--- layout: default ---
The devices, software, and services that will protect your privacy highly depend on your use-cases, workflows, and threat models. But, if you don't know where to get started, we've chosen some recommended tools to get you going :)