-
-
Notifications
You must be signed in to change notification settings - Fork 316
/
awesome-privacy.yml
5172 lines (4655 loc) · 264 KB
/
awesome-privacy.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
#################################################################################
# Welcome to Awesome Privacy! #
# This file contains all data for all listed categories, sections and services #
# It's used to generate both the README.md and the website, awesome-privacy.xyz #
# #
# USAGE COMMANDS #
# `make validate` - Check this file is valid YAML and fits the schema #
# `make generate` - Generate + insert content into the README.md #
# #
# EDITING #
# Please read the CONTRIBUTING.md before submitting any changes to this file #
# #
# ADDING SERVICE #
# If you're adding a new listing, the following fields are accepted: #
# - name: string (required) - The name of the service #
# - description: string (required) - A brief description of the service #
# - url: string (required) - The URL of the service #
# - github: string - The GitHub repository of the service (user/repo-name) #
# - icon: string - The URL of the service's icon #
# - followWith: string - Some categories need a prefix (e.g. platform) #
# - securityAudited: boolean - Has the service has been publicly audited #
# - openSource: boolean - Whether the service is fully open source #
# - acceptsCrypto: boolean - Whether the service accepts anonymous payment #
# - tosdrId: string - The ID of the service on ToS;DR (find at tosdr.org) #
# #
#################################################################################
# Licensed under CC0-1.0 (C) Alicia Sykes <https://aliciasykes.com> 2019 - 2024 #
#################################################################################
categories:
- name: Essentials
sections:
###############################
###### Password Managers ######
###############################
- name: Password Managers
alternativeTo: ['LastPass', '1Password', 'Dashlane', 'NordPass', 'RoboForm']
services:
- name: Bitwarden
url: https://bitwarden.com
followWith: Self-Hosted
github: bitwarden/server
tosdrId: 1348
androidApp: com.x8bit.bitwarden
iosApp: https://apps.apple.com/us/app/bitwarden-password-manager/id1137397744
subreddit: Bitwarden
description: |
Fully-featured, open source password manager with cloud-sync. Bitwarden is
easy-to-use with a clean UI and client apps for desktop, web and mobile. See
also [Vaultwarden](https://github.com/dani-garcia/vaultwarden), a self-hosted,
Rust implementation of the Bitwarden server and compatible with [upstream
Bitwarden clients](https://bitwarden.com/download/).
- name: KeePass
url: https://keepass.info
openSource: true
subreddit: KeePass
description: |
Hardened, secure and offline password manager. Does not have cloud-sync baked
in, deemed to be [gold standard](https://keepass.info/ratings.html) for secure
password managers. KeePass clients: [Strongbox](https://apps.apple.com/us/app/strongbox-keepass-pwsafe/id897283731)
*(Mac & iOS)*, [KeePassDX](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free)
*(Android)*, [KeeWeb](https://keeweb.info) *(Web-based/ self-hosted)*,
[KeePassXC](https://keepassxc.org) *(Windows, Mac & Linux)*, see more KeePass
clients and extensions at [awesome-keepass](https://github.com/lgg/awesome-keepass)
by @lgg.
- name: LessPass
url: https://lesspass.com
followWith: Self-Hosted
github: lesspass/lesspass
description: |
LessPass is a little different, since it generates your passwords using a hash
of the website name, your username and a single main-passphrase that you reuse.
It omits the need for you to ever need to store or sync your passwords. They
have apps for all the common platforms and a CLI, but you can also self-host it.
- name: Padloc
url: https://padloc.app
github: padloc/padloc
androidApp: app.padloc
iosApp: https://apps.apple.com/us/app/padloc/id1478877043
description: |
A modern, open source password manager for individuals and teams. Beautiful,
intuitive and dead simple to use. Apps available for all platforms and you can
self-host it as well.
- name: ProtonPass
url: https://proton.me/pass
openSource: true
tosdrId: 491
androidApp: proton.android.pass
iosApp: https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629
subreddit: ProtonPass
description: |
From the creators of ProtonMail, ProtonPass is a new addition to their suite of
services. They have a full collection of user-friendly native mobile and desktop
apps. ProtonPass is one of the few "trustworthy" providers that also offers a
free plan.
