From 5b09c59a7c56d7ced3e4c0e1fbc43afaab3fb69e Mon Sep 17 00:00:00 2001 From: rollsicecream Date: Tue, 5 Mar 2024 02:56:10 +0000 Subject: [PATCH 01/10] Fix Miniflux recommendation card (#2423) Signed-off-by: Daniel Gray --- docs/news-aggregators.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/docs/news-aggregators.md b/docs/news-aggregators.md index d5ebcc2ad5..e6bfb40562 100644 --- a/docs/news-aggregators.md +++ b/docs/news-aggregators.md @@ -106,9 +106,6 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML) and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). -
-Downloads - [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } [:octicons-info-16:](https://miniflux.app/docs/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } From f60fcf4b2f0bec49a281dc4a29778f6acc6d042f Mon Sep 17 00:00:00 2001 From: rollsicecream Date: Tue, 5 Mar 2024 05:43:45 +0000 Subject: [PATCH 02/10] Convert 6 pages to HTML admonitions (#2419) - "DNS providers" page - "Data redaction" page - "2FA" page - tools.md file - "Tor" page - "VPN providers page" Signed-off-by: Daniel Gray --- docs/data-redaction.md | 154 +++++++++++++++++----------- docs/dns.md | 118 ++++++++++++--------- docs/multi-factor-authentication.md | 124 ++++++++++++++-------- docs/tools.md | 24 +++-- docs/tor.md | 136 ++++++++++++++---------- docs/vpn.md | 119 ++++++++++++--------- 6 files changed, 412 insertions(+), 263 deletions(-) diff --git a/docs/data-redaction.md b/docs/data-redaction.md index 2173ebdbdc..bbb9a07ef7 100644 --- a/docs/data-redaction.md +++ b/docs/data-redaction.md @@ -11,46 +11,56 @@ When sharing files, be sure to remove associated metadata. Image files commonly ### MAT2 -!!! recommendation +
- ![MAT2 logo](assets/img/data-redaction/mat2.svg){ align=right } +![MAT2 logo](assets/img/data-redaction/mat2.svg){ align=right } - **MAT2** is free software, which allows the metadata to be removed from image, audio, torrent, and document file types. It provides both a command line tool and a graphical user interface via an extension for [Dolphin](https://0xacab.org/jvoisin/mat2/-/tree/master/dolphin), the default file manager of [KDE](https://kde.org). +**MAT2** is free software, which allows the metadata to be removed from image, audio, torrent, and document file types. It provides both a command line tool and a graphical user interface via an extension for [Dolphin](https://0xacab.org/jvoisin/mat2/-/tree/master/dolphin), the default file manager of [KDE](https://kde.org). - On Linux, a third-party graphical tool [Metadata Cleaner](https://gitlab.com/rmnvgr/metadata-cleaner) powered by MAT2 exists and is [available on Flathub](https://flathub.org/apps/details/fr.romainvigier.MetadataCleaner). +On Linux, a third-party graphical tool [Metadata Cleaner](https://gitlab.com/rmnvgr/metadata-cleaner) powered by MAT2 exists and is [available on Flathub](https://flathub.org/apps/details/fr.romainvigier.MetadataCleaner). - [:octicons-repo-16: Repository](https://0xacab.org/jvoisin/mat2){ .md-button .md-button--primary } - [:octicons-info-16:](https://0xacab.org/jvoisin/mat2/-/blob/master/README.md){ .card-link title=Documentation} - [:octicons-code-16:](https://0xacab.org/jvoisin/mat2){ .card-link title="Source Code" } +[:octicons-repo-16: Repository](https://0xacab.org/jvoisin/mat2){ .md-button .md-button--primary } +[:octicons-info-16:](https://0xacab.org/jvoisin/mat2/-/blob/master/README.md){ .card-link title=Documentation} +[:octicons-code-16:](https://0xacab.org/jvoisin/mat2){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-windows11: Windows](https://pypi.org/project/mat2) - - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - - [:simple-linux: Linux](https://pypi.org/project/mat2) - - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) +- [:simple-windows11: Windows](https://pypi.org/project/mat2) +- [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) +- [:simple-linux: Linux](https://pypi.org/project/mat2) +- [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) + +
+ +
## Mobile ### ExifEraser (Android) -!!! recommendation +
+ +![ExifEraser logo](assets/img/data-redaction/exiferaser.svg){ align=right } + +**ExifEraser** is a modern, permissionless image metadata erasing application for Android. - ![ExifEraser logo](assets/img/data-redaction/exiferaser.svg){ align=right } +It currently supports JPEG, PNG and WebP files. - **ExifEraser** is a modern, permissionless image metadata erasing application for Android. +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" } - It currently supports JPEG, PNG and WebP files. +
+Downloads - [:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } - [:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" } +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.none.tom.exiferaser) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/com.none.tom.exiferaser) +- [:simple-github: GitHub](https://github.com/Tommy-Geenexus/exif-eraser/releases) - ??? downloads +
- - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.none.tom.exiferaser) - - [:octicons-moon-16: Accrescent](https://accrescent.app/app/com.none.tom.exiferaser) - - [:simple-github: GitHub](https://github.com/Tommy-Geenexus/exif-eraser/releases) +
The metadata that is erased depends on the image's file type: @@ -70,77 +80,101 @@ The app offers multiple ways to erase metadata from images. Namely: ### Metapho (iOS) -!!! recommendation +
- ![Metapho logo](assets/img/data-redaction/metapho.jpg){ align=right } +![Metapho logo](assets/img/data-redaction/metapho.jpg){ align=right } - **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. +**Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. - [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } - [:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } +[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } - ??? downloads +
+Downloads - - [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) + +
+ +
### PrivacyBlur -!!! recommendation +
+ +![PrivacyBlur logo](assets/img/data-redaction/privacyblur.svg){ align=right } - ![PrivacyBlur logo](assets/img/data-redaction/privacyblur.svg){ align=right } +**PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. - **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. +[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } - [:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } +
+Downloads - ??? downloads +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) - - [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +
-!!! warning +
- You should **never** use blur to redact [text in images](https://bishopfox.com/blog/unredacter-tool-never-pixelation). If you want to redact text in an image, draw a box over the text. For this, we suggest apps like [Pocket Paint](https://github.com/Catrobat/Paintroid). +
+

Warning

+ +You should **never** use blur to redact [text in images](https://bishopfox.com/blog/unredacter-tool-never-pixelation). If you want to redact text in an image, draw a box over the text. For this, we suggest apps like [Pocket Paint](https://github.com/Catrobat/Paintroid). + +
## Command-line ### ExifTool -!!! recommendation +
+ +![ExifTool logo](assets/img/data-redaction/exiftool.png){ align=right } - ![ExifTool logo](assets/img/data-redaction/exiftool.png){ align=right } +**ExifTool** is the original perl library and command-line application for reading, writing, and editing meta information (Exif, IPTC, XMP, and more) in a wide variety of file formats (JPEG, TIFF, PNG, PDF, RAW, and more). - **ExifTool** is the original perl library and command-line application for reading, writing, and editing meta information (Exif, IPTC, XMP, and more) in a wide variety of file formats (JPEG, TIFF, PNG, PDF, RAW, and more). +It's often a component of other Exif removal applications and is in most Linux distribution repositories. - It's often a component of other Exif removal applications and is in most Linux distribution repositories. +[:octicons-home-16: Homepage](https://exiftool.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://exiftool.org/faq.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/exiftool/exiftool){ .card-link title="Source Code" } +[:octicons-heart-16:](https://exiftool.org/#donate){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://exiftool.org){ .md-button .md-button--primary } - [:octicons-info-16:](https://exiftool.org/faq.html){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/exiftool/exiftool){ .card-link title="Source Code" } - [:octicons-heart-16:](https://exiftool.org/#donate){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-windows11: Windows](https://exiftool.org) +- [:simple-apple: macOS](https://exiftool.org) +- [:simple-linux: Linux](https://exiftool.org) - - [:simple-windows11: Windows](https://exiftool.org) - - [:simple-apple: macOS](https://exiftool.org) - - [:simple-linux: Linux](https://exiftool.org) +
-!!! example "Deleting data from a directory of files" +
- ```bash - exiftool -all= *.file_extension - ``` +
+

Deleting data from a directory of files

+ +```bash +exiftool -all= *.file_extension +``` + +
## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

+ +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. - We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +
- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/docs/dns.md b/docs/dns.md index c00db91051..a1dde13eae 100644 --- a/docs/dns.md +++ b/docs/dns.md @@ -13,10 +13,10 @@ Encrypted DNS with third-party servers should only be used to get around basic [ | DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | | ------------ | -------------- | --------- | ------- | --- | --------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | | [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration.| | [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ| Optional[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | | [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | | [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | @@ -31,9 +31,12 @@ Encrypted DNS with third-party servers should only be used to get around basic [ **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

- We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. + +
- Must support [DNSSEC](advanced/dns-overview.md#what-is-dnssec). - [QNAME Minimization](advanced/dns-overview.md#what-is-qname-minimization). @@ -56,9 +59,12 @@ After installation of either a configuration profile or an app that uses the DNS Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). -!!! info +
+

Info

+ +`systemd-resolved`, which many Linux distributions use to do their DNS lookups, doesn't yet [support DoH](https://github.com/systemd/systemd/issues/8639). If you want to use DoH, you'll need to install a proxy like [dnscrypt-proxy](https://github.com/DNSCrypt/dnscrypt-proxy) and [configure it](https://wiki.archlinux.org/title/Dnscrypt-proxy) to take all the DNS queries from your system resolver and forward them over HTTPS. - `systemd-resolved`, which many Linux distributions use to do their DNS lookups, doesn't yet [support DoH](https://github.com/systemd/systemd/issues/8639). If you want to use DoH, you'll need to install a proxy like [dnscrypt-proxy](https://github.com/DNSCrypt/dnscrypt-proxy) and [configure it](https://wiki.archlinux.org/title/Dnscrypt-proxy) to take all the DNS queries from your system resolver and forward them over HTTPS. +
## Encrypted DNS Proxies @@ -66,43 +72,55 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad ### RethinkDNS -!!! recommendation +
+ +![RethinkDNS logo](assets/img/android/rethinkdns.svg#only-light){ align=right } +![RethinkDNS logo](assets/img/android/rethinkdns-dark.svg#only-dark){ align=right } - ![RethinkDNS logo](assets/img/android/rethinkdns.svg#only-light){ align=right } - ![RethinkDNS logo](assets/img/android/rethinkdns-dark.svg#only-dark){ align=right } +**RethinkDNS** is an open-source Android client supporting [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), [DNS-over-TLS](advanced/dns-overview.md#dns-over-tls-dot), [DNSCrypt](advanced/dns-overview.md#dnscrypt) and DNS Proxy along with caching DNS responses, locally logging DNS queries and can be used as a firewall too. - **RethinkDNS** is an open-source Android client supporting [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), [DNS-over-TLS](advanced/dns-overview.md#dns-over-tls-dot), [DNSCrypt](advanced/dns-overview.md#dnscrypt) and DNS Proxy along with caching DNS responses, locally logging DNS queries and can be used as a firewall too. +[:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" } - [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" } +
+Downloads - ??? downloads +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.celzero.bravedns) +- [:simple-github: GitHub](https://github.com/celzero/rethink-app/releases) - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.celzero.bravedns) - - [:simple-github: GitHub](https://github.com/celzero/rethink-app/releases) +
+ +
### dnscrypt-proxy -!!! recommendation +
+ +![dnscrypt-proxy logo](assets/img/dns/dnscrypt-proxy.svg){ align=right } - ![dnscrypt-proxy logo](assets/img/dns/dnscrypt-proxy.svg){ align=right } +**dnscrypt-proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). - **dnscrypt-proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). +
+

The anonymized DNS feature does not anonymize other network traffic.

