You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.


Over the last 16 months, as I’ve debated this issue around the world, every single time somebody has said to me, “I don’t really worry about invasions of privacy because I don’t have anything to hide.” I always say the same thing to them. I get out a
pen, I write down my email address. I say, “Here’s my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I
want to be able to just troll through what it is you’re doing online, read what I want to read and publish whatever I find interesting. After all, if you’re not a bad person, if you’re doing nothing wrong, you should have nothing to hide.” Not a single person has taken me up on that offer.

Glenn Greenwald in Why privacy matters – TED Talk

Related: How do you counter the “I have nothing to hide?” argument?

UKUSA Agreement

The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes,
focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other’s citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third party countries can and do
spy on each other.

Five Eyes

1. Australia

2. Canada

3. New Zealand

4. United Kingdom

5. United States of America

Nine Eyes

6. Denmark

7. France

8. Netherlands

9. Norway

Fourteen Eyes

10. Belgium

11. Germany

12. Italy

13. Spain

14. Sweden

Why is it not recommended to choose a US based service?

USA

Services based in the United States are not recommended because of the country’s surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which
forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and
transform the service into a tool of mass surveillance.

An example of this is Lavabit – a discontinued secure email service created by Ladar Levison. The FBI requested Snowden’s records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service’s SSL keys. Having the SSL keys would allow them to access
communications (both metadata and unencrypted content) in real time for all of Lavabit’s customers, not just Snowden’s.

Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest,
saying that shutting down the service was a violation of the court order.

Key disclosure law – Who is required to hand over the encryption keys to authorities?

Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant
is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an
adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).

Related Information

All providers listed here are outside the US, use encryption, accept Bitcoin, support OpenVPN and have a no logging policy.

Note: Using a VPN provider will not make you anonymous. But it will give you a better privacy. A VPN is not a tool for illegal activities. Don’t rely on a “no log” policy.

Warrant Canary Example

A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has
received such a subpoena and should stop using the service.

Warrant Canary Examples:

  1. https://proxy.sh/canary
  2. https://www.ivpn.net/resources/canary.txt
  3. https://www.vpnsecure.me/files/canary.txt
  4. https://www.bolehvpn.net/canary.html
  5. https://lokun.is/canary.txt
  6. https://www.ipredator.se/static/downloads/canary.txt

Related Warrant Canary Information

Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify.

Fingerprint image

When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using
cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.



You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should
have a spoofed user agent string to match what the large userbase has. You need have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to
look as common as everyone else. Disabling JavaScript, using Linux, or even the TBB, will make your browser stick out from the masses.

Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger, uBlock Origin and Disconnect.
They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser’s fingerprint.

Related Information

WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN.

While software like NoScript prevents this, it’s probably a good idea to block this protocol directly as well, just to be safe.



How to disable WebRTC in Firefox?

In short: Set “media.peerconnection.enabled” to “false” in “about:config”.

Explained:

  1. Enter “about:config” in the firefox address bar and press enter.
  2. Press the button “I’ll be careful, I promise!”
  3. Search for “media.peerconnection.enabled”
  4. Double click the entry, the column “Value” should now be “false”
  5. Done. Do the WebRTC leak test again.

If you want to make sure every single WebRTC related setting is really disabled change these settings:

  1. media.peerconnection.turn.disable = true
  2. media.peerconnection.use_document_iceservers = false
  3. media.peerconnection.video.enabled = false
  4. media.peerconnection.identity.timeout = 1

Now you can be 100% sure WebRTC is disabled.



How to fix the WebRTC Leak in Google Chrome?

There is no known working solution, only a plugin that is easily circumvented. Please use Firefox instead.

What about other browsers?

Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. But we recommend using Firefox on all devices.

Improve your privacy with these excellent Firefox add-ons.

