Compare commits

...

6 Commits

Author SHA1 Message Date
jermanuts
82d9cd06e6
Merge f81ef0f966 into 31ba6da98d 2024-09-28 09:06:08 -05:00
Jonah Aragon
31ba6da98d
update: Add list of sites not supported by removal services (#2759)
Signed-off-by: kimg45 <138676274+kimg45@users.noreply.github.com>
Signed-off-by: Daniel Gray <dngray@privacyguides.org>
2024-09-28 02:28:10 -05:00
kimg45
7191a6d548
fix: Replace Broken Invidious links with YouTube (#2767)
Signed-off-by: Jonah Aragon <jonah@privacyguides.org>
Signed-off-by: Freddy <freddy@privacyguides.org>
Signed-off-by: Daniel Gray <dngray@privacyguides.org>
2024-09-28 02:27:43 -05:00
Jonah Aragon
4bd9c6ca20
feat: Ensure all pages have proper descriptions (#2752)
Signed-off-by: blacklight447 <niek@privacyguides.org>
Signed-off-by: kimg45 <138676274+kimg45@users.noreply.github.com>
Signed-off-by: Daniel Gray <dngray@privacyguides.org>
2024-09-22 17:57:17 +09:30
jermanuts
f81ef0f966
Update real-time-communication.md
Signed-off-by: jermanuts <109705802+jermanuts@users.noreply.github.com>
2024-04-11 19:30:05 +03:00
jermanuts
ba1bfd0c7a
More detailed Session description
Signed-off-by: jermanuts <109705802+jermanuts@users.noreply.github.com>
2024-04-11 19:16:19 +03:00
81 changed files with 377 additions and 142 deletions

View File

@ -1,3 +1,30 @@
---
description: Jonah Aragon is the Project Director and staff writer at Privacy Guides. His role includes researching and writing for this website, system administration, creating Privacy Guides Online Learning course content, reviewing the products recommended here, and most other day-to-day tasks.
schema:
-
"@context": https://schema.org
"@type": ProfilePage
dateCreated: "2019-10-31T00:00:00Z"
dateModified: "2024-09-09T00:00:00Z"
mainEntity:
-
"@context": https://schema.org
"@type": Person
name: Jonah Aragon
jobTitle: Project Director
description: Jonah Aragon is the Project Director and staff writer at Privacy Guides.
url: https://www.privacyguides.org/articles/author/jonah/
image: https://www.privacyguides.org/articles/assets/external/github.com/jonaharagon.png.jpg
sameAs:
- https://www.jonaharagon.com
- https://discuss.privacyguides.net/u/jonah
- https://shop.jonaharagon.com
- https://jonaharagon.me
- https://mastodon.neat.computer/@jonah
- https://www.youtube.com/@jonaharagon
- https://www.wikidata.org/wiki/Q117304062
---
# Jonah Aragon
![Profile picture](https://github.com/jonaharagon.png){ align=right }
@ -7,20 +34,3 @@
He is also known for his work on the Techlore YouTube channel, including the Techlore Talks podcast he co-hosts.
[:simple-mastodon: @jonah@neat.computer](https://mastodon.neat.computer/@jonah "@jonah@neat.computer"){ .md-button rel=me }
<script type="application/ld+json">
{
"@context": "https://schema.org",
"@type": "Person",
"name": "Jonah Aragon",
"jobTitle": "Project Director",
"url": "https://www.privacyguides.org/articles/author/jonah/",
"image": "https://www.privacyguides.org/articles/assets/external/github.com/jonaharagon.png.jpg",
"sameAs": [
"https://www.jonaharagon.com",
"https://shop.jonaharagon.com",
"https://mastodon.neat.computer/@jonah"
],
"description": "Jonah Aragon is the Project Director and staff writer at Privacy Guides."
}
</script>

View File

@ -0,0 +1,7 @@
---
description: The latest announcements and updates from the Privacy Guides team.
---
# Announcements
Follow this page for the latest updates & announcements from the Privacy Guides team, and join the [announcements category](https://discuss.privacyguides.net/c/announcements/5) on our forum to discuss anything you read here!

7
blog/category/news.md Normal file
View File

@ -0,0 +1,7 @@
---
description: Privacy Guides News presents the latest tech news about the world's best (and occasionally worst) software, hardware, and services in the privacy world.
---
# News
The latest tech news about the world's best (and occasionally worst) software, hardware, and services in the privacy world. *Privacy Guides News* has you covered for any important information you might need on your privacy journey.

7
blog/category/reviews.md Normal file
View File

@ -0,0 +1,7 @@
---
description: Read the latest privacy product reviews and stories from Privacy Guides contributing writers.
---
# Reviews
Looking for alternatives to privacy-invasive apps you use everyday? Do you just want to know all the details behind your favorite privacy tools? *Privacy Guides Reviews* is the place to find all that and more. This is your one stop to find the latest advice and recommendations on things we use every day directly from Privacy Guides contributors.