+
- !!! warning "The anonymized DNS feature does [**not**](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonymize other network traffic." +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } - [:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } - [:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } - [:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-windows11: Windows](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-Windows) +- [:simple-apple: macOS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-macOS) +- [:simple-linux: Linux](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-linux) - - [:simple-windows11: Windows](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-Windows) - - [:simple-apple: macOS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-macOS) - - [:simple-linux: Linux](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-linux) +
+ +
## Self-hosted Solutions @@ -110,31 +128,39 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ### AdGuard Home -!!! recommendation +
+ +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } + +**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. - ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } +AdGuard Home features a polished web interface to view insights and manage blocked content. - **AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +[:octicons-home-16: Homepage](https://adguard.com/adguard-home/overview.html){ .md-button .md-button--primary } +[:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/AdguardTeam/AdGuardHome/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/AdguardTeam/AdGuardHome){ .card-link title="Source Code" } - AdGuard Home features a polished web interface to view insights and manage blocked content. +
- [:octicons-home-16: Homepage](https://adguard.com/adguard-home/overview.html){ .md-button .md-button--primary } - [:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://github.com/AdguardTeam/AdGuardHome/wiki){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/AdguardTeam/AdGuardHome){ .card-link title="Source Code" } + ### Pi-hole -!!! recommendation +
+ +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } + +**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. - ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } +Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. - **Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } - Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. + - [:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } - [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } +
diff --git a/docs/multi-factor-authentication.md b/docs/multi-factor-authentication.md index 6f2c5475ba..4cb99e54c2 100644 --- a/docs/multi-factor-authentication.md +++ b/docs/multi-factor-authentication.md @@ -8,17 +8,21 @@ cover: multi-factor-authentication.webp ### YubiKey -!!! recommendation +
- ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) +![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) - The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. - One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. - [:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} + + + +
The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. @@ -26,20 +30,28 @@ YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/su For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. -!!! warning - The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. +
+

Warning

+ +The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + +
### Nitrokey -!!! recommendation +
- ![Nitrokey](assets/img/multi-factor-authentication/nitrokey.jpg){ align=right } +![Nitrokey](assets/img/multi-factor-authentication/nitrokey.jpg){ align=right } - **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. +**Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. - [:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} + + + +
The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. @@ -47,13 +59,19 @@ Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey. For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. -!!! warning +
+

Warning

+ +While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead. - While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead. +
-!!! warning +
+

Warning

- Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset). +Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset). + +
The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. @@ -63,9 +81,12 @@ Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern N **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

+ +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. - We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +
#### Minimum Requirements @@ -91,49 +112,62 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative ### ente Auth -!!! recommendation +
+ +![ente Auth logo](assets/img/multi-factor-authentication/ente-auth.png){ align=right } + +**ente Auth** is a free and open-source app which stores and generates TOTP tokens on your mobile device. It can be used with an online account to backup and sync your tokens across your devices (and access them via a web interface) in a secure, end-to-end encrypted fashion. It can also be used offline on a single device with no account necessary. - ![ente Auth logo](assets/img/multi-factor-authentication/ente-auth.png){ align=right } +[:octicons-home-16: Homepage](https://ente.io/auth){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-code-16:](https://github.com/ente-io/auth){ .card-link title="Source Code" } - **ente Auth** is a free and open-source app which stores and generates TOTP tokens on your mobile device. It can be used with an online account to backup and sync your tokens across your devices (and access them via a web interface) in a secure, end-to-end encrypted fashion. It can also be used offline on a single device with no account necessary. +
+Downloads - [:octicons-home-16: Homepage](https://ente.io/auth){ .md-button .md-button--primary } - [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } - [:octicons-code-16:](https://github.com/ente-io/auth){ .card-link title="Source Code" } +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-github: GitHub](https://github.com/ente-io/auth/releases) +- [:octicons-globe-16: Web](https://auth.ente.io) - ??? downloads +
- - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) - - [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) - - [:simple-github: GitHub](https://github.com/ente-io/auth/releases) - - [:octicons-globe-16: Web](https://auth.ente.io) +
### Aegis Authenticator (Android) -!!! recommendation +
- ![Aegis logo](assets/img/multi-factor-authentication/aegis.png){ align=right } +![Aegis logo](assets/img/multi-factor-authentication/aegis.png){ align=right } - **Aegis Authenticator** is a free and open-source app for Android to manage your 2-step verification tokens for your online services. Aegis Authenticator operates completely offline/locally, but includes the option to export your tokens for backup unlike many alternatives. +**Aegis Authenticator** is a free and open-source app for Android to manage your 2-step verification tokens for your online services. Aegis Authenticator operates completely offline/locally, but includes the option to export your tokens for backup unlike many alternatives. - [:octicons-home-16: Homepage](https://getaegis.app){ .md-button .md-button--primary } - [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } - [:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://getaegis.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } +[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.beemdevelopment.aegis) - - [:simple-github: GitHub](https://github.com/beemdevelopment/Aegis/releases) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.beemdevelopment.aegis) +- [:simple-github: GitHub](https://github.com/beemdevelopment/Aegis/releases) + +
+ +
### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

+ +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. - We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +
- Source code must be publicly available. - Must not require internet connectivity. diff --git a/docs/tools.md b/docs/tools.md index 001f06a090..e10a0165f4 100644 --- a/docs/tools.md +++ b/docs/tools.md @@ -199,15 +199,18 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b ### VPN Providers -??? danger "VPNs do not provide anonymity" +
+VPNs do not provide anonymity - Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. +Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. - If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. +If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. - If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. +If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. - [Learn more :material-arrow-right-drop-circle:](vpn.md) +[Learn more :material-arrow-right-drop-circle:](vpn.md) + +
@@ -276,11 +279,14 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b ### Encryption Software -??? info "Operating System Disk Encryption" +
+Operating System Disk Encryption + +For encrypting your operating system drive, we typically recommend using whichever encryption tool your operating system provides, whether that is **BitLocker** on Windows, **FileVault** on macOS, or **LUKS** on Linux. These tools are included with the operating system and typically use hardware encryption elements such as a TPM that other full-disk encryption software like VeraCrypt do not. VeraCrypt is still suitable for non-operating system disks such as external drives, especially drives that may be accessed from multiple operating systems. - For encrypting your operating system drive, we typically recommend using whichever encryption tool your operating system provides, whether that is **BitLocker** on Windows, **FileVault** on macOS, or **LUKS** on Linux. These tools are included with the operating system and typically use hardware encryption elements such as a TPM that other full-disk encryption software like VeraCrypt do not. VeraCrypt is still suitable for non-operating system disks such as external drives, especially drives that may be accessed from multiple operating systems. +[Learn more :material-arrow-right-drop-circle:](encryption.md##operating-system-included-full-disk-encryption-fde) - [Learn more :material-arrow-right-drop-circle:](encryption.md##operating-system-included-full-disk-encryption-fde) +
@@ -327,7 +333,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![FreeTube logo](assets/img/frontends/freetube.svg){ .twemoji } [FreeTube (YouTube, Desktop)](frontends.md#freetube) - ![Yattee logo](assets/img/frontends/yattee.svg){ .twemoji } [Yattee (YouTube; iOS, tvOS, macOS)](frontends.md#yattee) -- ![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ .twemoji }![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ .twemoji } [LibreTube (YouTube, Android)](frontends.md#libretube-android) +- ![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ .twemoji }![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ .twemoji } [LibreTube (YouTube, Android)](frontends.md#libretube-android) - ![NewPipe logo](assets/img/frontends/newpipe.svg){ .twemoji } [NewPipe (YouTube, Android)](frontends.md#newpipe-android) - ![Invidious logo](assets/img/frontends/invidious.svg#only-light){ .twemoji }![Invidious logo](assets/img/frontends/invidious-dark.svg#only-dark){ .twemoji } [Invidious (YouTube, Web)](frontends.md#invidious) - ![Piped logo](assets/img/frontends/piped.svg){ .twemoji } [Piped (YouTube, Web)](frontends.md#piped) diff --git a/docs/tor.md b/docs/tor.md index 9143f79d9b..c8fdafcd37 100644 --- a/docs/tor.md +++ b/docs/tor.md @@ -5,7 +5,7 @@ icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: - - + - "@context": http://schema.org "@type": SoftwareApplication name: Tor Browser @@ -39,9 +39,12 @@ Tor works by routing your internet traffic through those volunteer-operated serv ## Connecting to Tor -!!! tip +
+

Tip

- Before connecting to Tor, please ensure you've read our [overview](advanced/tor-overview.md) on what Tor is and how to connect to it safely. We often recommend connecting to Tor through a trusted [VPN provider](vpn.md), but you have to do so **properly** to avoid decreasing your anonymity. +Before connecting to Tor, please ensure you've read our [overview](advanced/tor-overview.md) on what Tor is and how to connect to it safely. We often recommend connecting to Tor through a trusted [VPN provider](vpn.md), but you have to do so **properly** to avoid decreasing your anonymity. + +