- name: Pass
url: https://www.passwordstore.org/
icon: https://www.zx2c4.com/favicon.ico
description: The Standard Unix Password Manager
openSource: true
notableMentions:
- name: Password Safe
url: https://www.pwsafe.org
# tosdrId: 3342
# iosApp: https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629
# androidApp: com.jefftharris.passwdsafe
description: >
An offline, open source password manager designed by
[Bruce Schneier](https://www.schneier.com/academic/passsafe/), with native
applications for Windows, Linux, MacOS, Android and iOS, and support for
YubiKey. The UI is a little dated, and there is no official browser extension,
making is slightly less convenient to use compared with other options
- name: PassBolt
url: https://www.passbolt.com
# iosApp: https://apps.apple.com/us/app/passbolt-password-manager/id1569629432
# androidApp: com.passbolt.mobile.android
description: >
A good option for teams. It is free, open source, self-hosted, extensible
and OpenPGP based. It is specifically good for development and DevOps usage,
with integrations for the terminal, browser and chat, and can be easily
extended for custom usage, and deployed quickly with Docker
- name: 1Password
url: https://1password.com
# tosdrId: 1572
# iosApp: https://apps.apple.com/us/app/1password-password-manager/id1511601750
# androidApp: com.onepassword.android
description: >
(proprietary) A fully-featured cross-platform password manager with sync.
Free for self-hosted data (or $3/ month hosted). Be aware that 1Password
is not fully open source, but they do regularly publish results of their
independent [security audits](https://support.1password.com/security-assessments),
and they have a solid reputation for transparently disclosing and fixing vulnerabilities
furtherInfo: >
**Other Open Source PM**: [Buttercup](https://buttercup.pw), [Clipperz](https://clipperz.is),
[Pass](https://www.passwordstore.org), [Padloc](https://padloc.app), [TeamPass](https://teampass.net),
[PSONO](https://psono.com), [UPM](http://upm.sourceforge.net), [Gorilla](https://github.com/zdia/gorilla/wiki),
[Seahorse](https://gitlab.gnome.org/GNOME/seahorse) (for GNOME),
[GNOME Keyring](https://wiki.gnome.org/Projects/GnomeKeyring),
[KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager).
<br /><br />
If you are using a deprecated PM, you should migrate to something actively maintained.
This includes: [Firefox Lockwise](https://www.mozilla.org/en-US/firefox/lockwise),
[Encryptr](https://spideroak.com/personal/encryptr?ref=awesome-privacyr),
[Mitro](https://www.mitro.co), [Rattic](https://spideroak.com/encryptr),
[JPasswords](http://jpws.sourceforge.net/jpasswords.html), [Passopolis](https://passopolis.com),
[KYPS](https://en.wikipedia.org/wiki/KYPS), [Factotum](http://man.9front.org/4/factotum).
#####################################
###### 2-Factor Authentication ######
#####################################
- name: 2-Factor Authentication
alternativeTo: ['Google Authenticator', 'Authy', 'Microsoft Authenticator', 'LastPass Authenticator', 'Duo Mobile']
services:
- name: 2FAS
url: https://2fas.com/
followWith: Android & iOS
github: twofas/2fas-server
tosdrId: 8201
iosApp: https://apps.apple.com/us/app/2fa-authenticator-2fas/id1217793794
androidApp: com.twofasapp
discordInvite: q4cP6qh2g5
icon: https://avatars.githubusercontent.com/u/18189374
description: |
Free, secure and open source authenticator app for both iOS and Android.
Supports creating encrypted backups and syncing between devices without the need for an account.