View File

@ -1,5 +1,11 @@
---
title: Latest Articles
description: Privacy-related news stories, product reviews, opinion pieces, and other important articles from Privacy Guides contributors.
hide:
- footer
---
# Latest Articles
This is our home for privacy-related news stories, product reviews, opinion pieces, and other important articles.
Unlike the rest of our website, these articles don't represent a consensus viewpoint of our community. Instead, they present the opinions of trusted authors within our community as-is. You may even find multiple articles on the same topic with competing viewpoints, intended to further [privacy discussion](https://discuss.privacyguides.net/).

View File

@ -11,6 +11,8 @@ links:
tags:
- Instant Messengers
license: BY-SA
description: Choosing an instant messenger is a challenge. How can you be sure youre using the most secure, privacy respecting platform?
schema_type: AnalysisNewsArticle
---
# Choosing the Right Messenger

View File

@ -10,6 +10,8 @@ links:
- Search Engines: https://www.privacyguides.org/en/search-engines/
tags:
- Search Engines
description: Startpage has been removed from Privacy Guides' recommendations following their acquisition by System1.
schema_type: NewsArticle
---
# Delisting Startpage From Privacy Guides

View File

@ -10,6 +10,8 @@ links:
- Types of Communication Networks: https://www.privacyguides.org/en/advanced/communication-network-types/
tags:
- Instant Messengers
description: Wire has been removed from Privacy Guides' recommendations following their acquisition by a US holding company and VC investments.
schema_type: NewsArticle
---
# Delisting Wire From Privacy Guides

View File

@ -11,6 +11,7 @@ tags:
- Browsers
- Firefox
license: CC0
schema_type: AnalysisNewsArticle
---
# Firefox Privacy: 2021 Update

View File

@ -11,6 +11,7 @@ tags:
- Browsers
- Firefox
license: BY-SA
schema_type: AnalysisNewsArticle
---
# Firefox Privacy: Tips and Tricks for Better Browsing

View File

@ -13,6 +13,7 @@ links:
- Android Recommendations: https://www.privacyguides.org/android/
license: BY-SA
robots: nofollow, max-snippet:-1, max-image-preview:large
schema_type: OpinionNewsArticle
---
# Should You Use GrapheneOS or CalyxOS?

View File

@ -11,6 +11,8 @@ links:
tags:
- Government
license: BY-SA
description: In the wake of the September 11, 2001, attack on the United States, the US government enacted laws that weakened citizen privacy in the name of national emergency.
schema_type: OpinionNewsArticle
---
# Hide Nothing

View File

@ -10,6 +10,8 @@ authors:
tags:
- Privacy Guides
license: BY-SA
description: It's finally here. After countless requests, Privacy Guides now has translations.
schema_type: NewsArticle
---
# Privacy Guides Is Now Multilingual

View File

@ -12,6 +12,8 @@ tags:
- iOS
- Windows
license: BY-SA
description: When sharing files, it's important to remove associated metadata. Image files commonly include Exif data, and sometimes photos even include GPS coordinates within its metadata.
schema_type: AnalysisNewsArticle
---
# Removing Metadata From Your Photos, Videos, and Other Files

View File

@ -10,6 +10,8 @@ authors:
tags:
- iOS
license: BY-SA
description: There are a number of privacy and security-related settings you should consider changing in the Settings app on iOS 16.
schema_type: AnalysisNewsArticle
---
# iOS 16 Privacy Configuration Guide

View File

@ -9,6 +9,8 @@ tags:
- Linux
- Security
license: BY-SA
description: We outline a few projects which aim to solve the poor sandboxing situation in Linux relative to operating systems like macOS and ChromeOS.
schema_type: AnalysisNewsArticle
---
# Sandboxing Applications on Desktop Linux

View File

@ -10,6 +10,8 @@ tags:
- Security
license: BY-SA
robots: nofollow, max-snippet:-1, max-image-preview:large
description: There are a number of procedures you can follow to make your Linux desktop system more secure, some more advanced than others. We cover some general techniques here.
schema_type: AnalysisNewsArticle
---
# Hardening Your Desktop Linux System's Security

View File

@ -11,6 +11,8 @@ tags:
links:
- posts/ios-configuration-guide.md
license: BY-SA
description: We cover the improvements macOS Ventura will bring to Apple users when it comes to personal privacy and security.
schema_type: NewsArticle
---
# New Privacy and Security Features in macOS 13 Ventura

View File

@ -9,6 +9,8 @@ authors:
tags:
- Privacy Guides
license: BY-SA
description: Privacy Guides has partnered with HELLOTUX to create what we think are the finest garments in the land.
schema_type: BackgroundNewsArticle
---
# Privacy Guides Now Has Merchandise

View File

@ -10,6 +10,8 @@ links:
tags:
- Facebook
license: BY-SA
description: If someone has to tell you that they care about your privacy, they probably dont.
schema_type: OpinionNewsArticle
---
# Move Fast and Break Things

View File

@ -2,12 +2,14 @@
date:
created: 2024-07-14
categories:
- Opinion
- News
authors:
- jonah
tags:
- Firefox
- Mozilla
description: "'No shady privacy policies or back doors for advertisers' proclaims the Firefox homepage, but that's no longer true in Firefox 128."
schema_type: AnalysisNewsArticle
---
# "Privacy-Preserving" Attribution: Mozilla Disappoints Us Yet Again