There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for anonymous browsing for desktop computers and Android. @@ -51,29 +54,37 @@ If more complete anonymity is paramount to your situation, you should **only** b ### Tor Browser -!!! recommendation +
+ +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } - ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } +**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. - **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } - [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } - [:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } - [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } - [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) +- [:simple-android: Android](https://www.torproject.org/download/#android) +- [:simple-windows11: Windows](https://www.torproject.org/download/) +- [:simple-apple: macOS](https://www.torproject.org/download/) +- [:simple-linux: Linux](https://www.torproject.org/download/) - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) - - [:simple-android: Android](https://www.torproject.org/download/#android) - - [:simple-windows11: Windows](https://www.torproject.org/download/) - - [:simple-apple: macOS](https://www.torproject.org/download/) - - [:simple-linux: Linux](https://www.torproject.org/download/) +
-!!! danger +
- You should **never** install any additional extensions on Tor Browser or edit `about:config` settings, including the ones we suggest for Firefox. Browser extensions and non-standard settings make you stand out from others on the Tor network, thus making your browser easier to [fingerprint](https://support.torproject.org/glossary/browser-fingerprinting). +
+

Danger

+ +You should **never** install any additional extensions on Tor Browser or edit `about:config` settings, including the ones we suggest for Firefox. Browser extensions and non-standard settings make you stand out from others on the Tor network, thus making your browser easier to [fingerprint](https://support.torproject.org/glossary/browser-fingerprinting). + +
The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). @@ -81,69 +92,86 @@ In addition to installing Tor Browser on your computer directly, there are also ### Orbot -!!! recommendation +
+ +![Orbot logo](assets/img/self-contained-networks/orbot.svg){ align=right } - ![Orbot logo](assets/img/self-contained-networks/orbot.svg){ align=right } +**Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. - **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. +[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} +[:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} - [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } - [:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) - - [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) - - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) +
+ +
We previously recommended enabling the *Isolate Destination Address* preference in Orbot settings. While this setting can theoretically improve privacy by enforcing the use of a different circuit for each IP address you connect to, it doesn't provide a practical advantage for most applications (especially web browsing), can come with a significant performance penalty, and increases the load on the Tor network. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1] -!!! tip "Tips for Android" +
+

Tips for Android

+ +Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN killswitch in :gear: **Settings** → **Network & internet** → **VPN** → :gear: → **Block connections without VPN**. - Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN killswitch in :gear: **Settings** → **Network & internet** → **VPN** → :gear: → **Block connections without VPN**. +Orbot is often outdated on the Guardian Project's [F-Droid repository](https://guardianproject.info/fdroid) and [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android), so consider downloading directly from the [GitHub repository](https://github.com/guardianproject/orbot/releases) instead. - Orbot is often outdated on the Guardian Project's [F-Droid repository](https://guardianproject.info/fdroid) and [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android), so consider downloading directly from the [GitHub repository](https://github.com/guardianproject/orbot/releases) instead. +All versions are signed using the same signature so they should be compatible with each other. - All versions are signed using the same signature so they should be compatible with each other. +
### Onion Browser -!!! recommendation +
+ +![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } + +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). - ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } +[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } - **Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +
+Downloads - [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } - [:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +- [:simple-appstore: App Store](https://apps.apple.com/app/id519296448) - ??? downloads +
- - [:simple-appstore: App Store](https://apps.apple.com/app/id519296448) +
## Relays and Bridges ### Snowflake -!!! recommendation +
- ![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } - ![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - **Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } - People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + - [:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } - [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} - [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } - [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +
You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. diff --git a/docs/vpn.md b/docs/vpn.md index b554eae2e6..09fd4d6091 100644 --- a/docs/vpn.md +++ b/docs/vpn.md @@ -16,15 +16,18 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
-!!! danger "VPNs do not provide anonymity" +
+

VPNs do not provide anonymity

- Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. +Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. - If you are looking for **anonymity**, you should use the Tor Browser. +If you are looking for **anonymity**, you should use the Tor Browser. - If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. +If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. - [Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } + +
[Detailed VPN Overview :material-arrow-right-drop-circle:](basics/vpn-overview.md){ .md-button } @@ -34,24 +37,29 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope ### Proton VPN -!!! recommendation annotate +
- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ align=right } +![Proton VPN logo](assets/img/vpn/protonvpn.svg){ align=right } - **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. +**Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. - [:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) - - [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) - - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - - [:simple-windows11: Windows](https://protonvpn.com/download-windows) - - [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) +- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) +- [:simple-windows11: Windows](https://protonvpn.com/download-windows) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) + +
+ +
#### :material-check:{ .pg-green } 71 Countries @@ -104,25 +112,30 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit ### IVPN -!!! recommendation +
+ +![IVPN logo](assets/img/vpn/ivpn.svg){ align=right } - ![IVPN logo](assets/img/vpn/ivpn.svg){ align=right } +**IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. - **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. +[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" } - [:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" } +
+Downloads - ??? downloads +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) +- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) +- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) +- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - - [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) - - [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) - - [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) - - [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +
+ +
#### :material-check:{ .pg-green } 37 Countries @@ -169,26 +182,31 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN ### Mullvad -!!! recommendation +
+ +![Mullvad logo](assets/img/vpn/mullvad.svg){ align=right } + +**Mullvad** is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since **2009**. Mullvad is based in Sweden and does not have a free trial. - ![Mullvad logo](assets/img/vpn/mullvad.svg){ align=right } +[:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } +[:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" } - **Mullvad** is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since **2009**. Mullvad is based in Sweden and does not have a free trial. +
+Downloads - [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } - [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } - [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" } +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) +- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) - ??? downloads +
- - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) - - [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) - - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) - - [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) - - [:simple-apple: macOS](https://mullvad.net/en/download/macos/) - - [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +
#### :material-check:{ .pg-green } 40 Countries @@ -247,9 +265,12 @@ Mullvad is very transparent about which nodes they [own or rent](https://mullvad ## Criteria -!!! danger +
+

Danger

+ +It is important to note that using a VPN provider will not make you anonymous, but it will give you better privacy in certain situations. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy. - It is important to note that using a VPN provider will not make you anonymous, but it will give you better privacy in certain situations. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy. +
**Please note we are not affiliated with any of the providers we recommend. This allows us to provide completely objective recommendations.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements for any VPN provider wishing to be recommended, including strong encryption, independent security audits, modern technology, and more. We suggest you familiarize yourself with this list before choosing a VPN provider, and conduct your own research to ensure the VPN provider you choose is as trustworthy as possible. From b477409747c1be57dfd6c51d7a956d093e5656c6 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Fri, 1 Mar 2024 04:07:37 +0000 Subject: [PATCH 03/10] Bump actions/cache from 4.0.0 to 4.0.1 Bumps [actions/cache](https://github.com/actions/cache) from 4.0.0 to 4.0.1. - [Release notes](https://github.com/actions/cache/releases) - [Changelog](https://github.com/actions/cache/blob/main/RELEASES.md) - [Commits](https://github.com/actions/cache/compare/v4.0.0...v4.0.1) --- updated-dependencies: - dependency-name: actions/cache dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] --- .github/workflows/pages.yml | 2 +- .github/workflows/release.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/pages.yml b/.github/workflows/pages.yml index 48a5cc0279..f5d1a1189b 100644 --- a/.github/workflows/pages.yml +++ b/.github/workflows/pages.yml @@ -56,7 +56,7 @@ jobs: cache: 'pipenv' - name: Cache files - uses: actions/cache@v4.0.0 + uses: actions/cache@v4.0.1 with: key: ${{ github.ref }} path: .cache diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 85e04e9f05..d20d1a80bb 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -63,7 +63,7 @@ jobs: cache: 'pipenv' - name: Cache files - uses: actions/cache@v4.0.0 + uses: actions/cache@v4.0.1 with: key: ${{ github.ref }} path: .cache From 0140f0ab7e210c93f74e8a9eae35306b41ff1ea9 Mon Sep 17 00:00:00 2001 From: rollsicecream Date: Thu, 7 Mar 2024 02:54:30 +0000 Subject: [PATCH 04/10] Convert 4 pages to HTML admonitions (#2424) Signed-off-by: Daniel Gray --- docs/frontends.md | 245 +++++++++++++++++++++++++---------------- docs/notebooks.md | 165 ++++++++++++++++------------ docs/passwords.md | 252 +++++++++++++++++++++++++------------------ docs/productivity.md | 169 +++++++++++++++++------------ 4 files changed, 498 insertions(+), 333 deletions(-) diff --git a/docs/frontends.md b/docs/frontends.md index 773e5b94c7..329f11c534 100644 --- a/docs/frontends.md +++ b/docs/frontends.md @@ -15,183 +15,242 @@ When you are using an instance run by someone else, make sure to read the privac ### ProxiTok -!!! recommendation +
- ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } +![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. - There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. +There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. - [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } - [:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} - [:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } +[:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } -!!! tip + - ProxiTok is useful if you want to disable JavaScript in your browser, such as [Tor Browser](https://www.torproject.org/) on the Safest security level. +