Stop tracking with “Disconnect”

Disconnect

Founded in 2011 by former Google engineers and a consumer-and privacy-rights attorney. The addon is open source and loads the pages you go to 27% faster and stops tracking by 2,000+ third-party sites. It also keeps your searches private.

https://addons.mozilla.org/firefox/addon/disconnect/

Block Ads with “uBlock Origin”

uBlock

An efficient wide-spectrum-blocker that’s easy on memory, and yet can load and enforce thousands more filters than other popular blockers out there. It has no monetization strategy and
is completely open source. We recommend FireFox but uBlock Origin also works in other browsers such as Safari, Opera, and Chromium. Unlike AdBlock Plus, uBlock does not allow so-called “acceptable ads”.

https://addons.mozilla.org/firefox/addon/ublock-origin/

Hinder Browser Fingerprinting with “Random Agent Spoofer”

Random Agent Spoofer

A privacy enhancing firefox addon which aims to hinder browser fingerprinting. It does this by changing the browser/device profile on a timer. Source code: GitHub.

https://addons.mozilla.org/firefox/addon/random-agent-spoofer/

Automatically Delete Cookies with “Self-Destructing Cookies”

Self-Destructing Cookies

Automatically removes cookies when they are no longer used by open browser tabs. With the cookies, lingering sessions, as well as information used to spy on you, will be expunged.

https://addons.mozilla.org/firefox/addon/self-destructing-cookies/

Encryption with “HTTPS Everywhere”

HTTPS Everywhere

A Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. A collaboration between The Tor Project and the Electronic Frontier Foundation.

https://www.eff.org/https-everywhere

Block Content Delivery Networks with “Decentraleyes”

HTTPS Everywhere

Emulates Content Delivery Networks locally by intercepting requests, finding the required resource and injecting it into the environment. This all happens instantaneously, automatically, and no prior configuration is required. Source code: GitHub.

https://addons.mozilla.org/firefox/addon/decentraleyes/

The following add-ons require quite a lot of interaction from user to get things working. Some sites will not work properly until you have configured the add-ons.

Stop cross-site requests with uMatrix

uMatrix

Many websites integrate features which let other websites track you, such as Facebook Like Buttons or Google Analytics. uMatrix gives you control over the requests that websites make to other websites. This gives you greater and more fine grained control
over the information that you leak online.

https://addons.mozilla.org/firefox/addon/umatrix/

Be in total control with “NoScript Security Suite”

NoScript

Highly customizable plugin to selectively allow Javascript, Java, and Flash to run only on websites you trust. Not for casual users, it requires technical knowledge to configure.

https://addons.mozilla.org/firefox/addon/noscript/

Content control with “Policeman”

Policeman

This addon has purpose similar to RequestPolicy and NoScript. It’s different from the former in that it supports rules based on content type. For example, you can allow images and styles, but not scripts and frames for some sites. It can also be set
up to act as a blacklist.

https://addons.mozilla.org/firefox/addon/policeman/

This is a collection of privacy related about:config tweaks. We’ll show you how to enhance the privacy of your Firefox browser.

Preparation:

  1. Enter “about:config” in the firefox address bar and press enter.
  2. Press the button “I’ll be careful, I promise!”
  3. Follow the instructions below…

Getting started:

  1. privacy.trackingprotection.enabled = true
  • This is Mozilla’s new built in tracking protection.
  • geo.enabled = false
  • browser.safebrowsing.enabled = false
    • Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.
  • browser.safebrowsing.malware.enabled = false
    • Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.
  • dom.event.clipboardevents.enabled = false
    • Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
  • network.cookie.cookieBehavior = 1
    • Disable cookies
    • 0 = Accept all cookies by default
    • 1 = Only accept from the originating site (block third party cookies)
    • 2 = Block all cookies by default
  • network.cookie.lifetimePolicy = 2
    • cookies are deleted at the end of the session
    • 0 = Accept cookies normally
    • 1 = Prompt for each cookie
    • 2 = Accept for current session only
    • 3 = Accept for N days
  • browser.cache.offline.enable = false
  • browser.send_pings = false
    • The attribute would be useful for letting websites track visitors’ clicks.
  • webgl.disabled = true
    • WebGL is a potential security risk. Source
  • dom.battery.enabled = false
    • Website owners can track the battery status of your device. Source
  • browser.sessionstore.max_tabs_undo = 0
    • Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.

    Related Information

    • ffprofile.com – Helps you to create a Firefox profile with the defaults you like.
    • mozillazine.org – Security and privacy-related preferences.
    • user.js Firefox hardening stuff – This is a user.js configuration file for Mozilla Firefox that’s supposed to harden Firefox’s settings and make it more secure.
    • Privacy Settings – A Firefox addon to alter built-in privacy settings easily with a toolbar panel.

    Interesting Email Providers Under Development

    • Confidant Mail – An open-source non-SMTP cryptographic email system optimized for large file attachments. It is a secure and spam-resistant alternative to regular email and online file drop services. It
      uses GNU Privacy Guard (GPG) for content encryption and authentication, and TLS 1.2 with ephemeral keys for transport encryption.