View File

@ -5,6 +5,8 @@ categories:
- Announcements
authors:
- jonah
description: We're excited to announce a partnership with MAGIC Grants, a Public 501(c)(3) charity with the mission of supporting privacy projects like ours and providing undergraduate scholarships for students interested in cryptocurrencies and privacy.
schema_type: BackgroundNewsArticle
---
# Privacy Guides Partners With MAGIC Grants 501(c)(3)

View File

@ -1,5 +1,8 @@
---
title: "Proton Wallet Review: Is Proton Losing Touch?"
template: review-article.html
schema_type: ReviewNewsArticle
description: "It may well be that Proton Wallet is the easiest way to start using Bitcoin, but is a Bitcoin wallet the solution people need to improve their financial privacy?"
date:
created: 2024-09-08
categories:
@ -14,7 +17,7 @@ license: BY-SA
preview:
logo: theme/assets/img/cryptocurrency/proton-wallet.svg
review:
type: WebApplication
type: SoftwareApplication
category: FinanceApplication
subcategory: Cryptocurrency Wallet
name: Proton Wallet

View File

@ -9,6 +9,8 @@ links:
- Search Engines: https://www.privacyguides.org/en/search-engines/
tags:
- Search Engines
description: Startpage has been relisted in our search engine recommendations following their open communications with the Privacy Guides community.
schema_type: NewsArticle
---
# Relisting Startpage.com

View File

@ -12,6 +12,8 @@ tags:
links:
- posts/hide-nothing.md
canonical: https://www.jonaharagon.com/posts/restrict-act/
description: The RESTRICT Act would grant the government broad powers to restrict access to any site or service they claim could pose a threat to national security, akin to China's Great Firewall.
schema_type: OpinionNewsArticle
---
# Worried About TikTok? The RESTRICT Act Is Not the Answer Americans Are Looking For

View File

@ -11,6 +11,8 @@ links:
tags:
- Linux
license: BY-SA
description: Erasing data from your computer may seem like a simple task, but if you want to make sure the data is truly unrecoverable, there are some things you should consider.
schema_type: AnalysisNewsArticle
---
# Erasing Data Securely From Your SSD or HDD

View File

@ -11,6 +11,8 @@ links:
tags:
- Security
license: BY
description: Privacy, security, and anonymity often complement each other, but they are not always dependent on each other, and they are definitely not the same thing.
schema_type: OpinionNewsArticle
---
# Security, Privacy, and Anonymity

View File

@ -13,6 +13,8 @@ tags:
- Molly
- Instant Messengers
license: BY-SA
description: This guide details actions you can take to configure and harden Signal in accordance with your threat model.
schema_type: AnalysisNewsArticle
---
# Signal Configuration and Hardening Guide

View File

@ -13,6 +13,8 @@ links:
- posts/signal-configuration-and-hardening.md
- Real-Time Communication: https://www.privacyguides.org/real-time-communication/
license: BY-SA
description: Signal has changed how it handles registration. This primarily affects people who are using a number for Signal that they don't have exclusive access to.
schema_type: ReportageNewsArticle
---
# Important Changes to Signal Registration and Registration Lock

View File

@ -8,6 +8,8 @@ authors:
tags:
- Privacy Guides
license: BY-SA
description: Privacy Guides has reached a significant milestone with today's hire of our first employee, Project Director Jonah Aragon.
schema_type: NewsArticle
---
# Jonah Aragon Hired as Project Director

View File

@ -2,7 +2,7 @@
date:
created: 2019-11-20
categories:
- Opinion
- News
authors:
- jonah
links:
@ -12,6 +12,8 @@ links:
tags:
- VPN
license: BY-SA
description: Theres a massive problem in the privacy world. Many shady companies are disguising advertisements as genuine reviews, to the detriment of real news sources like Privacy Guides and to potential buyers of these services.
schema_type: AnalysisNewsArticle
---
# The Trouble With VPN and Privacy Review Sites

View File

@ -12,6 +12,8 @@ tags:
- Twitter
- Facebook
license: BY-SA
description: The man behind Facebook has somehow managed to make the Twitter experience worse.
schema_type: OpinionNewsArticle
---
# Threads Is the Perfect Twitter Alternative, Just Not for You

View File

@ -11,6 +11,8 @@ links:
tags:
- Facebook
license: BY-SA
description: On Mark Zuckerberg, Facebook, and the Metaverse.
schema_type: OpinionNewsArticle
---
# Virtual Insanity

View File

@ -13,6 +13,8 @@ links:
- Signal Configuration Guide: https://www.privacyguides.org/real-time-communication/signal-configuration-hardening/
- Real-Time Communication: https://www.privacyguides.org/real-time-communication/
license: BY-SA
description: You should be aware of a number of issues with Signals current proxy implementation.
schema_type: NewsArticle
---
# A Warning About Signal Proxies in Iran and Other Oppressive Countries

View File

@ -13,6 +13,8 @@ links:
tags:
- Privacy Guides
license: CC0
description: Today, Privacy Guides has officially launched by our long-standing volunteer team to carry on the legacy of the now-defunct PrivacyTools project.
schema_type: NewsArticle
---
# Welcome to Privacy Guides

