diff --git a/docs/data-redaction.md b/docs/data-redaction.md index 2173ebdb..bbb9a07e 100644 --- a/docs/data-redaction.md +++ b/docs/data-redaction.md @@ -11,46 +11,56 @@ When sharing files, be sure to remove associated metadata. Image files commonly ### MAT2 -!!! recommendation +
- ![MAT2 logo](assets/img/data-redaction/mat2.svg){ align=right } +![MAT2 logo](assets/img/data-redaction/mat2.svg){ align=right } - **MAT2** is free software, which allows the metadata to be removed from image, audio, torrent, and document file types. It provides both a command line tool and a graphical user interface via an extension for [Dolphin](https://0xacab.org/jvoisin/mat2/-/tree/master/dolphin), the default file manager of [KDE](https://kde.org). +**MAT2** is free software, which allows the metadata to be removed from image, audio, torrent, and document file types. It provides both a command line tool and a graphical user interface via an extension for [Dolphin](https://0xacab.org/jvoisin/mat2/-/tree/master/dolphin), the default file manager of [KDE](https://kde.org). - On Linux, a third-party graphical tool [Metadata Cleaner](https://gitlab.com/rmnvgr/metadata-cleaner) powered by MAT2 exists and is [available on Flathub](https://flathub.org/apps/details/fr.romainvigier.MetadataCleaner). +On Linux, a third-party graphical tool [Metadata Cleaner](https://gitlab.com/rmnvgr/metadata-cleaner) powered by MAT2 exists and is [available on Flathub](https://flathub.org/apps/details/fr.romainvigier.MetadataCleaner). - [:octicons-repo-16: Repository](https://0xacab.org/jvoisin/mat2){ .md-button .md-button--primary } - [:octicons-info-16:](https://0xacab.org/jvoisin/mat2/-/blob/master/README.md){ .card-link title=Documentation} - [:octicons-code-16:](https://0xacab.org/jvoisin/mat2){ .card-link title="Source Code" } +[:octicons-repo-16: Repository](https://0xacab.org/jvoisin/mat2){ .md-button .md-button--primary } +[:octicons-info-16:](https://0xacab.org/jvoisin/mat2/-/blob/master/README.md){ .card-link title=Documentation} +[:octicons-code-16:](https://0xacab.org/jvoisin/mat2){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-windows11: Windows](https://pypi.org/project/mat2) - - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - - [:simple-linux: Linux](https://pypi.org/project/mat2) - - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) +- [:simple-windows11: Windows](https://pypi.org/project/mat2) +- [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) +- [:simple-linux: Linux](https://pypi.org/project/mat2) +- [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) + +
+ +
## Mobile ### ExifEraser (Android) -!!! recommendation +
- ![ExifEraser logo](assets/img/data-redaction/exiferaser.svg){ align=right } +![ExifEraser logo](assets/img/data-redaction/exiferaser.svg){ align=right } - **ExifEraser** is a modern, permissionless image metadata erasing application for Android. +**ExifEraser** is a modern, permissionless image metadata erasing application for Android. - It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG and WebP files. - [:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } - [:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.none.tom.exiferaser) - - [:octicons-moon-16: Accrescent](https://accrescent.app/app/com.none.tom.exiferaser) - - [:simple-github: GitHub](https://github.com/Tommy-Geenexus/exif-eraser/releases) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.none.tom.exiferaser) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/com.none.tom.exiferaser) +- [:simple-github: GitHub](https://github.com/Tommy-Geenexus/exif-eraser/releases) + +
+ +
The metadata that is erased depends on the image's file type: @@ -70,77 +80,101 @@ The app offers multiple ways to erase metadata from images. Namely: ### Metapho (iOS) -!!! recommendation +
- ![Metapho logo](assets/img/data-redaction/metapho.jpg){ align=right } +![Metapho logo](assets/img/data-redaction/metapho.jpg){ align=right } - **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. +**Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. - [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } - [:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } +[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } - ??? downloads +
+Downloads - - [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) + +
+ +
### PrivacyBlur -!!! recommendation +
- ![PrivacyBlur logo](assets/img/data-redaction/privacyblur.svg){ align=right } +![PrivacyBlur logo](assets/img/data-redaction/privacyblur.svg){ align=right } - **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. +**PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. - [:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) - - [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) -!!! warning +
- You should **never** use blur to redact [text in images](https://bishopfox.com/blog/unredacter-tool-never-pixelation). If you want to redact text in an image, draw a box over the text. For this, we suggest apps like [Pocket Paint](https://github.com/Catrobat/Paintroid). +
+ +
+

Warning

+ +You should **never** use blur to redact [text in images](https://bishopfox.com/blog/unredacter-tool-never-pixelation). If you want to redact text in an image, draw a box over the text. For this, we suggest apps like [Pocket Paint](https://github.com/Catrobat/Paintroid). + +