+ +
+

Tip

+ +ProxiTok is useful if you want to disable JavaScript in your browser, such as [Tor Browser](https://www.torproject.org/) on the Safest security level. + +
## YouTube ### FreeTube -!!! recommendation +
- ![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - **FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } - [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } - [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } + +
+Downloads - ??? downloads +- [:simple-windows11: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - - [:simple-windows11: Windows](https://freetubeapp.io/#download) - - [:simple-apple: macOS](https://freetubeapp.io/#download) - - [:simple-linux: Linux](https://freetubeapp.io/#download) - - [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) +
-!!! warning +
- When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
### Yattee -!!! recommendation +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - ![Yattee logo](assets/img/frontends/yattee.svg){ align=right } +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. - **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. - You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } - [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - - [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) - - [:simple-github: GitHub](https://github.com/yattee/yattee/releases) +
-!!! warning +
- When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. ### LibreTube (Android) -!!! recommendation +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - ![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } - ![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } +[:octicons-home-16: Homepage](https://libre-tube.github.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube#privacy-policy-and-disclaimer){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/libre-tube/LibreTube#readme){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } - **LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. +
+Downloads - LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - [:octicons-home-16: Homepage](https://libre-tube.github.io){ .md-button .md-button--primary } - [:octicons-eye-16:](https://github.com/libre-tube/LibreTube#privacy-policy-and-disclaimer){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://github.com/libre-tube/LibreTube#readme){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +
- ??? downloads +
- - [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) +
+

Warning

-!!! warning +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +
By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. ### NewPipe (Android) -!!! recommendation annotate +
- ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - **NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). - Your subscription list and playlists are saved locally on your Android device. +Your subscription list and playlists are saved locally on your Android device. - [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } - [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } - [:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } - ??? downloads +
+Downloads - - [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** -!!! warning +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +
### Invidious -!!! recommendation +
+ +![Invidious logo](assets/img/frontends/invidious.svg#only-light){ align=right } +![Invidious logo](assets/img/frontends/invidious-dark.svg#only-dark){ align=right } + +**Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. + +There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. - ![Invidious logo](assets/img/frontends/invidious.svg#only-light){ align=right } - ![Invidious logo](assets/img/frontends/invidious-dark.svg#only-dark){ align=right } +[:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} +[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } - **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. + - There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. +
- [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } - [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} - [:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } - [:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +
+

Warning

-!!! warning +Invidious does not proxy video streams by default. Videos watched through Invidious will still make direct connections to Google's servers (e.g. `googlevideo.com`); however, some instances support video proxying—simply enable *Proxy videos* within the instances' settings or add `&local=true` to the URL. - Invidious does not proxy video streams by default. Videos watched through Invidious will still make direct connections to Google's servers (e.g. `googlevideo.com`); however, some instances support video proxying—simply enable *Proxy videos* within the instances' settings or add `&local=true` to the URL. +
-!!! tip +
+

Tip

- Invidious is useful if you want to disable JavaScript in your browser, such as [Tor Browser](https://www.torproject.org/) on the Safest security level. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Invidious is useful if you want to disable JavaScript in your browser, such as [Tor Browser](https://www.torproject.org/) on the Safest security level. It does not provide privacy by itself, and we don’t recommend logging into any accounts. + +
### Piped -!!! recommendation +
+ +![Piped logo](assets/img/frontends/piped.svg){ align=right } + +**Piped** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. - ![Piped logo](assets/img/frontends/piped.svg){ align=right } +Piped requires JavaScript in order to function and there are a number of public instances. - **Piped** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. +[:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } +[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} +[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } - Piped requires JavaScript in order to function and there are a number of public instances. + - [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } - [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} - [:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +
-!!! tip +
+

Tip

- Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. + +
## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

+ +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. - We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +
Recommended frontends... diff --git a/docs/notebooks.md b/docs/notebooks.md index 30fc69fba2..5fdea4602e 100644 --- a/docs/notebooks.md +++ b/docs/notebooks.md @@ -13,100 +13,120 @@ If you are currently using an application like Evernote, Google Keep, or Microso ### Standard Notes -!!! recommendation +
- ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } - **Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). - [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } - [:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes) - - [:simple-appstore: App Store](https://apps.apple.com/app/id1285392450) - - [:simple-github: GitHub](https://github.com/standardnotes/app/releases) - - [:simple-windows11: Windows](https://standardnotes.com) - - [:simple-apple: macOS](https://standardnotes.com) - - [:simple-linux: Linux](https://standardnotes.com) - - [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1285392450) +- [:simple-github: GitHub](https://github.com/standardnotes/app/releases) +- [:simple-windows11: Windows](https://standardnotes.com) +- [:simple-apple: macOS](https://standardnotes.com) +- [:simple-linux: Linux](https://standardnotes.com) +- [:octicons-globe-16: Web](https://app.standardnotes.com/) + +
+ +
### Notesnook -!!! recommendation +
+ +![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } - ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). - **Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) +- [:simple-windows11: Windows](https://notesnook.com/downloads) +- [:simple-apple: macOS](https://notesnook.com/downloads) +- [:simple-linux: Linux](https://notesnook.com/downloads) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) - - [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) - - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - - [:simple-windows11: Windows](https://notesnook.com/downloads) - - [:simple-apple: macOS](https://notesnook.com/downloads) - - [:simple-linux: Linux](https://notesnook.com/downloads) - - [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) - - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) +
+ +
Notesnook only allows local note encryption with the [private vault](https://help.notesnook.com/lock-notes-with-private-vault) feature on their pro plan, otherwise your notes are not stored encrypted on your device. Your notes are always encrypted before being synced to their servers with keys which only you have access to. ### Joplin -!!! recommendation +
+ +![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } + +**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. - ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } +[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } +[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } - **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +
+Downloads - [:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } - [:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) +- [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) +- [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) +- [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) - ??? downloads +
- - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) - - [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) - - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +
Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee -!!! recommendation +
- ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } - ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } +![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } +![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } - **Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. - [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } - [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-globe-16: PWA](https://crypt.ee/download) + +
+ +
Cryptee offers 100MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. @@ -114,24 +134,31 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ### Org-mode -!!! recommendation +
+ +![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } - ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } +**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. - **Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } - [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} - [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } - [:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } + + +
## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

+ +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. - We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +
- Clients must be open source. - Any cloud sync functionality must be E2EE. diff --git a/docs/passwords.md b/docs/passwords.md index 65f390bac9..394dfa509f 100644 --- a/docs/passwords.md +++ b/docs/passwords.md @@ -5,12 +5,12 @@ icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. cover: passwords.webp schema: - - + - "@context": http://schema.org "@type": WebPage name: Password Manager Recommendations url: "./" - - + - "@context": http://schema.org "@type": SoftwareApplication name: Bitwarden @@ -28,7 +28,7 @@ schema: "@context": http://schema.org "@type": WebPage url: "./" - - + - "@context": http://schema.org "@type": SoftwareApplication name: 1Password @@ -46,7 +46,7 @@ schema: "@context": http://schema.org "@type": WebPage url: "./" - - + - "@context": http://schema.org "@type": SoftwareApplication name: Psono @@ -60,7 +60,7 @@ schema: "@context": http://schema.org "@type": WebPage url: "./" - - + - "@context": http://schema.org "@type": SoftwareApplication name: KeePassXC @@ -76,7 +76,7 @@ schema: "@context": http://schema.org "@type": WebPage url: "./" - - + - "@context": http://schema.org "@type": SoftwareApplication name: KeePassDX @@ -88,7 +88,7 @@ schema: "@context": http://schema.org "@type": WebPage url: "./" - - + - "@context": http://schema.org "@type": SoftwareApplication name: Strongbox @@ -100,7 +100,7 @@ schema: "@context": http://schema.org "@type": WebPage url: "./" - - + - "@context": http://schema.org "@type": SoftwareApplication name: gopass @@ -121,11 +121,14 @@ Password managers allow you to securely store and manage passwords and other cre [Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) -!!! info +