View File

@ -10,6 +10,7 @@ links:
tags:
- Privacy Guides
license: CC0
schema_type: NewsArticle
---
# We've Joined the Open Collective Foundation 501(c)(3)

View File

@ -11,6 +11,8 @@ tags:
- Tor
- Self-Hosting
license: BY-SA
description: Each Tor relay is the direct result of an individual deciding to sacrifice money, time and effort for the cause of fighting for a freer Internet.
schema_type: OpinionNewsArticle
---
# Why I Decided to Run a Tor Relay

View File

@ -2,6 +2,7 @@
title: Contributors
hide:
- toc
description: A complete list of contributors who have collectively made an enormous impact on the Privacy Guides project.
---
<!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details -->

View File

@ -1,5 +1,6 @@
---
title: General Criteria
description: A list of general priorities we consider for all submissions to Privacy Guides.
---
Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.

View File

@ -1,5 +1,6 @@
---
title: Donate
description: The charitable mission of Privacy Guides relies on contributions from visitors like yourself. Anything you can do to support the project is hugely appreciated.
---
<!-- markdownlint-disable MD036 -->
Donate to Privacy Guides and support our mission to defend digital rights and spread the word about mass surveillance programs and other daily privacy invasions. You can help Privacy Guides researchers, activists, and maintainers create informative content, host private digital services, and protect privacy rights at a time when the world needs it most.

View File

@ -1,5 +1,6 @@
---
title: Executive Policy
description: These are policies formally adopted by our executive committee, and take precedence over all other statements expressed on this website.
---
These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website.

View File

@ -1,5 +1,6 @@
---
title: Job Openings
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
---
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our staff members are listed [here](../about.md#staff). Please consider [donating](donate.md) to support our cause.

View File

@ -1,5 +1,6 @@
---
title: "Notices and Disclaimers"
description: Information about our website license, acceptable use policy, and other important details.
---
## Legal Disclaimer

View File

@ -1,5 +1,6 @@
---
title: "Privacy Policy"
description: We do not sell or share your data with any third-parties.
---
Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people).

View File

@ -1,5 +1,6 @@
---
title: "PrivacyTools FAQ"
description: The real story behind the team transition from privacytools.io to privacyguides.org
---
In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted.

View File

@ -1,3 +1,7 @@
---
description: We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects.
---
# Privacy Guides Services
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.

View File

@ -1,5 +1,6 @@
---
title: Traffic Statistics
description: We self-host Umami to create a nice visualization of our traffic statistics, which are made public here.
---
<!-- markdownlint-disable MD051 -->
We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below.

View File

@ -1,6 +1,7 @@
---
title: Private Payments
icon: material/hand-coin
description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately.
---
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.

View File

@ -204,5 +204,5 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit
## Additional Resources
- [Tor Browser User Manual](https://tb-manual.torproject.org)
- [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) <small>(YouTube)</small>
- [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) <small>(YouTube)</small>
- [How Tor Works - Computerphile](https://www.youtube.com/watch?v=QRYzre4bf7I) <small>(YouTube)</small>
- [Tor Onion Services - Computerphile](https://www.youtube.com/watch?v=lVcbq_a5N9I) <small>(YouTube)</small>

View File

@ -1,5 +1,6 @@
---
title: "General Apps"
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
schema:
-
"@context": http://schema.org

View File

@ -1,5 +1,6 @@
---
title: "Android"
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
icon: 'simple/android'
cover: android.webp
schema:

View File

@ -1,5 +1,6 @@
---
title: "Obtaining Applications"
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
---
There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference.

View File

@ -1,6 +1,7 @@
---
title: "Why Privacy Matters"
icon: 'material/shield-account'
description: In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not.
---
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.

View File

@ -1,5 +1,6 @@
---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
description: Unlike most cryptocurrencies, these ones provide transaction privacy by default. Monero is our top choice for obfuscating transaction information.
title: Cryptocurrency
icon: material/bank-circle
cover: cryptocurrency.webp