## Command-line ### ExifTool -!!! recommendation +
- ![ExifTool logo](assets/img/data-redaction/exiftool.png){ align=right } +![ExifTool logo](assets/img/data-redaction/exiftool.png){ align=right } - **ExifTool** is the original perl library and command-line application for reading, writing, and editing meta information (Exif, IPTC, XMP, and more) in a wide variety of file formats (JPEG, TIFF, PNG, PDF, RAW, and more). +**ExifTool** is the original perl library and command-line application for reading, writing, and editing meta information (Exif, IPTC, XMP, and more) in a wide variety of file formats (JPEG, TIFF, PNG, PDF, RAW, and more). - It's often a component of other Exif removal applications and is in most Linux distribution repositories. +It's often a component of other Exif removal applications and is in most Linux distribution repositories. - [:octicons-home-16: Homepage](https://exiftool.org){ .md-button .md-button--primary } - [:octicons-info-16:](https://exiftool.org/faq.html){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/exiftool/exiftool){ .card-link title="Source Code" } - [:octicons-heart-16:](https://exiftool.org/#donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://exiftool.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://exiftool.org/faq.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/exiftool/exiftool){ .card-link title="Source Code" } +[:octicons-heart-16:](https://exiftool.org/#donate){ .card-link title=Contribute } - ??? downloads +
+Downloads - - [:simple-windows11: Windows](https://exiftool.org) - - [:simple-apple: macOS](https://exiftool.org) - - [:simple-linux: Linux](https://exiftool.org) +- [:simple-windows11: Windows](https://exiftool.org) +- [:simple-apple: macOS](https://exiftool.org) +- [:simple-linux: Linux](https://exiftool.org) -!!! example "Deleting data from a directory of files" +
- ```bash - exiftool -all= *.file_extension - ``` +
+ +
+

Deleting data from a directory of files

+ +```bash +exiftool -all= *.file_extension +``` + +
## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

- We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. + +
- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/docs/dns.md b/docs/dns.md index c00db910..a1dde13e 100644 --- a/docs/dns.md +++ b/docs/dns.md @@ -13,10 +13,10 @@ Encrypted DNS with third-party servers should only be used to get around basic [ | DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | | ------------ | -------------- | --------- | ------- | --- | --------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | | [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration.| | [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ| Optional[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | | [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | | [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | @@ -31,9 +31,12 @@ Encrypted DNS with third-party servers should only be used to get around basic [ **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

- We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. + +
- Must support [DNSSEC](advanced/dns-overview.md#what-is-dnssec). - [QNAME Minimization](advanced/dns-overview.md#what-is-qname-minimization). @@ -56,9 +59,12 @@ After installation of either a configuration profile or an app that uses the DNS Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). -!!! info +
+

Info

- `systemd-resolved`, which many Linux distributions use to do their DNS lookups, doesn't yet [support DoH](https://github.com/systemd/systemd/issues/8639). If you want to use DoH, you'll need to install a proxy like [dnscrypt-proxy](https://github.com/DNSCrypt/dnscrypt-proxy) and [configure it](https://wiki.archlinux.org/title/Dnscrypt-proxy) to take all the DNS queries from your system resolver and forward them over HTTPS. +`systemd-resolved`, which many Linux distributions use to do their DNS lookups, doesn't yet [support DoH](https://github.com/systemd/systemd/issues/8639). If you want to use DoH, you'll need to install a proxy like [dnscrypt-proxy](https://github.com/DNSCrypt/dnscrypt-proxy) and [configure it](https://wiki.archlinux.org/title/Dnscrypt-proxy) to take all the DNS queries from your system resolver and forward them over HTTPS. + +
## Encrypted DNS Proxies @@ -66,43 +72,55 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad ### RethinkDNS -!!! recommendation +
- ![RethinkDNS logo](assets/img/android/rethinkdns.svg#only-light){ align=right } - ![RethinkDNS logo](assets/img/android/rethinkdns-dark.svg#only-dark){ align=right } +![RethinkDNS logo](assets/img/android/rethinkdns.svg#only-light){ align=right } +![RethinkDNS logo](assets/img/android/rethinkdns-dark.svg#only-dark){ align=right } - **RethinkDNS** is an open-source Android client supporting [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), [DNS-over-TLS](advanced/dns-overview.md#dns-over-tls-dot), [DNSCrypt](advanced/dns-overview.md#dnscrypt) and DNS Proxy along with caching DNS responses, locally logging DNS queries and can be used as a firewall too. +**RethinkDNS** is an open-source Android client supporting [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), [DNS-over-TLS](advanced/dns-overview.md#dns-over-tls-dot), [DNSCrypt](advanced/dns-overview.md#dnscrypt) and DNS Proxy along with caching DNS responses, locally logging DNS queries and can be used as a firewall too. - [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.celzero.bravedns) - - [:simple-github: GitHub](https://github.com/celzero/rethink-app/releases) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.celzero.bravedns) +- [:simple-github: GitHub](https://github.com/celzero/rethink-app/releases) + +
+ +