+

Info

- Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. - For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. + +
## Cloud-based @@ -133,28 +136,33 @@ These password managers sync your passwords to a cloud server for easy accessibi ### Bitwarden -!!! recommendation +
+ +![Bitwarden logo](assets/img/password-management/bitwarden.svg){ align=right } + +**Bitwarden** is a free and open-source password manager. It aims to solve password management problems for individuals, teams, and business organizations. Bitwarden is among the best and safest solutions to store all of your logins and passwords while conveniently keeping them synced between all of your devices. - ![Bitwarden logo](assets/img/password-management/bitwarden.svg){ align=right } +[:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" } - **Bitwarden** is a free and open-source password manager. It aims to solve password management problems for individuals, teams, and business organizations. Bitwarden is among the best and safest solutions to store all of your logins and passwords while conveniently keeping them synced between all of your devices. +
+Downloads - [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" } +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) +- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-windows11: Windows](https://bitwarden.com/download) +- [:simple-linux: Linux](https://bitwarden.com/download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) - ??? downloads +
- - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - - [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) - - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - - [:simple-windows11: Windows](https://bitwarden.com/download) - - [:simple-linux: Linux](https://bitwarden.com/download) - - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) - - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) - - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) +
Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). @@ -171,23 +179,28 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ### 1Password -!!! recommendation +
+ +![1Password logo](assets/img/password-management/1password.svg){ align=right } + +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). - ![1Password logo](assets/img/password-management/1password.svg){ align=right } +[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} - **1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +
+Downloads - [:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) +- [:simple-windows11: Windows](https://1password.com/downloads/windows/) +- [:simple-apple: macOS](https://1password.com/downloads/mac/) +- [:simple-linux: Linux](https://1password.com/downloads/linux/) - ??? downloads +
- - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) - - [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) - - [:simple-windows11: Windows](https://1password.com/downloads/windows/) - - [:simple-apple: macOS](https://1password.com/downloads/mac/) - - [:simple-linux: Linux](https://1password.com/downloads/linux/) +
Traditionally, **1Password** has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. It boasts many features geared towards families and less technical people, as well as advanced functionality. @@ -197,24 +210,29 @@ One advantage 1Password has over Bitwarden is its first-class support for native ### Psono -!!! recommendation +
- ![Psono logo](assets/img/password-management/psono.svg){ align=right } +![Psono logo](assets/img/password-management/psono.svg){ align=right } - **Psono** is a free and open-source password manager from Germany, with a focus on password management for teams. Psono supports secure sharing of passwords, files, bookmarks, and emails. All secrets are protected by a master password. +**Psono** is a free and open-source password manager from Germany, with a focus on password management for teams. Psono supports secure sharing of passwords, files, bookmarks, and emails. All secrets are protected by a master password. - [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} - [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - - [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) - - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) + +
+ +
Psono provides extensive documentation for their product. The web-client for Psono can be self-hosted; alternatively, you can choose the full Community Edition or the Enterprise Edition with additional features. @@ -222,9 +240,12 @@ Psono provides extensive documentation for their product. The web-client for Pso **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

- We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. + +
#### Minimum Requirements @@ -247,64 +268,79 @@ These options allow you to manage an encrypted password database locally. ### KeePassXC -!!! recommendation +
+ +![KeePassXC logo](assets/img/password-management/keepassxc.svg){ align=right } - ![KeePassXC logo](assets/img/password-management/keepassxc.svg){ align=right } +**KeePassXC** is a community fork of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal to extend and improve it with new features and bugfixes to provide a feature-rich, cross-platform and modern open-source password manager. - **KeePassXC** is a community fork of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal to extend and improve it with new features and bugfixes to provide a feature-rich, cross-platform and modern open-source password manager. +[:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } - [:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-windows11: Windows](https://keepassxc.org/download/#windows) +- [:simple-apple: macOS](https://keepassxc.org/download/#mac) +- [:simple-linux: Linux](https://keepassxc.org/download/#linux) +- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) - - [:simple-windows11: Windows](https://keepassxc.org/download/#windows) - - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - - [:simple-linux: Linux](https://keepassxc.org/download/#linux) - - [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) - - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +
+ +
KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) -!!! recommendation +
+ +![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } - ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } +**KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. - **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } - [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } - [:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free) +- [:simple-github: GitHub](https://github.com/Kunzisoft/KeePassDX/releases) - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free) - - [:simple-github: GitHub](https://github.com/Kunzisoft/KeePassDX/releases) +
+ +
### Strongbox (iOS & macOS) -!!! recommendation +
+ +![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } - ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. - **Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +[:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) - - [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +
+ +
Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. @@ -314,30 +350,38 @@ These products are minimal password managers that can be used within scripting a #### gopass -!!! recommendation +
+ +![gopass logo](assets/img/password-management/gopass.svg){ align=right } - ![gopass logo](assets/img/password-management/gopass.svg){ align=right } +**gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). - **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } - [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) +- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) +- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) - - [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) - - [:simple-apple: macOS](https://www.gopass.pw/#install-macos) - - [:simple-linux: Linux](https://www.gopass.pw/#install-linux) - - [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +
+ +
### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

+ +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. - We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +
- Must be cross-platform. diff --git a/docs/productivity.md b/docs/productivity.md index 113e0bc298..5940b53dd5 100644 --- a/docs/productivity.md +++ b/docs/productivity.md @@ -10,52 +10,67 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac ### Nextcloud -!!! recommendation +
- ![Nextcloud logo](assets/img/productivity/nextcloud.svg){ align=right } +![Nextcloud logo](assets/img/productivity/nextcloud.svg){ align=right } - **Nextcloud** is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. +**Nextcloud** is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. - [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } - [:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } +[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } - ??? downloads +
+Downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client) - - [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102) - - [:simple-github: GitHub](https://github.com/nextcloud/android/releases) - - [:simple-windows11: Windows](https://nextcloud.com/install/#install-clients) - - [:simple-apple: macOS](https://nextcloud.com/install/#install-clients) - - [:simple-linux: Linux](https://nextcloud.com/install/#install-clients) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102) +- [:simple-github: GitHub](https://github.com/nextcloud/android/releases) +- [:simple-windows11: Windows](https://nextcloud.com/install/#install-clients) +- [:simple-apple: macOS](https://nextcloud.com/install/#install-clients) +- [:simple-linux: Linux](https://nextcloud.com/install/#install-clients) -!!! danger +
- We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_end_encryption) for Nextcloud as it may lead to data loss; it is highly experimental and not production quality. For this reason, we don't recommend third-party Nextcloud providers. +
+ +
+

Danger

+ +We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_end_encryption) for Nextcloud as it may lead to data loss; it is highly experimental and not production quality. For this reason, we don't recommend third-party Nextcloud providers. + +
### CryptPad -!!! recommendation +
+ +![CryptPad logo](assets/img/productivity/cryptpad.svg){ align=right } - ![CryptPad logo](assets/img/productivity/cryptpad.svg){ align=right } +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. - **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. +[:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } - [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } - [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } + + +
### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

+ +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. - We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +
In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. @@ -77,56 +92,69 @@ Our best-case criteria represents what we would like to see from the perfect pro ### LibreOffice -!!! recommendation +
+ +![LibreOffice logo](assets/img/productivity/libreoffice.svg){ align=right } - ![LibreOffice logo](assets/img/productivity/libreoffice.svg){ align=right } +**LibreOffice** is a free and open-source office suite with extensive functionality. - **LibreOffice** is a free and open-source office suite with extensive functionality. +[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} +[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } - [:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} - [:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } - [:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +
+Downloads - ??? downloads +- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) +- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) +- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) +- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) +- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice) - - [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) - - [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) - - [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) - - [:simple-apple: macOS](https://www.libreoffice.org/download/download/) - - [:simple-linux: Linux](https://www.libreoffice.org/download/download/) - - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice) +
+ +
### OnlyOffice -!!! recommendation +
+ +![OnlyOffice logo](assets/img/productivity/onlyoffice.svg){ align=right } - ![OnlyOffice logo](assets/img/productivity/onlyoffice.svg){ align=right } +**OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. - **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. +[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } - [:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } +
+Downloads - ??? downloads +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) +- [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) +- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors) - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) - - [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) - - [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) - - [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) - - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors) +
+ +
### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

+ +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. - We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +
In general, we define office suites as applications which could reasonably act as a replacement for Microsoft Word for most needs. @@ -140,24 +168,31 @@ In general, we define office suites as applications which could reasonably act a ### PrivateBin -!!! recommendation +
- ![PrivateBin logo](assets/img/productivity/privatebin.svg){ align=right } +![PrivateBin logo](assets/img/productivity/privatebin.svg){ align=right } - **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. There is a [list of instances](https://privatebin.info/directory/). +**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. There is a [list of instances](https://privatebin.info/directory/). - [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } - [:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} - [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } +[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } +[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } + + + +
### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -!!! example "This section is new" +
+

This section is new

+ +We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. - We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. +
#### Minimum Requirements From 05e583216196297e9e17df703609d6e35ccdcab7 Mon Sep 17 00:00:00 2001 From: rollsicecream Date: Thu, 7 Mar 2024 04:48:01 +0000 Subject: [PATCH 05/10] Convert KB pages HTML to admonitions (#2425) Signed-off-by: Daniel Gray --- docs/advanced/payments.md | 9 ++-- docs/advanced/tor-overview.md | 11 +++-- docs/basics/account-creation.md | 7 ++- docs/basics/common-misconceptions.md | 13 +++-- docs/basics/common-threats.md | 52 +++++++++++++------- docs/basics/multi-factor-authentication.md | 7 ++- docs/basics/passwords-overview.md | 55 ++++++++++++++-------- docs/basics/vpn-overview.md | 7 ++- docs/os/android-overview.md | 14 ++++-- docs/os/ios-overview.md | 7 ++- docs/os/macos-overview.md | 14 ++++-- docs/os/qubes-overview.md | 14 ++++-- 12 files changed, 141 insertions(+), 69 deletions(-) diff --git a/docs/advanced/payments.md b/docs/advanced/payments.md index 42b503a4a3..f4f088ffd6 100644 --- a/docs/advanced/payments.md +++ b/docs/advanced/payments.md @@ -44,11 +44,14 @@ These tend to be good options for recurring/subscription payments online, while Cryptocurrencies are a digital form of currency designed to work without central authorities such as a government or bank. While *some* cryptocurrency projects can allow you to make private transactions online, many use a public blockchain which does not provide any transaction privacy. Cryptocurrencies also tend to be very volatile assets, meaning their value can change rapidly and significantly at any time. As such, we generally don't recommend using cryptocurrency as a long-term store of value. If you decide to use cryptocurrency online, make sure you have a full understanding of its privacy aspects beforehand, and only invest amounts which would not be disastrous to lose. -!!! danger +
+

Danger

- The vast majority of cryptocurrencies operate on a **public** blockchain, meaning that every transaction is public knowledge. This includes even most well-known cryptocurrencies like Bitcoin and Ethereum. Transactions with these cryptocurrencies should not be considered private and will not protect your anonymity. +The vast majority of cryptocurrencies operate on a **public** blockchain, meaning that every transaction is public knowledge. This includes even most well-known cryptocurrencies like Bitcoin and Ethereum. Transactions with these cryptocurrencies should not be considered private and will not protect your anonymity. - Additionally, many if not most cryptocurrencies are scams. Make transactions carefully with only projects you trust. +Additionally, many if not most cryptocurrencies are scams. Make transactions carefully with only projects you trust. + +
### Privacy Coins diff --git a/docs/advanced/tor-overview.md b/docs/advanced/tor-overview.md index c068688a12..4bd67de4d2 100644 --- a/docs/advanced/tor-overview.md +++ b/docs/advanced/tor-overview.md @@ -45,13 +45,16 @@ Setting up bad configurations like these is difficult to do accidentally, becaus --- -!!! info "VPN/SSH Fingerprinting" +
+

VPN/SSH Fingerprinting

- The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. - Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. +Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. - If you still believe that pluggable transports (bridges) provide additional protection against website traffic fingerprinting that a VPN does not, you always have the option to use a bridge **and** a VPN in conjunction. +If you still believe that pluggable transports (bridges) provide additional protection against website traffic fingerprinting that a VPN does not, you always have the option to use a bridge **and** a VPN in conjunction. + +
Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. diff --git a/docs/basics/account-creation.md b/docs/basics/account-creation.md index 99b6e01167..810251ee47 100644 --- a/docs/basics/account-creation.md +++ b/docs/basics/account-creation.md @@ -29,9 +29,12 @@ There are usually multiple ways to sign up for an account, each with their own b The most common way to create a new account is by an email address and password. When using this method, you should use a password manager and follow [best practices](passwords-overview.md) regarding passwords. -!!! tip +
+

Tip

- You can use your password manager to organize other authentication methods too! Just add the new entry and fill the appropriate fields, you can add notes for things like security questions or a backup key. +You can use your password manager to organize other authentication methods too! Just add the new entry and fill the appropriate fields, you can add notes for things like security questions or a backup key. + +
You will be responsible for managing your login credentials. For added security, you can set up [MFA](multi-factor-authentication.md) on your accounts. diff --git a/docs/basics/common-misconceptions.md b/docs/basics/common-misconceptions.md index a0af539ac6..75e5b440bc 100644 --- a/docs/basics/common-misconceptions.md +++ b/docs/basics/common-misconceptions.md @@ -77,18 +77,21 @@ One of the clearest threat models is one where people *know who you are* and one 1. **Known identity** - A known identity is used for things where you must declare your name. There are many legal documents and contracts where a legal identity is required. This could range from opening a bank account, signing a property lease, obtaining a passport, customs declarations when importing items, or otherwise dealing with your government. These things will usually lead to credentials such as credit cards, credit rating checks, account numbers, and possibly physical addresses. - We don't suggest using a VPN or Tor for any of these things, as your identity is already known through other means. +We don't suggest using a VPN or Tor for any of these things, as your identity is already known through other means. - !!! tip +
+

Tip

- When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki/Parcel_locker) can help keep your physical address private. +When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki/Parcel_locker) can help keep your physical address private. + +
2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. - You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. - Using Tor can help with this. It is also worth noting that greater anonymity is possible through asynchronous communication: Real-time communication is vulnerable to analysis of typing patterns (i.e. more than a paragraph of text, distributed on a forum, via email, etc.) +Using Tor can help with this. It is also worth noting that greater anonymity is possible through asynchronous communication: Real-time communication is vulnerable to analysis of typing patterns (i.e. more than a paragraph of text, distributed on a forum, via email, etc.) [^1]: One notable example of this is the [2021 incident in which University of Minnesota researchers introduced three vulnerabilities into the Linux kernel development project](https://cse.umn.edu/cs/linux-incident). diff --git a/docs/basics/common-threats.md b/docs/basics/common-threats.md index c282b96dfa..a8102469da 100644 --- a/docs/basics/common-threats.md +++ b/docs/basics/common-threats.md @@ -35,19 +35,25 @@ When it comes to application security, we generally don't (and sometimes can't) To minimize the damage that a malicious piece of software *could* do, you should employ security by compartmentalization. For example, this could come in the form of using different computers for different jobs, using virtual machines to separate different groups of related applications, or using a secure operating system with a strong focus on application sandboxing and mandatory access control. -!!! tip +
+

Tip

- Mobile operating systems generally have better application sandboxing than desktop operating systems: Apps can't obtain root access, and require permission for access to system resources. +Mobile operating systems generally have better application sandboxing than desktop operating systems: Apps can't obtain root access, and require permission for access to system resources. - Desktop operating systems generally lag behind on proper sandboxing. ChromeOS has similar sandboxing capabilities to Android, and macOS has full system permission control (and developers can opt-in to sandboxing for applications). However, these operating systems do transmit identifying information to their respective OEMs. Linux tends to not submit information to system vendors, but it has poor protection against exploits and malicious apps. This can be mitigated somewhat with specialized distributions which make significant use of virtual machines or containers, such as [Qubes OS](../desktop.md#qubes-os). +Desktop operating systems generally lag behind on proper sandboxing. ChromeOS has similar sandboxing capabilities to Android, and macOS has full system permission control (and developers can opt-in to sandboxing for applications). However, these operating systems do transmit identifying information to their respective OEMs. Linux tends to not submit information to system vendors, but it has poor protection against exploits and malicious apps. This can be mitigated somewhat with specialized distributions which make significant use of virtual machines or containers, such as [Qubes OS](../desktop.md#qubes-os). + +
:material-target-account: Targeted Attacks Targeted attacks against a specific person are more problematic to deal with. Common attacks include sending malicious documents via email, exploiting vulnerabilities (e.g. in browsers and operating systems), and physical attacks. If this is a concern for you, you should employ more advanced threat mitigation strategies. -!!! tip +
+

Tip