View File

@ -25,18 +25,36 @@ Use your favorite [search engine](search-engines.md) to see if your data is triv
The quickest, most effective, and most private way to remove yourself from people search sites is to submit opt-out requests manually to each site. This can *seem* like a daunting task, because there are hundreds of people search sites, but the reality is that the vast majority of these sites are operated by a small handful of companies.
You should search for your information on these 8 sites first, and submit an opt-out request if your information is found. Removing your data from these providers typically removes your data from many smaller sites at the same time.
You should search for your information on these sites first, and submit an opt-out request if your information is found. Removing your data from these providers typically removes your data from many smaller sites at the same time.
- Acxiom
- BeenVerified
- InfoTracer
- Intelius
- Radaris
- Spokeo
- TruePeopleSearch
- Whitepages
- Advanced Background Checks ([Search](https://www.advancedbackgroundchecks.com/), [Opt-Out](https://www.advancedbackgroundchecks.com/removal))
- BeenVerified ([Search](https://www.beenverified.com/app/optout/search), [Opt-Out](https://www.beenverified.com/app/optout/address-search))
- CheckPeople ([Search](https://checkpeople.com/do-not-sell-info), select *Remove Record* to opt-out)
- ClustrMaps ([Search](https://clustrmaps.com/), [Opt-Out](https://clustrmaps.com/bl/opt-out))
- Dataveria ([Search](https://dataveria.com/), [Opt-Out](https://dataveria.com/ng/control/privacy))
- Glad I Know ([Search](https://gladiknow.com/), [Opt-Out](https://gladiknow.com/opt-out))
- InfoTracer ([Search](https://www.infotracer.com/), [Opt-Out](https://www.infotracer.com/optout))
- Intelius ([Search](https://www.intelius.com/), [Opt-Out](https://suppression.peopleconnect.us/login))
- PeekYou ([Search](https://www.peekyou.com/), [Opt-Out](https://www.peekyou.com/about/contact/optout))
- PublicDataUSA ([Search](https://www.publicdatausa.com/), [Opt-Out](https://www.publicdatausa.com/remove.php))
- Radaris ([Search](https://radaris.com/), [Opt-Out](https://radaris.com/page/how-to-remove))
- Spokeo ([Search](https://www.spokeo.com/search), [Opt-Out](https://www.spokeo.com/optout))
- That's Them ([Search](https://thatsthem.com/), [Opt-Out](https://thatsthem.com/optout))
- USPhonebook ([Search and Opt-Out](https://www.usphonebook.com/opt-out/))
- Whitepages ([Search](https://www.whitepages.com/), [Opt-Out](https://www.whitepages.com/suppression_requests))
Once you have done this, it's best to wait a week or two for the requests to propagate to all their sites. Then, you can start to search and opt-out of any remaining sites you find. It can be a good idea to use a web crawler like [Google's *Results about you*](#google-results-about-you-free) tool to help find any data that remains on the internet.
<div class="admonition tip" markdown>
<p class="admonition-title">A tip on opt-out strategy</p>
Be sure to avoid burning out or becoming overwhelmed with this process. Unless you're in immediate danger, you can take breaks and avoid doing them all at once.[^1]
One strategy could be to look at a single website from the list above every week, starting from the top. Next week you move on to the following website on the list, and so on. When you reach the end of the list, you can start again from the beginning.
This sets you up on a nice schedule to re-review each website approximately every 3-4 months, and breaks down the process into simple 5 minute tasks you can easily add to your weekly routine.
</div>
Once you have opted-out of all of these sites for the first time, it's best to wait a week or two for the requests to propagate to all their sites. Then, you can start to search and opt-out of any remaining sites you find. It can be a good idea to use a web crawler like [Google's *Results about you*](#google-results-about-you-free) tool to help find any data that remains on the internet.
Otherwise, privacy journalist Yael Grauer has compiled an excellent list of data broker sites with direct links to their search tools and opt-out pages. You can take some time to go though each site to determine whether they have your information, and remove it:
@ -61,10 +79,28 @@ Some websites supported by EasyOptOuts are publicly searchable. In those cases E
Our testing indicates that EasyOptOuts provides the best value out of any data removal service we've tested, with a very affordable price and high effectiveness. We will publish a detailed review of EasyOptOuts on our blog in the near future and update this page when it is published. [Independent findings from Consumer Reports](https://discuss.privacyguides.net/t/consumer-reports-evaluating-people-search-site-removal-services/19948) also indicate that EasyOptOuts is one of the top performing data removal services.
<div class="admonition failure" markdown>
<p class="admonition-title">High priority sites not supported by EasyOptOuts</p>
EasyOptOuts does not cover the following sites we consider to be "high priority," so you should still manually opt-out of:
- Intelius ([Search](https://www.intelius.com/), [Opt-Out](https://suppression.peopleconnect.us/login))
- PeekYou ([Search](https://www.peekyou.com/), [Opt-Out](https://www.peekyou.com/about/contact/optout))
- PublicDataUSA ([Search](https://www.publicdatausa.com/), [Opt-Out](https://www.publicdatausa.com/remove.php))
</div>
## Google *Results About You* <small>Free</small>
<div class="admonition warning" markdown>
<p class="admonition-title">Google is a data collector themselves</p>
This method will require you to submit your personal information to Google for them to periodically monitor their search results for. Google claims to not use the information provided to this tool to "personalize your experiences" across other Google products.
While Google is not a data broker themselves *per se*, as they don't sell or share your data with outside parties, some may find this relationship unacceptable. You should always decide whether the benefits of this tool outweigh the drawbacks for your individual situation.
</div>
<div class="admonition recommendation" markdown>
![Google logo](assets/img/data-broker-removals/google.svg){ align=right }
@ -83,3 +119,15 @@ You can add up to 3 addresses, 3 phone numbers, and 3 email addresses to your Go
When results are found, they will be available for review in this web tool. You can also optionally receive an email notification delivered to the account's Gmail address that lets you know when new results are found. You will then be able to click **Request to remove** on each discovered listing, and Google will review the request.
In our testing, this tool worked to reliably remove people search sites from Google search results, but was not effective against websites that showed *corporate* filing information, even if you used your personal address to register a company, nor was it effective against social media profiles.
## Criteria
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing a data removal service, and conduct your own research to ensure it's the right choice for you.
Our picks for removal services are primarily based on independent professional testing from third-parties as noted in the sections above, our own internal testing, and aggregated reviews from our community.
- Must not be a whitelabeled service or reseller of another provider.
- Must not be affiliated with the data broker industry or purchase advertising on people search sites.
- Must only use your personal data for the purposes of opting you out of data broker databases and people search sites.
[^1]: If you *are* immediately threatened by stalkers or other threats, you should strongly consider an automated tool like [EasyOptOuts](#easyoptouts-paid), at least for the initial "purge." When things are more manageable in the future you can come back to the manual process. Of course, in a dangerous situation your first priority should always be to seek professional help from police or others before tackling it on your own.

