
- Grammar, Style, and Wording Changes - Remove commas where pauses or breaks in reading may not be needed - Reduce instances of comma splices by replacing commas with semicolons or em dashes where appropriate - Spell out abbreviations like E2EE for the first instance of the term on the page, then use the abbreviation for the subsequent instances - Add line breaks in card descriptions for a cleaner look, particularly for mentions of an accompanying blog review of a tool - Move more technical information from recommendation blurb to the description under the card - Format quotations from audits as block quotes - Standardize syntax for tooltips - Arrange download links according to the widely used order - Mobile app stores > alternative distribution methods (e.g., GitHub) > developer-owned or -operated F-Droid repositories >> desktop platforms > Flathub >> browsers >> web - Shorten Chrome extension links - Standardize icon for web download links - For "Repository" buttons, embed direct links to project's Readme to differentiate them from "Source Code" links - Other Changes - Add GitHub releases link for IVPN - Mention CryptPad's official public instance and add link to list of public instances - Replace current link to Miniflux docs with a direct link to the end user docs - Update version of Newsboat documentation link - Update and reword guidance on finding YouTube channel code for RSS feed - Remove F-Droid download link for Stingle since it is not owned by the developer or dev team Signed-off-by: Jonah Aragon <jonah@privacyguides.org> Signed-off-by: fria <fria@privacyguides.org> Signed-off-by: Daniel Gray <dngray@privacyguides.org>
3.1 KiB
title | icon | description | cover |
---|---|---|---|
Pastebins | material/content-paste | These tools allow you to have full control of any pasted data you share to other parties. | pastebins.webp |
Protects against the following threat(s):
- :material-server-network: Service Providers{ .pg-teal }
Pastebins are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste.
PrivateBin
PrivateBin is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-server-16:{ .card-link title="Public Instances"} :octicons-info-16:{ .card-link title="Documentation" } :octicons-code-16:{ .card-link title="Source Code" }
Paaster
Paaster is a secure and user-friendly pastebin application that prioritizes privacy and simplicity. With end-to-end encryption and paste history, Paaster ensures that your pasted code remains confidential and accessible.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title="Documentation" } :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title="Contribute" }
Criteria
Please note we are not affiliated with any of the projects we recommend. In addition to our standard criteria, we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
Minimum Requirements
- Must be open source.
- Must implement "zero-trust" E2EE.
- Must support password-protected files.
Best-Case
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
- Should have a published audit from a reputable, independent third party.