### dnscrypt-proxy -!!! recommendation +
- ![dnscrypt-proxy logo](assets/img/dns/dnscrypt-proxy.svg){ align=right } +![dnscrypt-proxy logo](assets/img/dns/dnscrypt-proxy.svg){ align=right } - **dnscrypt-proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). +**dnscrypt-proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). - !!! warning "The anonymized DNS feature does [**not**](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonymize other network traffic." +
+

The anonymized DNS feature does not anonymize other network traffic.

+
- [:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } - [:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } - [:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } - ??? downloads +
+Downloads - - [:simple-windows11: Windows](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-Windows) - - [:simple-apple: macOS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-macOS) - - [:simple-linux: Linux](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-linux) +- [:simple-windows11: Windows](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-Windows) +- [:simple-apple: macOS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-macOS) +- [:simple-linux: Linux](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-linux) + +
+ +
## Self-hosted Solutions @@ -110,31 +128,39 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ### AdGuard Home -!!! recommendation +
- ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } - **AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. - AdGuard Home features a polished web interface to view insights and manage blocked content. +AdGuard Home features a polished web interface to view insights and manage blocked content. - [:octicons-home-16: Homepage](https://adguard.com/adguard-home/overview.html){ .md-button .md-button--primary } - [:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://github.com/AdguardTeam/AdGuardHome/wiki){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/AdguardTeam/AdGuardHome){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://adguard.com/adguard-home/overview.html){ .md-button .md-button--primary } +[:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/AdguardTeam/AdGuardHome/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/AdguardTeam/AdGuardHome){ .card-link title="Source Code" } + + + +
### Pi-hole -!!! recommendation +
- ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } - **Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. - Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. +Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. - [:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } - [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } + + + +
diff --git a/docs/multi-factor-authentication.md b/docs/multi-factor-authentication.md index 6f2c5475..4cb99e54 100644 --- a/docs/multi-factor-authentication.md +++ b/docs/multi-factor-authentication.md @@ -8,17 +8,21 @@ cover: multi-factor-authentication.webp ### YubiKey -!!! recommendation +
- ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) +![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) - The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. - One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. - [:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} + + + +
The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. @@ -26,20 +30,28 @@ YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/su For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. -!!! warning - The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. +
+

Warning

+ +The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + +
### Nitrokey -!!! recommendation +
- ![Nitrokey](assets/img/multi-factor-authentication/nitrokey.jpg){ align=right } +![Nitrokey](assets/img/multi-factor-authentication/nitrokey.jpg){ align=right } - **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. +**Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. - [:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} + + + +
The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. @@ -47,13 +59,19 @@ Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey. For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. -!!! warning +
+

Warning

- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead. +While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead. -!!! warning +
- Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset). +
+

Warning

+ +Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset). + +
The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. @@ -63,9 +81,12 @@ Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern N **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

- We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. + +
#### Minimum Requirements @@ -91,49 +112,62 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative ### ente Auth -!!! recommendation +
- ![ente Auth logo](assets/img/multi-factor-authentication/ente-auth.png){ align=right } +![ente Auth logo](assets/img/multi-factor-authentication/ente-auth.png){ align=right } - **ente Auth** is a free and open-source app which stores and generates TOTP tokens on your mobile device. It can be used with an online account to backup and sync your tokens across your devices (and access them via a web interface) in a secure, end-to-end encrypted fashion. It can also be used offline on a single device with no account necessary. +**ente Auth** is a free and open-source app which stores and generates TOTP tokens on your mobile device. It can be used with an online account to backup and sync your tokens across your devices (and access them via a web interface) in a secure, end-to-end encrypted fashion. It can also be used offline on a single device with no account necessary. - [:octicons-home-16: Homepage](https://ente.io/auth){ .md-button .md-button--primary } - [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } - [:octicons-code-16:](https://github.com/ente-io/auth){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://ente.io/auth){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-code-16:](https://github.com/ente-io/auth){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) - - [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) - - [:simple-github: GitHub](https://github.com/ente-io/auth/releases) - - [:octicons-globe-16: Web](https://auth.ente.io) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-github: GitHub](https://github.com/ente-io/auth/releases) +- [:octicons-globe-16: Web](https://auth.ente.io) + +