View File

@ -2,6 +2,7 @@
title: Financial Services
icon: material/bank
cover: financial-services.webp
description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today.
---
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Independent Privacy & Security Resources"
description: "Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life. Ad & affiliate free, high quality reviews."
description: "Established in 2021, Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life."
template: home.html
social:
cards_layout: home

View File

@ -1,5 +1,6 @@
---
title: Admonitions
description: A guide for website contributors on creating admonitions.
---
**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow.

View File

@ -1,5 +1,6 @@
---
title: Branding Guidelines
description: A guide for journalists and website contributors on proper branding of the Privacy Guides wordmark and logo.
---
The name of the website is **Privacy Guides** and should **not** be changed to:

View File

@ -1,5 +1,6 @@
---
title: Commit Messages
description: A guide for website contributors on using useful Git commit messages when making website change requests.
---
For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are:

View File

@ -1,5 +1,6 @@
---
title: Git Recommendations
description: A guide for website contributors on using Git effectively.
---
If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations.

View File

@ -1,5 +1,6 @@
---
title: Translations
description: A guide for website contributors on adding translations to our website.
---
Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site.

View File

@ -1,5 +1,6 @@
---
title: Uploading Images
description: A guide for website contributors on uploading images in the proper format and location.
---
If you make changes to this website that involve adding new images or replacing existing ones, here are a couple of general recommendations:

View File

@ -1,5 +1,6 @@
---
title: Writing Style
description: Our official writing style handbook for website contributors.
---
Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt.

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
meta_title: "Privacy Respecting Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.

View File

@ -1,7 +1,7 @@
---
title: "Mobile Phones"
icon: material/cellphone-check
description: These mobile devices have proper Android Verified Boot support for custom operating systems.
description: These mobile devices provide the best hardware security support for custom Android operating systems.
cover: android.webp
schema:
-

View File

@ -1,5 +1,6 @@
---
title: Operating Systems
description: An overview of our operating system-related recommendations for all major computing hardware.
---
We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices.

View File

@ -1,5 +1,6 @@
---
title: Group Policy Settings
description: A quick guide to configuring Group Policy to make Windows a bit more privacy respecting.
---
Outside of modifying the registry itself, the **Local Group Policy Editor** is the most powerful way to change many aspects of your system without installing third-party tools. Changing these settings requires [Pro Edition](index.md#windows-editions) or better.

View File

@ -1,6 +1,7 @@
---
title: Windows Overview
icon: material/microsoft-windows
description: Microsoft Windows is a common operating system which is extremely non-private out of the box. Our guide covers making some improvements to your computer without replacing your OS.
---
**Microsoft Windows** is a common OS shipped with many PCs by default. The following guides aim to provide some ways to improve privacy and reduce the default telemetry and data stored by disabling some unnecessary features. Over time, Microsoft adds features to the OS which can sometimes rely on cloud-based services. These features will often require certain types of [optional data](https://privacy.microsoft.com/data-collection-windows) that is sometimes sent to remote servers for processing.

View File

@ -2,7 +2,7 @@
meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
description: Encrypted messengers like Signal and SimpleX keep your sensitive communications secure from prying eyes.
cover: real-time-communication.webp
---
<small>Protects against the following threat(s):</small>
@ -247,7 +247,8 @@ Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to s
</div>
Session allows for E2EE in one-on-one chats or closed groups which allow for up to 100 members. Open groups have no restriction on the number of members, but are open by design.
Session allows for E2EE in one-on-one chats or closed groups which allow for up to 100 members. Open groups have no restriction on the number of members, they are hosted on federated servers operated by the communities themselves, and moderation policies are determined by each individual community. However, they are not as private as one-on-one chats or closed groups.
Session was previously based on Signal Protocol before replacing it with their own in December 2020. Session Protocol does [not](https://getsession.org/blog/session-protocol-technical-information) support forward secrecy.[^1]

View File

@ -1,7 +1,7 @@
---
title: "Router Firmware"
icon: material/router-wireless
description: These alternative operating systems can be used to secure your router or Wi-Fi access point.
description: Alternative operating systems for securing your router or Wi-Fi access point.
cover: router.webp
---
Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc.