    Become Your Own Email Provider with Mail-in-a-Box

    Mail-in-a-Box

    Take it a step further and get control of your email with this easy-to-deploy mail server in a box. Mail-in-a-Box lets you become your own mail service provider in a few easy steps. It’s sort of like making your own gmail, but one you control from top
    to bottom. Technically, Mail-in-a-Box turns a fresh cloud computer into a working mail server. But you don’t need to be a technology expert to set it up. More: https://mailinabox.email/

    Privacy Email Tools

    • gpg4usb – A very easy to use and small portable editor to encrypt and decrypt any text-message or -file. For Windows and Linux.
    • Mailvelope – A browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard.
    • Enigmail – A security extension to Thunderbird and Seamonkey. It enables you to write and receive email messages signed and/or encrypted with the OpenPGP standard.
    • TorBirdy – This extension configures Thunderbird to make connections over the Tor anonymity network.
    • Email Privacy Tester – This tool will send an Email to your address and perform privacy related tests.

    Related Information

    Claws Mail

    Claws MailClaws Mail is a free and open source, GTK+-based email and news client. It offers easy configuration and an abundance of features. It is included with Gpg4win,
    an encryption suite for Windows.



    OS: Windows, Mac, Linux, BSD, Solaris, Unix.

    Worth Mentioning

    • K-9 Mail – An independent mail application for Android. It supports both POP3 and IMAP mailboxes, but only supports push mail for IMAP.
    • GNU Privacy Guard – Email Encryption. GnuPG is a GPL Licensed alternative to the PGP suite of cryptographic software. Use GPGTools for Mac OS X.
    • Mailpile (Beta) – A modern, fast web-mail client with user-friendly encryption and privacy features.

    I2P-Bote

    I2P-BoteI2P-Bote is a fully decentralized and distributed email system. It supports different identities and does not expose email headers. Currently (2015), it is still
    in beta version and can be accessed via its web application interface or IMAP and SMTP. All bote-mails are transparently end-to-end encrypted and, optionally, signed by the sender’s private key.



    OS: Windows, Mac, Linux, Android, F-Droid.

    Pond – Experimental

    PondPond is forward secure, asynchronous messaging for the discerning. Pond messages are asynchronous, but are not a record; they expire automatically a week after they
    are received. Pond seeks to prevent leaking traffic information against everyone except a global passive attacker. Build instructions are OS: Ubuntu, Debian Wheezy, Tails, Fedora, Arch and Mac OS X.



    OS: Mac, Linux.

    Worth Mentioning

    • RetroShare – Open Source cross-platform, Friend-2-Friend and secure decentralized communication platform.

    If you are currently using a search engines like Google, Bing or Yahoo you should pick an alternative here.

    Disconnect Search

    Disconnect SearchSearch privately using your favorite search engine: Google, Yahoo, Bing and DuckDuckGo are available for selection. It masks your IP address,
    cookies, and other personal info.



    Worth Mentioning

    • MetaGer – A metasearch engine, which is based in Germany. It focuses on protecting the user’s privacy. Supported by 24 own crawlers of small scale web search engines.
    • ixquick.com – Returns the top ten results from multiple search engines. It uses a “Star System” to rank its results by awarding one star for every result that has been returned from a search engine. Based in the
      USA and the Netherlands.
    • Google search link fix – Firefox extension that prevents Google, Yahoo and Yandex search pages from modifying search result links when you click them. This is useful when
      copying links but it also helps privacy by preventing the search engines from recording your clicks. (Open Source)

    If you are currently using an Instant Messenger like WhatsApp, Viber, LINE or Threema you should pick an alternative here.

    Desktop: Ricochet

    Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with
    your contacts without revealing your location or IP address. Instead of a username, you get a unique address that looks like ricochet:rs7ce36jsj24ogfw. Other Ricochet users can use this address to send a contact request – asking to be
    added to your contacts list.



    OS: Windows, Mac, Linux.

    Off-the-Record: ChatSecure

    ChatSecure is a free and open source messaging app that features OTR encryption over XMPP. You can connect to your existing accounts on Facebook or Google, create new accounts
    on public XMPP servers (including via Tor), or even connect to your own server for extra security. ChatSecure only uses well-known open source cryptographic libraries to keep your conversations private.



