redoomed1 d6862b61d2
update: Add Orbot to Alt Networks section in tools.md
Signed-off-by: redoomed1 <redoomed1@privacyguides.org>
2025-03-29 11:55:35 -07:00

16 KiB

meta_title title icon hide description
Ad-Free Privacy Tool/Service Recommendations - Privacy Guides Privacy Tools material/tools
toc
A complete list of the privacy tools, services, software, and hardware recommended by the Privacy Guides community.

If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.

Technology Essentials{ .md-button .md-button--primary } Internet Browsing Tools{ .md-button .md-button--primary } VPN Providers{ .md-button } DNS Servers{ .md-button } Email Providers{ .md-button } Email Aliasing Services{ .md-button } Photo Organization Tools{ .md-button }

If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our forum or our Matrix community!

For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page.

- [x] **Ad-Free Recommendations** - [x] **Frequent Updates** - [x] **Trusted by Readers**
- [x] **Complete Editorial Independence** - [x] **Open-Source Contributions** - [x] **Trusted by Journalists**

Top 3 Private VPN Providers

VPNs do not provide anonymity

Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.

If you are looking for anonymity, you should use the Tor Browser.

If you're looking for added security, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

Learn more :material-arrow-right-drop-circle:

Top 3 Private Email Providers

  • Proton Mail logo{ .lg .middle .twemoji } Proton Mail


    Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.

    Read Full Review :material-arrow-right-drop-circle:

  • Mailbox.org logo{ .lg .middle .twemoji } Mailbox.org


    Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed.

    Read Full Review :material-arrow-right-drop-circle:

  • Tuta logo{ .lg .middle .twemoji }Tuta logo{ .lg .middle .twemoji } Tuta


    Tuta (formerly Tutanota) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage.

    Read Full Review :material-arrow-right-drop-circle:

### Email Aliasing Services
### Self-Hosting Email

More Private Service Providers

Cloud Storage

Learn more :material-arrow-right-drop-circle:

Data Removal Services

Learn more :material-arrow-right-drop-circle:

DNS

DNS Providers

We recommend a number of encrypted DNS servers based on a variety of criteria, such as Mullvad and Quad9 amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended.

Learn more :material-arrow-right-drop-circle:

Encrypted DNS Proxies

Learn more :material-arrow-right-drop-circle:

Self-hosted Solutions

Learn more :material-arrow-right-drop-circle:

Financial Services

Payment Masking Services

  • Privacy.com logo{ .twemoji loading=lazy }Privacy.com logo{ .twemoji loading=lazy } Privacy.com
  • MySudo logo{ .twemoji loading=lazy }MySudo logo{ .twemoji loading=lazy } MySudo

Learn more :material-arrow-right-drop-circle:

Online Gift Card Marketplaces

Learn more :material-arrow-right-drop-circle:

Photo Management

  • Ente logo{ .twemoji loading=lazy }Ente logo{ .twemoji loading=lazy } Ente Photos
  • Stingle logo{ .twemoji loading=lazy }Stingle logo{ .twemoji loading=lazy } Stingle
  • PhotoPrism logo{ .twemoji loading=lazy } PhotoPrism

Learn more :material-arrow-right-drop-circle:

Search Engines

Learn more :material-arrow-right-drop-circle:

Hardware

Security Keys

Learn more :material-arrow-right-drop-circle:

Mobile Phones

Learn more :material-arrow-right-drop-circle:

Operating Systems

Mobile

Custom Android Operating Systems

  • GrapheneOS logo{ .twemoji loading=lazy }GrapheneOS logo{ .twemoji loading=lazy } GrapheneOS

Learn more :material-arrow-right-drop-circle:

Android Apps

Learn more :material-arrow-right-drop-circle:

Ways to Obtain Android Apps

Learn more :material-arrow-right-drop-circle:

Desktop/PC

Learn more :material-arrow-right-drop-circle:

Router Firmware

  • OpenWrt logo{ .twemoji loading=lazy }OpenWrt logo{ .twemoji loading=lazy } OpenWrt
  • OPNsense logo{ .twemoji loading=lazy } OPNsense

Learn more :material-arrow-right-drop-circle:

Advanced Tools

These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively.

Alternative Networks

  • I2P logo{ .twemoji loading=lazy } I2P logo{ .twemoji loading=lazy } I2P
  • Tor logo{ .twemoji loading=lazy } Tor
  • Orbot logo{ .twemoji loading=lazy } Orbot (Mobile Tor Proxy)
  • Snowflake logo{ .twemoji loading=lazy }Snowflake logo{ .twemoji loading=lazy } Snowflake

Learn more :material-arrow-right-drop-circle:

Device Integrity Verification

Learn more :material-arrow-right-drop-circle: