.yml index 2135deaf..6a3fd6d7 100644 --- a/_data/operating-systems/android/3_divestos.yml +++ b/_data/operating-systems/android/3_divestos.yml @@ -2,22 +2,22 @@ title: DivestOS type: Recommendation logo: /assets/img/android/divestos.svg description: | - DivestOS is a soft-fork of LineageOS. + **DivestOS** is a [soft-fork](https://en.wikipedia.org/wiki/Fork_(software_development)#Forking_of_free_and_open-source_software) of [LineageOS](https://lineageos.org/). - DivestOS inherits many supported devices from LineageOS. It has signed builds, making it possible to have verified boot on some non-Pixel devices. + DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. - DivestOS has automated kernel vulnerability (CVE) patching, fewer proprietary blobs, a custom hosts file, along with bundled F-Droid as the app store. It also includes UnifedNlp for network location and some hardening with Mulch Webview. DivestOS also includes kernel patches from GrapheneOS and enables security features in defconfig. + DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, a custom [hosts](https://divested.dev/index.php?page=dnsbl) file, along with bundled [F-Droid](https://www.f-droid.org) as the app store. It also includes [UnifedNlp](https://github.com/microg/UnifiedNlp) for network location and some hardening with [Mulch Webview](https://gitlab.com/divested-mobile/mulch). DivestOS also includes kernel patches from GrapheneOS and enables security features in [defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L698). - DivestOS also inherits LineageOS's iptables network access feature. You can deny network access to an individual application by pressing and holding on the app's icon (App info → Data and Network → Uncheck "Network Access"). + DivestOS also inherits LineageOS's [iptables](https://reddit.com/comments/c4a6f7) network access feature. You can deny network access to an individual application by pressing and holding on the app's icon (App info → Data and Network → Uncheck "Network Access"). - DivestOS 16.0 and 17.1 has GrapheneOS's hardened memory allocator. There are plans to port this to DivestOS 18.1. + DivestOS 16.0 and 17.1 has GrapheneOS's [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc). There are plans to port this to DivestOS 18.1. -

Notes

- DivestOS firmware update status varies across the devices it supports. For Pixel phones, we still recommend using GrapheneOS or CalyxOS. For other supported devices, DivestOS is a good alternative. + #### Notes + DivestOS firmware update [status](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) varies across the devices it supports. For Pixel phones, we still recommend using GrapheneOS or CalyxOS. For other supported devices, DivestOS is a good alternative. - Like CalyxOS's firewall, the network access toggle can also leak in some situations. + Like CalyxOS's firewall, the network access toggle can also leak in [some](https://gitlab.com/LineageOS/issues/android/-/issues/3228) situations. - Not all of the supported devices have verified boot and some perform it better than others. + Not all of the supported devices have [verified boot](https://source.android.com/security/verifiedboot) and some perform it better than others. website: 'https://divestos.org' website_tor: 'http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion' diff --git a/_data/providers/cloud/1_nextcloud.yml b/_data/providers/cloud/1_nextcloud.yml index 8e5791eb..e07e311e 100644 --- a/_data/providers/cloud/1_nextcloud.yml +++ b/_data/providers/cloud/1_nextcloud.yml @@ -2,7 +2,7 @@ title: Nextcloud type: Recommendation logo: /assets/img/cloud/nextcloud.svg description: | - Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. It also comes with experimental end-to-end encryption (E2EE). + **Nextcloud** is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. It also comes with experimental end-to-end encryption (E2EE). We recommend checking if your Nextcloud provider supports E2EE, otherwise you have to trust the provider to not look at your files. diff --git a/_data/providers/cloud/2_proton-drive.yml b/_data/providers/cloud/2_proton-drive.yml index 27a59e33..cd24d897 100644 --- a/_data/providers/cloud/2_proton-drive.yml +++ b/_data/providers/cloud/2_proton-drive.yml @@ -2,11 +2,11 @@ title: Proton Drive type: Recommendation logo: /assets/img/cloud/protondrive.svg description: | - Proton Drive is an end-to-end encrypted (E2EE) general file storage service by the popular encrypted email provider ProtonMail. + **Proton Drive** is an end-to-end encrypted (E2EE) general file storage service by the popular encrypted email provider [ProtonMail](https://protonmail.com). Proton Drive is currently in beta and only is only available through a web client. - When using a web client, you are placing trust in the server to send you proper JavaScript code to derive the decryption key and authentication token locally in your browser. A compromised server can send you malicious JavaScript code to steal your master password and decrypt your data. If this does not fit your threat model, consider using an alternative. + When using a web client, you are placing trust in the server to send you proper JavaScript code to derive the decryption key and authentication token locally in your browser. A compromised server can send you malicious JavaScript code to steal your master password and decrypt your data. If this does not fit your [threat model](/threat-modeling/), consider using an alternative. website: 'https://protonmail.com' privacy_policy: 'https://protonmail.com/privacy-policy' diff --git a/_data/providers/cloud/3_tahoe-lafs.yml b/_data/providers/cloud/3_tahoe-lafs.yml index e50823af..1d93976c 100644 --- a/_data/providers/cloud/3_tahoe-lafs.yml +++ b/_data/providers/cloud/3_tahoe-lafs.yml @@ -3,7 +3,7 @@ type: Recommendation logo: /assets/img/cloud/tahoe-lafs.svg logo_dark: /assets/img/cloud/tahoe-lafs-dark.svg description: | - Tahoe-LAFS is a free and open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security. The servers used as storage pools do not have access to your data. + **Tahoe-LAFS** is a free and open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security. The servers used as storage pools do not have access to your data. Due to the complexity of the system and the amount of nodes needed to set it up, Tahoe-LAFS is only recommended for seasoned system administrators. website: 'https://www.tahoe-lafs.org/' diff --git a/_data/providers/search-engines/1_duckduckgo.yml b/_data/providers/search-engines/1_duckduckgo.yml index abb63e89..ba75c8c3 100644 --- a/_data/providers/search-engines/1_duckduckgo.yml +++ b/_data/providers/search-engines/1_duckduckgo.yml @@ -2,16 +2,16 @@ title: DuckDuckGo type: Recommendation logo: /assets/img/search-engines/duckduckgo.svg description: | - DuckDuckGo is a popular search engine and is the default for the Tor Browser. + **DuckDuckGo** is a popular search engine and is the default for the Tor Browser. - DuckDuckGo has a lite and html only version, both of which do not require JavaScript and can be used with their Tor onion address (append /lite or /html for the respective version). + DuckDuckGo has a [lite](https://duckduckgo.com/lite) and [html](https://duckduckgo.com/html) only version, both of which [do not require JavaScript](https://help.duckduckgo.com/features/non-javascript) and can be used with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) (append [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version). - DuckDuckGo uses its own crawler and various other sources to provide its search data. + DuckDuckGo uses its own crawler and various [other sources](https://help.duckduckgo.com/results/sources) to provide its search data. -