    OS: iOS, Android, other OTR Clients.

    Worth Mentioning

    • Cryptocat – Encrypted open source messenger. Supports file sharing and multiple devices. Available for Windows, Linux and Mac.
    • Kontalk – A community-driven instant messaging network. Supports end-to-end encryption. Both client-to-server and server-to-server channels are fully encrypted.
    • Conversations – An open source Jabber/XMPP client for Android 4.0+ smart phones. Supports end-to-end encryption with either OTR or openPGP.

    Related Information

    If you are currently using an Video & Voice Messenger like Skype, Viber or Google Hangouts you should pick an alternative here.

    Linphone

    LinphoneLinphone is an open source SIP Phone and a free voice over IP service, available on mobile and desktop environments and on web browsers. It supports ZRTP for
    end-to-end encrypted voice and video communication.



    OS: iOS, Android, Windows Phone, Linux, Windows, Mac, Browser (Web)

    Jitsi

    JitsiJitsi is a free and open source multiplatform voice (VoIP), videoconferencing and instant messaging application. It supports several popular instant-messaging and
    telephony protocols, including open recognised encryption protocols for chat (OTR).



    OS: Windows, Mac, Linux.

    Worth Mentioning

    • Tox – A free and open-source, peer-to-peer, encrypted instant messaging and video calling software.
    • Ring (formerly SFLphone) – Gives you a full control over your communications and an unmatched level of privacy.

    If you are currently using a Cloud Storage Services like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud you should pick an alternative here.

    ownCloud – Choose your hoster

    ownCloudSimilar functionally to the widely used Dropbox, with the difference being that ownCloud is free and open-source, and thereby allowing anyone to install and
    operate it without charge on a private server, with no limits on storage space or the number of connected clients.



    Client OS: Windows, Mac, Linux, BSD, Unix, iOS, Android, Fire OS. Server: Linux.

    Least Authority S4 – For Experts

    S4S4 (Simple Secure Storage Service) is Least Authority’s verifiably secure off-site backup system for individuals and businesses. 100% client-side encryption and open
    source transparency. $25/month for unlimited storage. Servers are hosted with Amazon S3 in the US.



    OS: Linux, Windows, Mac, OpenSolaris, BSD. (Installation for advanced users)

    Related Information

    • Cryptomator – Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
    • reddit.com – Should SpiderOak be avoided? Read the discussion in our subreddit.

    If you are currently using a Cloud Storage Services like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud you should think about hosting it on your own.

    Pydio

    PydioPydio is open source software that turns instantly any server (on premise, NAS, cloud IaaS or PaaS) into a file sharing platform for your company. It is an alternative
    to SaaS Boxes and Drives, with more control, safety and privacy, and favorable TCOs.



    OS: Windows, Mac, Linux, iOS, Android.

    Tahoe-LAFS

    Tahoe-LAFSTahoe-LAFS is a Free and Open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are
    taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security.



    OS: Windows, Mac, Linux.

    Worth Mentioning

    • ownCloud – Free and open-source, allows anyone to install and operate it for free on a private server, with no limits on storage space or the number of connected clients.

    Syncany

    SyncanySyncany allows users to backup and share certain folders of their workstations using any kind of storage. Syncany is open-source and provides data encryption and
    incredible flexibility in terms of storage type and provider. Files are encrypted before uploading.



    OS: Windows, Mac, Linux.

    Syncthing

    SyncthingSyncthing replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to
    choose where it is stored, if it is shared with some third party and how it’s transmitted over the Internet.



    OS: Windows, Mac, Linux, Android, BSD, Solaris.

    Worth Mentioning

    • git-annex – Allows managing files with git, without checking the file contents into git. While that may seem paradoxical, it is useful when dealing with files larger than git can currently easily handle,
      whether due to limitations in memory, time, or disk space.

    If you are currently using a password manager software like 1Password, LastPass, Roboform or iCloud Keychain you should pick an alternative here.

    KeePass / KeePassX – Local

    KeePassKeePass is a free open source password manager, which helps you to manage your passwords in a secure way. All passwords in one database, which is locked with one
    master key or a key file. The databases are encrypted using the best and most secure encryption algorithms currently known: AES and Twofish. See also: KeePassX.



    OS: Windows, Mac, Linux, iOS, Android, BSD.

    Encryptr – Cloud Based

    EncryptrEncryptr is simple and easy to use. It stores your sensitive data like passwords, credit card data, PINs, or access codes, in the cloud. However, because it
    was built on the zero knowledge Crypton framework, Encryptr ensures that only the user has the ability to access or read the confidential information.



    OS: Windows, Mac, Linux, Android.

    Worth Mentioning

    • Secure Password Generator – generates a unique set of custom, high quality, cryptographic-strength password strings which are safe for you to use.
    • SuperGenPass – A master password and the domain name of the Web site you are visiting is used as the “seed” for a one-way hash algorithm (base-64 MD5). The output of this algorithm is your generated password.
      You remember one password (your “master password”), and SGP uses it to generate unique, complex passwords for the Web sites you visit. Your generated passwords are never stored or transmitted, so you can use SGP on as many computers as you like without
      having to “sync” anything.
    • Password Safe – Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember
      a single “Master Password” of your choice in order to unlock and access your entire user name/password list.

    Related Information

    If you are currently not using encryption software for your hard disk, emails or file archives you should pick an encryption software here.

    GNU Privacy Guard – Email Encryption

    GnuPGGnuPG is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification
    of OpenPGP. Current versions of PGP (and Veridis’ Filecrypt) are interoperable with GnuPG and other OpenPGP-compliant systems. GnuPG is a part of the Free Software Foundation’s GNU software project, and has received major funding from the German
    government. GPGTools for Mac OS X.



    OS: Windows, Mac, Linux, Android, BSD.

    PeaZip – File Archive Encryption

    PeaZipPeaZip is a free and open-source file manager and file archiver made by Giorgio Tani. It supports its native PEA archive format (featuring compression, multi volume
    split and flexible authenticated encryption and integrity check schemes) and other mainstream formats, with special focus on handling open formats. It supports 181 file extensions (as of version 5.5.1).

    Mac alternative: Keka is a free file archiver.



    OS: Windows, Linux, BSD.

    Worth Mentioning

    • Cryptomator – Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
    • miniLock – Browser plugin for Google Chrome / Chromium to encrypt files using a secret passphrase. Easy to use. From the developer of Cryptocat.
    • AES Crypt – Using a powerful 256-bit encryption algorithm, AES Crypt can safely secure your most sensitive files. For Windows, Mac, Linux and Android.
    • DiskCryptor – A full disk and partition encryption system for Windows including the ability to encrypt the partition and disk on which the OS is installed.

    GNUnet Framework

    GNUnetGNUnet is a free software framework for decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery,
    resource allocation, communication over many transports (such as tcp, udp, http, https, wlan and bluetooth) and various basic peer-to-peer algorithms for routing, multicast and network size estimation.



    OS: GNU/Linux, FreeBSD, NetBSD, OpenBSD, Mac, Windows.

    The Freenet Project

    FreenetFreenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and
    has a suite of free software for publishing and communicating on the Web without fear of censorship. Both Freenet and some of its associated tools were originally designed by Ian Clarke, who defined Freenet’s goal as providing freedom of speech
    on the Internet with strong anonymity protection.



    OS: Windows, Mac, Linux.

    Worth Mentioning

    • Tor Project – Provides anonymity to websites and other servers. Servers configured to receive connections only through Tor are called hidden services.
    • RetroShare – Open Source cross-platform, Friend-2-Friend and secure decentralised communication platform.

    If you are currently using Social Networks like Facebook, Twitter or Google+ you should pick an alternative here.

    Friendica

    FriendicaFriendica has an emphasis on extensive privacy settings and easy server installation. It aims to federate with as many other social networks as possible. Currently,
    Friendica users can integrate contacts from Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io and other services in their social streams.



    GNU social

    GNU socialWhile offering functionality similar to Twitter, GNU social seeks to provide the potential for open, inter-service and distributed communications between
    microblogging communities. Enterprises and individuals can install and control their own services and data. Notable public deployments are quitter.se and gnusocial.no.



    Worth Mentioning

    • Libertree – A free, libre, open-source software which is intended to provide a way for people to create their own social network. Currently in an invitational alpha phase.

    Related Information

    DNSCrypt – Tool

    DNSCryptA protocol for securing communications between a client and a DNS resolver. The DNSCrypt protocol uses high-speed high-security elliptic-curve cryptography and
    is very similar to DNSCurve, but focuses on securing communications between a client and its first-level resolver.



    OS: Windows, Mac, Linux, iOS with Jailbreak.

    OpenNIC – Service

    OpenNICOpenNIC is an alternate network information center/alternative DNS root which lists itself as an alternative to ICANN and its registries. Like all alternative
    root DNS systems, OpenNIC-hosted domains are unreachable to the vast majority of the Internet. Only specific configuration in one’s DNS resolver makes these reachable, and very few Internet service providers have this configuration.



    OS: Cross-platform.

    Worth Mentioning

    • NoTrack – A network-wide DNS server which blocks Tracking sites. Currently works in Debian and Ubuntu.
    • Namecoin – A decentralized DNS open source information registration and transfer system based on the Bitcoin cryptocurrency.

    EtherCalc

    EtherCalcEtherCalc is a web spreadsheet. Data is saved on the web, and people can edit the same document at the same time. Changes are instantly reflected on all screens.
    Work together on inventories, survey forms, list management, brainstorming sessions..



    OS: Windows, Mac, GNU/Linux, FreeBSD, Browser.

    ProtectedText

    ProtectedTextProtectedText is an open source web application. It encrypts and decrypts text in the browser, and password (or it’s hash) is never sent to the server
    – so that text can’t be decrypted even if requested by authorities. No cookies, no sessions, no registration, no users tracking.



    OS: All Browsers.

    Worth Mentioning

    • dudle – An online scheduling application, which is free and OpenSource. Schedule meetings or make small online polls. No email collection or the need of registration.
    • Turtl – Remember ideas, track research, share documents, or bookmark your favorite sites. Turtl makes it easy to organize your life and uses solid encryption to keep it all safe.

    If you are currently using a operating system like Microsoft Windows or Apple Mac OS X you should pick an alternative here.

    Trisquel

    TrisquelTrisquel is a Linux-based operating system derived from Ubuntu. The project aims for a fully free software system without proprietary software or firmware and
    uses Linux-libre, a version of the Linux kernel with the non-free code (binary blobs) removed.



    Qubes OS

    Qubes OSQubes is an open-source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, the X Window System, and Linux, and
    can run most Linux applications and utilize most of the Linux drivers.



    Warning

    Worth Mentioning

    • OpenBSD – A project that produces a free, multi-platform 4.4BSD-based UNIX-like operating system. Emphasizes portability, standardization, correctness, proactive security and integrated cryptography.
    • Arch Linux – A simple, lightweight Linux distribution. It is composed predominantly of free and open-source software, and supports community involvement. Parabola is a
      completely open source version of Arch Linux.
    • Whonix – A Debian GNU/Linux based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a “Workstation”
      and a Tor “Gateway”. All communication are forced through the Tor network to accomplish this..

    KNOPPIX

    KNOPPIXKnoppix is an operating system based on Debian designed to be run directly from a CD / DVD (Live CD) or a USB flash drive (Live USB), one of the first of its kind
    for any operating system. When starting a program, it is loaded from the removable medium and decompressed into a RAM drive. The decompression is transparent and on-the-fly.



    Puppy Linux

    Puppy LinuxPuppy Linux operating system is a lightweight Linux distribution that focuses on ease of use and minimal memory footprint. The entire system can be run
    from RAM with current versions generally taking up about 210 MB, allowing the boot medium to be removed after the operating system has started.



    Worth Mentioning

    • Tiny Core Linux – A minimal Linux operating system focusing on providing a base system using BusyBox and FLTK. The distribution is notable for its size (15 MB) and minimalism, with additional functionality
      provided by extensions.

    Firefox OS

    Firefox OSFirefox OS is a Linux kernel-based open-source operating system for smartphones and tablet computers and is set to be used on smart TVs. It is being developed
    by Mozilla.



    Ubuntu Touch

    Ubuntu TouchUbuntu Touch is a mobile version of the Ubuntu operating system developed by Canonical UK Ltd and Ubuntu Community. It is designed primarily for touchscreen
    mobile devices such as smartphones and tablet computers.