+ +
### Aegis Authenticator (Android) -!!! recommendation +
- ![Aegis logo](assets/img/multi-factor-authentication/aegis.png){ align=right } +![Aegis logo](assets/img/multi-factor-authentication/aegis.png){ align=right } - **Aegis Authenticator** is a free and open-source app for Android to manage your 2-step verification tokens for your online services. Aegis Authenticator operates completely offline/locally, but includes the option to export your tokens for backup unlike many alternatives. +**Aegis Authenticator** is a free and open-source app for Android to manage your 2-step verification tokens for your online services. Aegis Authenticator operates completely offline/locally, but includes the option to export your tokens for backup unlike many alternatives. - [:octicons-home-16: Homepage](https://getaegis.app){ .md-button .md-button--primary } - [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } - [:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://getaegis.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } +[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.beemdevelopment.aegis) - - [:simple-github: GitHub](https://github.com/beemdevelopment/Aegis/releases) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.beemdevelopment.aegis) +- [:simple-github: GitHub](https://github.com/beemdevelopment/Aegis/releases) + +
+ +
### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

- We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. + +
- Source code must be publicly available. - Must not require internet connectivity. diff --git a/docs/tools.md b/docs/tools.md index 001f06a0..e10a0165 100644 --- a/docs/tools.md +++ b/docs/tools.md @@ -199,15 +199,18 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b ### VPN Providers -??? danger "VPNs do not provide anonymity" +
+VPNs do not provide anonymity - Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. +Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. - If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. +If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. - If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. +If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. - [Learn more :material-arrow-right-drop-circle:](vpn.md) +[Learn more :material-arrow-right-drop-circle:](vpn.md) + +
@@ -276,11 +279,14 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b ### Encryption Software -??? info "Operating System Disk Encryption" +
+Operating System Disk Encryption - For encrypting your operating system drive, we typically recommend using whichever encryption tool your operating system provides, whether that is **BitLocker** on Windows, **FileVault** on macOS, or **LUKS** on Linux. These tools are included with the operating system and typically use hardware encryption elements such as a TPM that other full-disk encryption software like VeraCrypt do not. VeraCrypt is still suitable for non-operating system disks such as external drives, especially drives that may be accessed from multiple operating systems. +For encrypting your operating system drive, we typically recommend using whichever encryption tool your operating system provides, whether that is **BitLocker** on Windows, **FileVault** on macOS, or **LUKS** on Linux. These tools are included with the operating system and typically use hardware encryption elements such as a TPM that other full-disk encryption software like VeraCrypt do not. VeraCrypt is still suitable for non-operating system disks such as external drives, especially drives that may be accessed from multiple operating systems. - [Learn more :material-arrow-right-drop-circle:](encryption.md##operating-system-included-full-disk-encryption-fde) +[Learn more :material-arrow-right-drop-circle:](encryption.md##operating-system-included-full-disk-encryption-fde) + +
@@ -327,7 +333,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![FreeTube logo](assets/img/frontends/freetube.svg){ .twemoji } [FreeTube (YouTube, Desktop)](frontends.md#freetube) - ![Yattee logo](assets/img/frontends/yattee.svg){ .twemoji } [Yattee (YouTube; iOS, tvOS, macOS)](frontends.md#yattee) -- ![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ .twemoji }![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ .twemoji } [LibreTube (YouTube, Android)](frontends.md#libretube-android) +- ![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ .twemoji }![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ .twemoji } [LibreTube (YouTube, Android)](frontends.md#libretube-android) - ![NewPipe logo](assets/img/frontends/newpipe.svg){ .twemoji } [NewPipe (YouTube, Android)](frontends.md#newpipe-android) - ![Invidious logo](assets/img/frontends/invidious.svg#only-light){ .twemoji }![Invidious logo](assets/img/frontends/invidious-dark.svg#only-dark){ .twemoji } [Invidious (YouTube, Web)](frontends.md#invidious) - ![Piped logo](assets/img/frontends/piped.svg){ .twemoji } [Piped (YouTube, Web)](frontends.md#piped) diff --git a/docs/tor.md b/docs/tor.md index 9143f79d..c8fdafcd 100644 --- a/docs/tor.md +++ b/docs/tor.md @@ -5,7 +5,7 @@ icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: - - + - "@context": http://schema.org "@type": SoftwareApplication name: Tor Browser @@ -39,9 +39,12 @@ Tor works by routing your internet traffic through those volunteer-operated serv ## Connecting to Tor -!!! tip +