+ +By design, **web browsers**, **email clients**, and **office applications** typically run untrusted code, sent to you from third parties. Running multiple virtual machines—to separate applications like these from your host system, as well as each other—is one technique you can use to mitigate the chance of an exploit in these applications compromising the rest of your system. For example, technologies like Qubes OS or Microsoft Defender Application Guard on Windows provide convenient methods to do this. - By design, **web browsers**, **email clients**, and **office applications** typically run untrusted code, sent to you from third parties. Running multiple virtual machines—to separate applications like these from your host system, as well as each other—is one technique you can use to mitigate the chance of an exploit in these applications compromising the rest of your system. For example, technologies like Qubes OS or Microsoft Defender Application Guard on Windows provide convenient methods to do this. +
If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. @@ -61,13 +67,16 @@ The obvious problem with this is that the service provider (or a hacker who has Thankfully, E2EE can alleviate this issue by encrypting communications between you and your desired recipients before they are even sent to the server. The confidentiality of your messages is guaranteed, assuming the service provider doesn't have access to the private keys of either party. -!!! note "Note on Web-based Encryption" +
+

Note on Web-based Encryption

+ +In practice, the effectiveness of different E2EE implementations varies. Applications, such as [Signal](../real-time-communication.md#signal), run natively on your device, and every copy of the application is the same across different installations. If the service provider were to introduce a [backdoor](https://en.wikipedia.org/wiki/Backdoor_(computing)) in their application—in an attempt to steal your private keys—it could later be detected with [reverse engineering](https://en.wikipedia.org/wiki/Reverse_engineering). - In practice, the effectiveness of different E2EE implementations varies. Applications, such as [Signal](../real-time-communication.md#signal), run natively on your device, and every copy of the application is the same across different installations. If the service provider were to introduce a [backdoor](https://en.wikipedia.org/wiki/Backdoor_(computing)) in their application—in an attempt to steal your private keys—it could later be detected with [reverse engineering](https://en.wikipedia.org/wiki/Reverse_engineering). +On the other hand, web-based E2EE implementations, such as Proton Mail's webmail or Bitwarden's *Web Vault*, rely on the server dynamically serving JavaScript code to the browser to handle cryptography. A malicious server can target you and send you malicious JavaScript code to steal your encryption key (and it would be extremely hard to notice). Because the server can choose to serve different web clients to different people—even if you noticed the attack—it would be incredibly hard to prove the provider's guilt. - On the other hand, web-based E2EE implementations, such as Proton Mail's webmail or Bitwarden's *Web Vault*, rely on the server dynamically serving JavaScript code to the browser to handle cryptography. A malicious server can target you and send you malicious JavaScript code to steal your encryption key (and it would be extremely hard to notice). Because the server can choose to serve different web clients to different people—even if you noticed the attack—it would be incredibly hard to prove the provider's guilt. +Therefore, you should use native applications over web clients whenever possible. - Therefore, you should use native applications over web clients whenever possible. +
Even with E2EE, service providers can still profile you based on **metadata**, which typically isn't protected. While the service provider can't read your messages, they can still observe important things, such as who you're talking to, how often you message them, and when you're typically active. Protection of metadata is fairly uncommon, and—if it's within your [threat model](threat-modeling.md)—you should pay close attention to the technical documentation of the software you're using to see if there's any metadata minimization or protection at all. @@ -77,17 +86,23 @@ Even with E2EE, service providers can still profile you based on **metadata**, w Mass surveillance is the intricate effort to monitor the "behavior, many activities, or information" of an entire (or substantial fraction of a) population.[^1] It often refers to government programs, such as the ones [disclosed by Edward Snowden in 2013](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)). However, it can also be carried out by corporations, either on behalf of government agencies or by their own initiative. -!!! abstract "Atlas of Surveillance" +
+

Atlas of Surveillance

- If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). - In France you can take a look at the [Technolopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. + +
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others. -!!! quote "ACLU: [*The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward*](https://www.aclu.org/news/national-security/the-privacy-lesson-of-9-11-mass-surveillance-is-not-the-way-forward)" +
+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+ +In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. - In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. +
Despite growing mass surveillance in the United States, the government has found that mass surveillance programs like Section 215 have had "little unique value" with respect to stopping actual crimes or terrorist plots, with efforts largely duplicating the FBI's own targeted surveillance programs.[^2] @@ -133,11 +148,14 @@ Censorship on corporate platforms is increasingly common, as platforms like Twit People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. -!!! tip +
+

Tip

+ +While evading censorship itself can be easy, hiding the fact that you are doing it can be very problematic. - While evading censorship itself can be easy, hiding the fact that you are doing it can be very problematic. +You should consider which aspects of the network your adversary can observe, and whether you have plausible deniability for your actions. For example, using [encrypted DNS](../advanced/dns-overview.md#what-is-encrypted-dns) can help you bypass rudimentary, DNS-based censorship systems, but it can't truly hide what you are visiting from your ISP. A VPN or Tor can help hide what you are visiting from network administrators, but can't hide that you're using those networks in the first place. Pluggable transports (such as Obfs4proxy, Meek, or Shadowsocks) can help you evade firewalls that block common VPN protocols or Tor, but your circumvention attempts can still be detected by methods like probing or [deep packet inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection). - You should consider which aspects of the network your adversary can observe, and whether you have plausible deniability for your actions. For example, using [encrypted DNS](../advanced/dns-overview.md#what-is-encrypted-dns) can help you bypass rudimentary, DNS-based censorship systems, but it can't truly hide what you are visiting from your ISP. A VPN or Tor can help hide what you are visiting from network administrators, but can't hide that you're using those networks in the first place. Pluggable transports (such as Obfs4proxy, Meek, or Shadowsocks) can help you evade firewalls that block common VPN protocols or Tor, but your circumvention attempts can still be detected by methods like probing or [deep packet inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection). +
You must always consider the risks of trying to bypass censorship, the potential consequences, and how sophisticated your adversary may be. You should be cautious with your software selection, and have a backup plan in case you are caught. diff --git a/docs/basics/multi-factor-authentication.md b/docs/basics/multi-factor-authentication.md index d82c23b9b5..7665d4c2da 100644 --- a/docs/basics/multi-factor-authentication.md +++ b/docs/basics/multi-factor-authentication.md @@ -139,9 +139,12 @@ The command will prevent an adversary from bypassing MFA when the computer boots ### Linux -!!! warning +
+

Warning

- If the hostname of your system changes (such as due to DHCP), you would be unable to login. It is vital that you set up a proper hostname for your computer before following this guide. +If the hostname of your system changes (such as due to DHCP), you would be unable to login. It is vital that you set up a proper hostname for your computer before following this guide. + +
The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. diff --git a/docs/basics/passwords-overview.md b/docs/basics/passwords-overview.md index 9b33d731e2..01ec2a539a 100644 --- a/docs/basics/passwords-overview.md +++ b/docs/basics/passwords-overview.md @@ -26,9 +26,12 @@ You should avoid changing passwords that you have to remember (such as your pass When it comes to passwords that you don't have to remember (such as passwords stored inside your password manager), if your [threat model](threat-modeling.md) calls for it, we recommend going through important accounts (especially accounts that don't use multi-factor authentication) and changing their password every couple of months, in case they have been compromised in a data breach that hasn't become public yet. Most password managers allow you to set an expiry date for your password to make this easier to manage. -!!! tip "Checking for data breaches" +
+

Checking for data breaches

- If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md). +If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md). + +
## Creating strong passwords @@ -48,9 +51,12 @@ An example of a diceware passphrase is `viewable fastness reluctant squishy seve To generate a diceware passphrase using real dice, follow these steps: -!!! note +
+

Note

+ +These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. - These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +
1. Roll a six-sided die five times, noting down the number after each roll. @@ -60,31 +66,37 @@ To generate a diceware passphrase using real dice, follow these steps: 4. Repeat this process until your passphrase has as many words as you need, which you should separate with a space. -!!! warning "Important" +
+

Important

+ +You should **not** re-roll words until you get a combination of words that appeal to you. The process should be completely random. - You should **not** re-roll words until you get a combination of words that appeal to you. The process should be completely random. +
If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. -??? note "Explanation of entropy and strength of diceware passphrases" +
+Explanation of entropy and strength of diceware passphrases - To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. - One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. +One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. - Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). +Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). - The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. - Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. - On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: +On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: - - Your adversary knows that you used the diceware method. - - Your adversary knows the specific wordlist that you used. - - Your adversary knows how many words your passphrase contains. +- Your adversary knows that you used the diceware method. +- Your adversary knows the specific wordlist that you used. +- Your adversary knows how many words your passphrase contains. + +
To sum it up, diceware passphrases are your best option when you need something that is both easy to remember *and* exceptionally strong. @@ -98,13 +110,16 @@ There are many good options to choose from, both cloud-based and local. Choose o [List of recommended password managers](../passwords.md){ .md-button } -!!! warning "Don't place your passwords and TOTP tokens inside the same password manager" +
+

Don't place your passwords and TOTP tokens inside the same password manager