Notes

+ #### Notes The company is based in the USA. - Their Privacy Policy states they do log your search query, but not your IP or any other identifying information. + Their [Privacy Policy](https://duckduckgo.com/privacy) states they do log your search query, but not your IP or any other identifying information. website: 'https://duckduckgo.com' website_tor: 'https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion' diff --git a/_data/providers/search-engines/2_startpage.yml b/_data/providers/search-engines/2_startpage.yml index eec39de1..374ba3cc 100644 --- a/_data/providers/search-engines/2_startpage.yml +++ b/_data/providers/search-engines/2_startpage.yml @@ -2,16 +2,16 @@ title: Startpage type: Recommendation logo: /assets/img/search-engines/startpage.svg description: | - Startpage is a search engine that provides Google search results. It is a very convenient way to get Google search results without experiencing dark patterns such as difficult captchas or being refused access because you used a VPN or Tor. + **Startpage** is a search engine that provides Google search results. It is a very convenient way to get Google search results without experiencing dark patterns such as difficult captchas or being refused access because you used a [VPN](/providers/vpn) or [Tor](https://www.torproject.org/download/). -

Notes

+ #### Notes Startpage's majority shareholder is System1 who is an adtech company. We don't think that is an issue as they have their own Privacy Policy. - The Privacy Guides team reached out to Startpage back in 2020 for clarification and was satisfied by the answers we received. + The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) for clarification and was satisfied by the answers we received. Startpage is based in the Netherlands. - According to their Privacy Policy, they only log details such as\: operating system, type of browser and language. They do not log your IP address, search queries or other identifying information. + According to their [Privacy Policy](https://www.startpage.com/en/privacy-policy/), they only log details such as: operating system, type of browser and language. They do not log your IP address, search queries or other identifying information. Startpage proxies Google Search so Google does have access to your search queries. diff --git a/_data/providers/search-engines/3_mojeek.yml b/_data/providers/search-engines/3_mojeek.yml index b423506f..d6b614be 100644 --- a/_data/providers/search-engines/3_mojeek.yml +++ b/_data/providers/search-engines/3_mojeek.yml @@ -2,12 +2,12 @@ title: Mojeek type: Recommendation logo: /assets/img/search-engines/mojeek.svg description: | - Mojeek is another privacy friendly search engine. They use their own crawler to provide search data. + **Mojeek** is another privacy friendly search engine. They use their own crawler to provide search data. -