View File

@ -2,7 +2,7 @@
meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
description: Privacy-respecting search engines which don't build an advertising profile based on your searches.
cover: search-engines.webp
global:
- [randomize-element, "table tbody"]

View File

@ -1,7 +1,7 @@
---
title: "Security Keys"
icon: 'material/key-chain'
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
description: Secure your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
cover: multi-factor-authentication.webp
---
<small>Protects against the following threat(s):</small>

View File

@ -1,10 +1,10 @@
---
meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
meta_title: "Ad-Free Privacy Tool/Service Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
- toc
description: Privacy Guides is the most transparent and reliable website for finding software, apps, and services that protect your personal data from mass surveillance programs and other internet threats.
description: A complete list of the privacy tools, services, software, and hardware recommended by the Privacy Guides community.
---
If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.

View File

@ -2,7 +2,7 @@
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you.
description: The best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you.
cover: vpn.webp
global:
- [randomize-element, "table tbody"]

View File

@ -201,7 +201,6 @@ markdown_extensions:
tables: {}
footnotes: {}
toc:
permalink: true
toc_depth: 4
nav:

View File

@ -358,7 +358,6 @@ markdown_extensions:
tables: {}
footnotes: {}
toc:
permalink: true
toc_depth: 4
nav:

View File

@ -27,7 +27,7 @@
<!-- Page content -->
{% block container %}
<div class="md-content md-content--post" data-md-component="content" itemscope itemtype="https://schema.org/Article">
<div class="md-content md-content--post" data-md-component="content" itemscope itemtype="https://schema.org/{{ page.meta.schema_type or 'Article' }}">
<meta itemprop="headline" content="{{ page.title | striptags }}" />
<meta itemprop="isAccessibleForFree" content="True" />
<meta itemprop="isFamilyFriendly" content="True" />
@ -205,105 +205,33 @@
</ul>
{% endif %}
<!-- Product review information -->
{% if page.meta.review %}
<ul class="md-post__meta md-nav__list" itemprop="about" itemscope itemtype="https://schema.org/{{ page.meta.review.type }}">
<meta itemprop="applicationCategory" content="{{ page.meta.review.category }}" />
<meta itemprop="applicationSubCategory" content="{{ page.meta.review.subcategory }}" />
<li class="md-nav__item md-nav__item--section">
<div class="md-post__title">
<span class="md-ellipsis">
<span itemprop="name">{{ page.meta.review.name }}</span> summary
</span>
<meta itemprop="alternateName" content="{{ page.meta.review.alternateName }}" />
</div>
<div class="md-nav">
<ul class="md-nav__list" itemprop="review" itemscope itemtype="https://schema.org/Review">
<li class="md-nav__item">
<span itemprop="reviewRating" itemscope itemtype="https://schema.org/Rating">
<meta itemprop="bestRating" content="5" />
<meta itemprop="worstRating" content="0.5" />
<span class="md-nav__link" itemprop="ratingValue" content="{{ page.meta.review.rating }}" title="Rating: {{ page.meta.review.rating }} / 5">
{% for i in range(1, 6) %}
{% if i <= page.meta.review.rating %}
{% include ".icons/material/star.svg" %}
{% else %}
{% if i - 0.5 == page.meta.review.rating %}
{% include ".icons/material/star-half-full.svg" %}
{% else %}
{% include ".icons/material/star-outline.svg" %}
{% endif %}
{% endif %}
{% endfor %}
</span>
</span>
{% if page.authors %}
<span itemprop="author" itemscope itemtype="https://schema.org/Person">
{% set reviewAuthor = page.authors[0] %}
<meta itemprop="name" content="{{ reviewAuthor.name }}" />
<meta itemprop="url" content="{{ reviewAuthor.url | url }}" />
</span>
{% endif %}
</li>
<li class="md-nav__item">
<span class="md-nav__link">
<span itemprop="positiveNotes" itemscope itemtype="https://schema.org/ItemList">
<strong itemprop="name">Pros:</strong>
{% block extra_sidebar %}
{% if page.categories[0].title == "Opinion" %}
<ul class="md-post__meta md-nav__list">
<li class="md-nav__item md-nav__item--section">
<div class="md-post__title">
<span class="md-ellipsis">
<span>Disclaimer</span>
</span>
</div>
<div class="md-nav">
<ul class="md-nav__list">
<li class="md-nav__item">
<span class="md-nav__link">
<span>
<ul class="pg-proconlist">
{% for pro in page.meta.review.pros %}
<li itemprop="itemListElement">{{ pro }}</li>
{% endfor %}
</ul>
This is an opinion piece.
The views expressed in this article are the author's own and do not necessarily reflect the views of Privacy Guides and its editorial team.
</span>
</span>
</span>
</li>
<li class="md-nav__item">
<span class="md-nav__link">
<span itemprop="negativeNotes" itemscope itemtype="https://schema.org/ItemList">
<strong itemprop="name">Cons:</strong>
<span>
<ul class="pg-proconlist">
{% for con in page.meta.review.cons %}
<li itemprop="itemListElement">{{ con }}</li>
{% endfor %}
</ul>
</span>
</span>
</span>
</li>
</ul>
<ul class="md-nav__list">
<li class="md-nav__item">
<span class="md-nav__link">
<span itemprop="offers" itemscope itemtype="https://schema.org/Offer">
<strong>Price:</strong>
{% if page.meta.review.price == 0 %}
<span itemprop="price" content="0">Free</span>
{% else %}
<span itemprop="priceCurrency" content="USD">$</span><span itemprop="price" content="{{ page.meta.review.price }}">{{ page.meta.review.price }}</span>
{% endif %}
{% if page.meta.review.period %}
/ {{ page.meta.review.period }}
{% endif %}
</span>
</span>
</li>
<li class="md-nav__item">
<span class="md-nav__link">
<a itemprop="url" href="{{ page.meta.review.website }}"><em>{{ page.meta.review.website.rpartition("//")[-1].partition("/")[0] }}</em></a>
</span>
</li>
</ul>
</div>
</li>
</ul>
{% endif %}
</li>
</ul>
</div>
</li>
</ul>
{% endif %}
{% endblock %}
</nav>
<!-- Table of contents, if integrated -->
{% if "toc.integrate" in features %}
{% include "partials/toc.html" %}