+ +When using TOTP codes as [multi-factor authentication](../multi-factor-authentication.md), the best security practice is to keep your TOTP codes in a [separate app](../multi-factor-authentication.md#authenticator-apps). - When using TOTP codes as [multi-factor authentication](../multi-factor-authentication.md), the best security practice is to keep your TOTP codes in a [separate app](../multi-factor-authentication.md#authenticator-apps). +Storing your TOTP tokens in the same place as your passwords, while convenient, reduces the accounts to a single factor in the event that an adversary gains access to your password manager. - Storing your TOTP tokens in the same place as your passwords, while convenient, reduces the accounts to a single factor in the event that an adversary gains access to your password manager. +Furthermore, we do not recommend storing single-use recovery codes in your password manager. Those should be stored separately such as in an encrypted container on an offline storage device. - Furthermore, we do not recommend storing single-use recovery codes in your password manager. Those should be stored separately such as in an encrypted container on an offline storage device. +
### Backups diff --git a/docs/basics/vpn-overview.md b/docs/basics/vpn-overview.md index c9f807a386..310eb7c822 100644 --- a/docs/basics/vpn-overview.md +++ b/docs/basics/vpn-overview.md @@ -11,9 +11,12 @@ Normally, an ISP can see the flow of internet traffic entering and exiting your Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. -!!! note +
+

Note

- When we refer to "Virtual Private Networks" on this website, we are usually referring to **commercial** [VPN providers](../vpn.md), who you pay a monthly fee to in exchange for routing your internet traffic securely through their public servers. There are many other forms of VPN, such as ones you host yourself or ones operated by workplaces which allow you to securely connect to internal/employee network resources, however, these VPNs are usually designed for accessing remote networks securely, rather than protecting the privacy of your internet connection. +When we refer to "Virtual Private Networks" on this website, we are usually referring to **commercial** [VPN providers](../vpn.md), who you pay a monthly fee to in exchange for routing your internet traffic securely through their public servers. There are many other forms of VPN, such as ones you host yourself or ones operated by workplaces which allow you to securely connect to internal/employee network resources, however, these VPNs are usually designed for accessing remote networks securely, rather than protecting the privacy of your internet connection. + +
## How does a VPN work? diff --git a/docs/os/android-overview.md b/docs/os/android-overview.md index 534d5626cf..c39ebca2ca 100644 --- a/docs/os/android-overview.md +++ b/docs/os/android-overview.md @@ -98,13 +98,19 @@ An app may request a permission for a specific feature it has. For example, any [Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. -!!! warning +
+

Warning

- If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. -!!! note +
- Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +
+

Note

+ +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. + +
## Privacy Features diff --git a/docs/os/ios-overview.md b/docs/os/ios-overview.md index ef95266a9c..936959f0d8 100644 --- a/docs/os/ios-overview.md +++ b/docs/os/ios-overview.md @@ -145,9 +145,12 @@ After enabling stolen data protection, [certain actions](https://support.apple.c iPhones are already resistant to brute-force attacks by making you wait long periods of time after multiple failed attempts; however, there have historically been exploits to get around this. To be extra safe, you can set your phone to wipe itself after 10 failed passcode attempts. -!!! warning +
+

Warning

- With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it. +With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it. + +
- [x] Turn on **Erase Data** diff --git a/docs/os/macos-overview.md b/docs/os/macos-overview.md index adbd748fc7..6ef24b3fb5 100644 --- a/docs/os/macos-overview.md +++ b/docs/os/macos-overview.md @@ -155,9 +155,12 @@ macOS employs defense in depth by relying on multiple layers of software and har ### Software Security -!!! warning +
+

Warning

- macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general. +macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general. + +
#### Signed System Volume @@ -177,9 +180,12 @@ System Integrity Protection makes critical file locations read-only to protect a macOS apps downloaded from the App Store are required to be sandboxed usng the [App Sandbox](https://developer.apple.com/documentation/security/app_sandbox). -!!! warning +
+

Warning

+ +Software downloaded from outside the official App Store is not required to be sandboxed. You should avoid non-App Store software as much as possible. - Software downloaded from outside the official App Store is not required to be sandboxed. You should avoid non-App Store software as much as possible. +
##### Antivirus diff --git a/docs/os/qubes-overview.md b/docs/os/qubes-overview.md index 2c76e4fde5..6ed0748133 100644 --- a/docs/os/qubes-overview.md +++ b/docs/os/qubes-overview.md @@ -9,9 +9,12 @@ description: Qubes is an operating system built around isolating apps within *qu Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. -??? "The term *qubes* is gradually being updated to avoid referring to them as "virtual machines"." +
+The term qubes is gradually being updated to avoid referring to them as "virtual machines". - Some of the information here and on the Qubes OS documentation may contain conflicting language as the "appVM" term is gradually being changed to "qube". Qubes are not entire virtual machines, but maintain similar functionalities to VMs. +Some of the information here and on the Qubes OS documentation may contain conflicting language as the "appVM" term is gradually being changed to "qube". Qubes are not entire virtual machines, but maintain similar functionalities to VMs. + +
![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
@@ -40,9 +43,12 @@ You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste To copy and paste files and directories (folders) from one *qube* to another, you can use the option **Copy to Other AppVM...** or **Move to Other AppVM...**. The difference is that the **Move** option will delete the original file. Either option will protect your clipboard from being leaked to any other *qubes*. This is more secure than air-gapped file transfer. An air-gapped computer will still be forced to parse partitions or file systems. That is not required with the inter-qube copy system. -??? "Qubes do not have their own filesystems." +
+Qubes do not have their own filesystems. + +You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. - You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +
### Inter-VM Interactions From 67614c3e174739abbd96c6dccee1b6d3657c6ba4 Mon Sep 17 00:00:00 2001 From: rollsicecream Date: Thu, 7 Mar 2024 05:44:45 +0000 Subject: [PATCH 06/10] NextDNS logging is opt-out, not opt-in (#2426) Signed-off-by: Daniel Gray --- docs/dns.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/dns.md b/docs/dns.md index a1dde13eae..7328eccad1 100644 --- a/docs/dns.md +++ b/docs/dns.md @@ -24,7 +24,7 @@ Encrypted DNS with third-party servers should only be used to get around basic [ [^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) [^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) -[^5]: NextDNS can provide insights and logging features on an opt-in basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) +[^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) [^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) ### Criteria From dd492b272a1185fdd18b5c10ddacbfe76c6c2027 Mon Sep 17 00:00:00 2001 From: redoomed1 <161974310+redoomed1@users.noreply.github.com> Date: Thu, 7 Mar 2024 08:30:11 +0000 Subject: [PATCH 07/10] Update Brave cookie and move social media blocking (#2422) Signed-off-by: Daniel Gray --- docs/desktop-browsers.md | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/docs/desktop-browsers.md b/docs/desktop-browsers.md index 50d2403360..df3030b36c 100644 --- a/docs/desktop-browsers.md +++ b/docs/desktop-browsers.md @@ -285,16 +285,13 @@ Brave allows you to select additional content filters within the internal `brave - [x] (Optional) Select **Block Scripts** (1) - [x] Select **Strict, may break sites** under Block fingerprinting - [x] Check **Forget me when I close this site** (2) +- [ ] Uncheck all social media components
1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. -##### Social media blocking - -- [ ] Uncheck all social media components - ##### Privacy and security
@@ -313,7 +310,7 @@ Brave allows you to select additional content filters within the internal `brave

Sanitizing on close

-- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu +- [x] In the *Sites and Shields Settings* menu, under Content, after clicking on the *On-device site data* menu, select **Delete data sites have saved to your device when you close all windows** If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section. From 298c3cde2b1929cec72c6a7d4e0b877e4b8b5dcb Mon Sep 17 00:00:00 2001 From: jermanuts <109705802+jermanuts@users.noreply.github.com> Date: Thu, 18 Jan 2024 21:02:08 +0300 Subject: [PATCH 08/10] Update Tor link in frontends (#2369) Co-authored-by: Daniel Gray --- docs/frontends.md | 20 ++++++++++---------- docs/productivity.md | 2 +- 2 files changed, 11 insertions(+), 11 deletions(-) diff --git a/docs/frontends.md b/docs/frontends.md index 329f11c534..01d5ea76a0 100644 --- a/docs/frontends.md +++ b/docs/frontends.md @@ -9,7 +9,7 @@ Sometimes services will try to force you to sign up for an account by blocking a If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have Tor .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. ## TikTok @@ -21,7 +21,7 @@ When you are using an instance run by someone else, make sure to read the privac **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. +There are a number of public instances, with some instances having [Tor](tor.md) onion services support. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} @@ -35,7 +35,7 @@ There are a number of public instances, with some instances having [Tor](https:/

Tip

-ProxiTok is useful if you want to disable JavaScript in your browser, such as [Tor Browser](https://www.torproject.org/) on the Safest security level. +ProxiTok is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level.
@@ -56,7 +56,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - +
Downloads @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -175,7 +175,7 @@ Your subscription list and playlists are saved locally on your Android device.

Warning

-When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -188,7 +188,7 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. +There are a number of public instances, with some instances having [Tor](tor.md) onion services support. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} @@ -210,7 +210,7 @@ Invidious does not proxy video streams by default. Videos watched through Invidi

Tip

-Invidious is useful if you want to disable JavaScript in your browser, such as [Tor Browser](https://www.torproject.org/) on the Safest security level. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Invidious is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/docs/productivity.md b/docs/productivity.md index 5940b53dd5..d0b887eef1 100644 --- a/docs/productivity.md +++ b/docs/productivity.md @@ -172,7 +172,7 @@ In general, we define office suites as applications which could reasonably act a ![PrivateBin logo](assets/img/productivity/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. There is a [list of instances](https://privatebin.info/directory/). +**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} From df824ee0e3b4933fd58816aa31cdec75e5b1ad47 Mon Sep 17 00:00:00 2001 From: jermanuts <109705802+jermanuts@users.noreply.github.com> Date: Sat, 9 Mar 2024 14:42:57 +0000 Subject: [PATCH 09/10] Update Element organization link (#2428) Signed-off-by: Daniel Gray --- docs/real-time-communication.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/real-time-communication.md b/docs/real-time-communication.md index 0555476514..bb96b9c211 100644 --- a/docs/real-time-communication.md +++ b/docs/real-time-communication.md @@ -148,7 +148,7 @@ Messages and files shared in private rooms (those which require an invite) are b [:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/vector-im){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" }
Downloads From ae0800e8ec5e9867f999e95bb8c2b31a37f5ad73 Mon Sep 17 00:00:00 2001 From: kimg45 <138676274+kimg45@users.noreply.github.com> Date: Sat, 9 Mar 2024 15:46:07 +0000 Subject: [PATCH 10/10] remove closing
tag (#2431) Signed-off-by: Daniel Gray --- docs/news-aggregators.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/docs/news-aggregators.md b/docs/news-aggregators.md index e6bfb40562..17438718aa 100644 --- a/docs/news-aggregators.md +++ b/docs/news-aggregators.md @@ -111,8 +111,6 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title=Contribute } -
-
### NetNewsWire