+

Tip

- Before connecting to Tor, please ensure you've read our [overview](advanced/tor-overview.md) on what Tor is and how to connect to it safely. We often recommend connecting to Tor through a trusted [VPN provider](vpn.md), but you have to do so **properly** to avoid decreasing your anonymity. +Before connecting to Tor, please ensure you've read our [overview](advanced/tor-overview.md) on what Tor is and how to connect to it safely. We often recommend connecting to Tor through a trusted [VPN provider](vpn.md), but you have to do so **properly** to avoid decreasing your anonymity. + +
There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for anonymous browsing for desktop computers and Android. @@ -51,29 +54,37 @@ If more complete anonymity is paramount to your situation, you should **only** b ### Tor Browser -!!! recommendation +
- ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } - **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. - [:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } - [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } - [:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } - [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } - [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) - - [:simple-android: Android](https://www.torproject.org/download/#android) - - [:simple-windows11: Windows](https://www.torproject.org/download/) - - [:simple-apple: macOS](https://www.torproject.org/download/) - - [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) +- [:simple-android: Android](https://www.torproject.org/download/#android) +- [:simple-windows11: Windows](https://www.torproject.org/download/) +- [:simple-apple: macOS](https://www.torproject.org/download/) +- [:simple-linux: Linux](https://www.torproject.org/download/) -!!! danger +
- You should **never** install any additional extensions on Tor Browser or edit `about:config` settings, including the ones we suggest for Firefox. Browser extensions and non-standard settings make you stand out from others on the Tor network, thus making your browser easier to [fingerprint](https://support.torproject.org/glossary/browser-fingerprinting). +
+ +
+

Danger

+ +You should **never** install any additional extensions on Tor Browser or edit `about:config` settings, including the ones we suggest for Firefox. Browser extensions and non-standard settings make you stand out from others on the Tor network, thus making your browser easier to [fingerprint](https://support.torproject.org/glossary/browser-fingerprinting). + +
The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). @@ -81,69 +92,86 @@ In addition to installing Tor Browser on your computer directly, there are also ### Orbot -!!! recommendation +
- ![Orbot logo](assets/img/self-contained-networks/orbot.svg){ align=right } +![Orbot logo](assets/img/self-contained-networks/orbot.svg){ align=right } - **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. +**Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. - [:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} - [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } - [:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} +[:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) - - [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) - - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) + +
+ +
We previously recommended enabling the *Isolate Destination Address* preference in Orbot settings. While this setting can theoretically improve privacy by enforcing the use of a different circuit for each IP address you connect to, it doesn't provide a practical advantage for most applications (especially web browsing), can come with a significant performance penalty, and increases the load on the Tor network. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1] -!!! tip "Tips for Android" +
+

Tips for Android

- Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN killswitch in :gear: **Settings** → **Network & internet** → **VPN** → :gear: → **Block connections without VPN**. +Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN killswitch in :gear: **Settings** → **Network & internet** → **VPN** → :gear: → **Block connections without VPN**. - Orbot is often outdated on the Guardian Project's [F-Droid repository](https://guardianproject.info/fdroid) and [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android), so consider downloading directly from the [GitHub repository](https://github.com/guardianproject/orbot/releases) instead. +Orbot is often outdated on the Guardian Project's [F-Droid repository](https://guardianproject.info/fdroid) and [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android), so consider downloading directly from the [GitHub repository](https://github.com/guardianproject/orbot/releases) instead. - All versions are signed using the same signature so they should be compatible with each other. +All versions are signed using the same signature so they should be compatible with each other. + +