View File

@ -44,6 +44,9 @@ tags:
og:image:height: "{{ image.height }}"
og:url: "{{ page.canonical_url }}"
# Mastodon
fediverse:creator: "@privacyguides@neat.computer"
# Twitter
twitter:card: summary_large_image
twitter:title: *page_title_with_site_name

View File

@ -40,7 +40,7 @@
{% endif %}
<!-- Page content -->
<div itemprop="articleBody">
<div>
{{ page.content }}
</div>

129
theme/review-article.html Normal file
View File

@ -0,0 +1,129 @@
<!--
Copyright (c) 2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to
deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
sell copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
IN THE SOFTWARE.
-->
{% extends "blog-post.html" %}
{% import "partials/nav-item.html" as item with context %}
{% block extra_sidebar %}
<!-- Product review information -->
{% if page.meta.review %}
<ul class="md-post__meta md-nav__list">
<li class="md-nav__item md-nav__item--section">
<div class="md-post__title">
<span class="md-ellipsis">
<span>Our rating</span>
</span>
</div>
<div class="md-nav">
<ul class="md-nav__list">
<li class="md-nav__item">
<span itemprop="reviewRating" itemscope itemtype="https://schema.org/Rating">
<meta itemprop="bestRating" content="5" />
<meta itemprop="worstRating" content="0.5" />
<span class="md-nav__link" itemprop="ratingValue" content="{{ page.meta.review.rating }}" title="Rating: {{ page.meta.review.rating }} / 5">
{% for i in range(1, 6) %}
{% if i <= page.meta.review.rating %}
{% include ".icons/material/star.svg" %}
{% else %}
{% if i - 0.5 == page.meta.review.rating %}
{% include ".icons/material/star-half-full.svg" %}
{% else %}
{% include ".icons/material/star-outline.svg" %}
{% endif %}
{% endif %}
{% endfor %}
</span>
</span>
</li>
<li class="md-nav__item">
<span class="md-nav__link">
<span itemprop="positiveNotes" itemscope itemtype="https://schema.org/ItemList">
<strong itemprop="name">Pros:</strong>
<span>
<ul class="pg-proconlist">
{% for pro in page.meta.review.pros %}
<li itemprop="itemListElement">{{ pro }}</li>
{% endfor %}
</ul>
</span>
</span>
</span>
</li>
<li class="md-nav__item">
<span class="md-nav__link">
<span itemprop="negativeNotes" itemscope itemtype="https://schema.org/ItemList">
<strong itemprop="name">Cons:</strong>
<span>
<ul class="pg-proconlist">
{% for con in page.meta.review.cons %}
<li itemprop="itemListElement">{{ con }}</li>
{% endfor %}
</ul>
</span>
</span>
</span>
</li>
</ul>
</div>
</li>
</ul>
<ul class="md-post__meta md-nav__list" itemprop="itemReviewed" itemscope itemtype="https://schema.org/{{ page.meta.review.type }}">
<meta itemprop="applicationCategory" content="{{ page.meta.review.category }}" />
<meta itemprop="applicationSubCategory" content="{{ page.meta.review.subcategory }}" />
<li class="md-nav__item md-nav__item--section">
<div class="md-post__title">
<span class="md-ellipsis">
<span itemprop="name">{{ page.meta.review.name }}</span> summary
</span>
<meta itemprop="alternateName" content="{{ page.meta.review.alternateName }}" />
</div>
<div class="md-nav">
<ul class="md-nav__list">
<li class="md-nav__item">
<span class="md-nav__link">
<span itemprop="offers" itemscope itemtype="https://schema.org/Offer">
<strong>Price:</strong>
{% if page.meta.review.price == 0 %}
<span itemprop="price" content="0">Free</span>
{% else %}
<span itemprop="priceCurrency" content="USD">$</span><span itemprop="price" content="{{ page.meta.review.price }}">{{ page.meta.review.price }}</span>
{% endif %}
{% if page.meta.review.period %}
/ {{ page.meta.review.period }}
{% endif %}
</span>
</span>
</li>
<li class="md-nav__item">
<span class="md-nav__link">
<strong>Website:</strong>
<a itemprop="url" href="{{ page.meta.review.website }}"><em>{{ page.meta.review.website.rpartition("//")[-1].partition("/")[0] }}</em></a>
</span>
</li>
</ul>
</div>
</li>
</ul>
{% endif %}
</nav>
{% endblock %}