Notes

+ #### Notes The company is based in the UK. - According to their Privacy Policy, they log the originating country, time, page requested, and referral data of each query. IP addresses are not logged. + According to their [Privacy Policy](https://www.mojeek.com/about/privacy/), they log the originating country, time, page requested, and referral data of each query. IP addresses are not logged. website: 'https://www.mojeek.com' privacy_policy: 'https://www.mojeek.com/about/privacy' diff --git a/_data/providers/search-engines/4_searx.yml b/_data/providers/search-engines/4_searx.yml index b4a220f1..7836811c 100644 --- a/_data/providers/search-engines/4_searx.yml +++ b/_data/providers/search-engines/4_searx.yml @@ -2,9 +2,9 @@ title: Searx type: Recommendation logo: /assets/img/search-engines/searx.svg description: | - Searx is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing information about its users. There is a list of public instances. + **Searx** is an [open-source](https://github.com/asciimoo/searx), self-hostable, metasearch engine, aggregating the results of other search engines while not storing information about its users. There is a [list of public instances](https://searx.space/). -

Notes

+ #### Notes Searx is a proxy between the user and the search engines it aggregates from. Your search queries will still be sent to the search engines that Searx gets its results from. When self-hosting, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting Searx, as other people looking up illegal content on your instance could draw unwanted attention from authorities. diff --git a/_data/software/browsers-desktop/1_firefox.yml b/_data/software/browsers-desktop/1_firefox.yml index 717e5428..0f0b21c7 100644 --- a/_data/software/browsers-desktop/1_firefox.yml +++ b/_data/software/browsers-desktop/1_firefox.yml @@ -2,31 +2,32 @@ title: Firefox Desktop type: Recommendation logo: /assets/img/browsers/firefox.svg description: | - Firefox has some really strong privacy settings such as Enhanced Tracking Protection which can help block various types of tracking. + **Firefox** has some really strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop) which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). - These options can be found in the Privacy & Security settings page ( ≡ → Settings → Privacy & Security). -
Enhanced Tracking Protection (ETP).
+ These options can be found in the *Privacy & Security* settings page ( ≡ → Settings → Privacy & Security). + + ##### **Enhanced Tracking Protection (ETP)** -
HTTPS-Only Mode
+ ##### **HTTPS-Only Mode** -
Sanitizing on close
+ ##### **Sanitizing on close** You can still stay logged into websites by allowing exceptions. -

Extensions

- We normally do not recommend installing any extensions, as they have privileged access within your browser. We make an exception for uBlock Origin, - a popular content blocker and 🏆️ Recommended Extension by Mozilla. + #### Extensions + We normally do not recommend installing any extensions, as they have privileged access within your browser. We make an exception for [uBlock Origin](/browsers/#additional-resources), + a popular content blocker and 🏆️ [Recommended Extension](https://support.mozilla.org/kb/add-on-badges#w_recommended-extensions) by Mozilla. -

Arkenfox (advanced)

- The Arkenfox project provides a set of carefully considered options for Firefox. These options are quite strict but a few are subjective and can sometimes cause a website to not work properly. You can easily change these settings to suit your needs. We strongly recommend reading through the basics section. Arkenfox also enables container support. + #### Arkenfox (advanced) + The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. These options are quite strict but a few are subjective and can sometimes cause a website to not work properly. You can easily change these settings to suit your needs. We **strongly recommend** reading through the [basics](https://github.com/arkenfox/user.js/wiki) section. Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. website: 'https://firefox.com' privacy_policy: 'https://www.mozilla.org/privacy/firefox' diff --git a/_data/software/browsers-mobile/1_bromite.yml b/_data/software/browsers-mobile/1_bromite.yml index c1c27504..3ab34cb6 100644 --- a/_data/software/browsers-mobile/1_bromite.yml +++ b/_data/software/browsers-mobile/1_bromite.yml @@ -2,16 +2,16 @@ title: Bromite type: Recommendation logo: /assets/img/browsers/bromite.svg description: | - Bromite is a Chromium-based browser with privacy and security enhancements, built-in ad blocking and some fingerprinting randomization. + **Bromite** is a Chromium-based browser with privacy and security enhancements, built-in ad blocking and some fingerprinting randomization. - These options can be found in Privacy and Security ( ⁝ → ⚙️ Settings → Privacy and Security) + These options can be found in *Privacy and Security* ( ⁝ → ⚙️ Settings → Privacy and Security) -
HTTPS-Only Mode
+ ##### **HTTPS-Only Mode** -
Always on Incognito mode
+ ##### **Always on Incognito mode**