### Onion Browser -!!! recommendation +
- ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } +![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } - **Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). - [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } - [:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } - ??? downloads +
+Downloads - - [:simple-appstore: App Store](https://apps.apple.com/app/id519296448) +- [:simple-appstore: App Store](https://apps.apple.com/app/id519296448) + +
+ +
## Relays and Bridges ### Snowflake -!!! recommendation +
- ![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } - ![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - **Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - [:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } - [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} - [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } - [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } + + + +
You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. diff --git a/docs/vpn.md b/docs/vpn.md index b554eae2..09fd4d60 100644 --- a/docs/vpn.md +++ b/docs/vpn.md @@ -16,15 +16,18 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
-!!! danger "VPNs do not provide anonymity" +
+

VPNs do not provide anonymity

- Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. +Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. - If you are looking for **anonymity**, you should use the Tor Browser. +If you are looking for **anonymity**, you should use the Tor Browser. - If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. +If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. - [Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } + +
[Detailed VPN Overview :material-arrow-right-drop-circle:](basics/vpn-overview.md){ .md-button } @@ -34,24 +37,29 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope ### Proton VPN -!!! recommendation annotate +
- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ align=right } +![Proton VPN logo](assets/img/vpn/protonvpn.svg){ align=right } - **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. +**Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. - [:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) - - [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) - - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - - [:simple-windows11: Windows](https://protonvpn.com/download-windows) - - [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) +- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) +- [:simple-windows11: Windows](https://protonvpn.com/download-windows) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) + +
+ +
#### :material-check:{ .pg-green } 71 Countries @@ -104,25 +112,30 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit ### IVPN -!!! recommendation +
- ![IVPN logo](assets/img/vpn/ivpn.svg){ align=right } +![IVPN logo](assets/img/vpn/ivpn.svg){ align=right } - **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. +**IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. - [:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - - [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) - - [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) - - [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) - - [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) +- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) +- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) +- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) + +
+ +
#### :material-check:{ .pg-green } 37 Countries @@ -169,26 +182,31 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN ### Mullvad -!!! recommendation +
- ![Mullvad logo](assets/img/vpn/mullvad.svg){ align=right } +![Mullvad logo](assets/img/vpn/mullvad.svg){ align=right } - **Mullvad** is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since **2009**. Mullvad is based in Sweden and does not have a free trial. +**Mullvad** is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since **2009**. Mullvad is based in Sweden and does not have a free trial. - [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } - [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } - [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } +[:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) - - [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) - - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) - - [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) - - [:simple-apple: macOS](https://mullvad.net/en/download/macos/) - - [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) +- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) + +
+ +
#### :material-check:{ .pg-green } 40 Countries @@ -247,9 +265,12 @@ Mullvad is very transparent about which nodes they [own or rent](https://mullvad ## Criteria -!!! danger +
+

Danger

- It is important to note that using a VPN provider will not make you anonymous, but it will give you better privacy in certain situations. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy. +It is important to note that using a VPN provider will not make you anonymous, but it will give you better privacy in certain situations. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy. + +
**Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements for any VPN provider wishing to be recommended, including strong encryption, independent security audits, modern technology, and more. We suggest you familiarize yourself with this list before choosing a VPN provider, and conduct your own research to ensure the VPN provider you choose is as trustworthy as possible.