    Worth Mentioning

    • Replicant – A free and open-source operating system based on the Android, which aims to replace all proprietary Android components with their free software counterparts.
    • Copperhead – Another free and open-source mobile OS based on Linux. Currently only supports a few devices, all in the Nexus line.
    • OmniROM – OmniROM was created in response to the perceived commercialization of CyanogenMod. The directors of Cyanogen Inc. refuse to make signature spoofing a default feature of Cyanogen OS, making it harder to stay
      anonymous, and in particular to hide your identity from Google. OmniROM has signature spoofing enabled as a default feature. It supports more devices than Copperhead, but fewer than CyanogenMod.

    pfSense

    pfSensepfSense is an open source firewall/router computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for
    a network and is noted for its reliability and offering features often only found in expensive commercial firewalls. pfSense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and as a VPN endpoint.



    LibreWRT

    LibreWRTLibreWRT is a GNU/Linux-libre distribution for computers with minimal resources, such as the Ben Nanonote, ath9k based wifi routers, and other hardware that
    respects your freedom with emphasis on free software. It is used by the Free Software Foundation on their access point and router which provides network connectivity to portable computers in their office.



    Worth Mentioning

    • OpenBSD – A project that produces a free, multi-platform 4.4BSD-based UNIX-like operating system. Emphasizes portability, standardization, correctness, proactive security and integrated cryptography.
    • DD-WRT – A is Linux-based firmware for wireless routers and wireless access points. It is compatible with several models of routers and access points.

    Microsoft introduced a lot of new features in Windows 10 such as Cortana. However, most of them are violating your privacy.

    Windows 10 Privacy

    1. Data syncing is by default enabled.
    • Browsing history and open websites.
    • WiFi hotspot names and passwords.

  • Your device is by default tagged with a unique advertising ID.
    • Used to serve you with personalized advertisements by third-party advertisers and ad networks.

  • Cortana can collect any of your data.
    • Your keystrokes, searches and mic input.

  • Microsoft can collect any personal data.
    • Contacts and relationships.
    • Content like emails, instant messages, caller list, audio and video recordings.

  • Your data can be shared.
    • When downloading Windows 10, you are authorizing Microsoft to share any of above mentioned data with any third-party, with or without your consent.

    Source: propakistani.pk



    This tool uses some known methods that attempt to disable major tracking features in Windows 10.

    Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.

    Edward Snowden on reddit

    The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife’s phone, all
    I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. I don’t want to live in a society that does these sort of things… I do not want to live in a world where everything I do and say is recorded. That is
    not something I am willing to support or live under.

    Edward Snowden in The Guardian

    We all need places where we can go to explore without the judgmental eyes of other people being cast upon us, only in a realm where we’re not being watched can we really test the limits of who we want to be. It’s really in the private realm where
    dissent, creativity and personal exploration lie.

    Glenn Greenwald in Huffington Post

    Guides

    Information

    Tools

    • ipleak.net – IP/DNS Detect – What is your IP, what is your DNS, what informations you send to websites.
    • The ultimate Online Privacy Test Resource List – A collection of Internet sites that check whether your web browser leaks information.
    • PRISM Break – We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
    • Security in-a-Box – A guide to digital security for activists and human rights defenders throughout the world.
    • AlternativeTo.net – Great collection of open source online and self-hosted software sorted by likes.
    • SecureDrop – An open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. It was originally created
      by the late Aaron Swartz and is currently managed by Freedom of the Press Foundation.
    • Reset The Net – Privacy Pack – Help fight to end mass surveillance. Get these tools to protect yourself and your friends.







    Copy URL and Description

    For easy copy and paste. Share this text snippet.

    reddit logo

    It’s important for a website like privacytools.io to be up-to-date. Keep an eye on software updates of the applications listed here. Follow recent news about providers that are recommended. We try our best to keep up but we’re not perfect and the internet
    is changing fast. If you find an error, or you think a provider should not be listed here, or a qualified service provider is missing or a browser plugin is not the best choice anymore and anything else… Talk to us please. This
    is a community project and we’re aiming to deliver the best information available for a better privacy.

    Here is what you can do:

    Make suggestions on reddit: https://www.reddit.com/r/privacytoolsIO/ Warning: Warrant Canary has been removed by Reddit

    Follow on Twitter: https://twitter.com/privacytoolsIO

    View and edit our website source code on GitHub: https://github.com/privacytoolsIO/privacytools.io

    Thank you for participating. This project needs you.

    Creative Commons
    kopimi (copyme)
    Donate: 1N6heMWD34ARyApkRmNv7V7NzQfYvgC4dg or use PayPal.

    privacytools.io is a socially motivated website that provides information for protecting your data security and privacy. never trust any company with your privacy, always encrypt.