- name: Aegis
url: https://getaegis.app
followWith: Android
github: beemdevelopment/Aegis
tosdrId: 4076
androidApp: com.beemdevelopment.aegis
icon: https://raw.githubusercontent.com/beemdevelopment/Aegis/master/metadata/en-US/images/icon.png
description: |
Free, secure and open source authenticator app for Android. Has a backup/
restore feature and a customisable UI with dark mode
- name: Authenticator Pro
url: https://authenticatorpro.jmh.me/
icon: https://authenticatorpro.jmh.me/img/icon.svg
followWith: Android
github: jamie-mh/AuthenticatorPro
androidApp: me.jmh.authenticatorpro
description: |
Free and open-source two factor authentication app for Android. It features
encrypted backups, icons, categories and a high level of customisation. It
also has a Wear OS companion app
- name: Tofu
url: https://www.tofuauth.com
followWith: iOS
icon: https://www.tofuauth.com/images/icon.svg
github: iKenndac/Tofu
iosApp: https://apps.apple.com/us/app/tofu-authenticator/id1082229305
tosdrId: 5414
description: |
An easy-to-use, open-source two-factor authentication app designed specifically
for iOS
- name: Authenticator
url: https://mattrubin.me/authenticator
github: mattrubin/Authenticator
icon: https://i.ibb.co/dLqS8ZH/Screenshot-from-2024-02-19-20-47-48.png
iosApp: https://apps.apple.com/us/app/authenticator/id766157276
followWith: iOS
description: |
Simple, native, open source 2-FA Client for iOS, which never connects to the
internet - built by @mattrubin.me
- name: WinAuth
url: https://winauth.github.io/winauth
github: winauth/winauth
icon: https://winauth.github.io/winauth/favicon.ico
followWith: Windows
description: |
Portable, encrypted desktop authenticator app for Microsoft Windows. With
useful features, like hotkeys and some additional security tools, WinAuth is a
great companion authenticator for desktop power-users. It's open source and
well-established (since mid-2010)
- name: Authenticator GNOME
url: https://gitlab.gnome.org/World/Authenticator
icon: https://gitlab.gnome.org/World/Authenticator/-/avatar?width=48
openSource: true
followWith: Linux
description: |
Rust-based OTP authenticator. Has native With GNOME Shell integration. Also
available through [flathub](https://flathub.org/apps/details/com.belmoussaoui.Authenticator).
- name: Authenticator CC
url: https://authenticator.cc
icon: https://authenticator.cc/assets/logo/logo.svg
github: Authenticator-Extension/Authenticator
followWith: BrowserExtension
description: |
Authenticator Extension is an in-browser One-Time Password (OTP) client,
supports both Time-Based One-Time Password (TOTP, specified in [RFC 6238](https://tools.ietf.org/html/rfc6238))
and HMAC-Based One-Time Password (HOTP, specified in [RFC 4226](https://tools.ietf.org/html/rfc4226)).
- name: Ente Auth
url: https://ente.io/auth/
icon: https://raw.githubusercontent.com/ente-io/ente/main/auth/assets/icons/auth-icon.ico
openSource: true
github: ente-io/ente
tosdrId: 5256
iosApp: https://apps.apple.com/us/app/ente-auth/id6444121398
androidApp: io.ente.auth
description: |
Ente Auth is a free and open-source app which stores and generates TOTP tokens.
It can be used with an online account to backup and sync your tokens across your
devices (and access them via a web interface) in a secure, end-to-end encrypted
fashion. It can also be used offline on a single device with no account necessary.
furtherInfo: >
Check which websites support multi-factor authentication: [2fa.directory](https://2fa.directory/)
notableMentions: >
[OTPClient](https://github.com/paolostivanin/OTPClient) *(Linux)*,
[gauth](https://github.com/gbraadnl/gauth) *(Self-Hosted, Web-based)*,
[Etopa](https://play.google.com/store/apps/details?id=de.ltheinrich.etopa) *(Android)*<br>
For KeePass users, [TrayTop](https://keepass.info/plugins.html#traytotp)
is a plugin for managing TOTP's - offline and compatible with Windows, Mac and Linux.
#############################
###### File Encryption ######
#############################
- name: File Encryption
alternativeTo: ['VeraCrypt', 'BitLocker', 'FileVault', 'AxCrypt', 'WinRAR']
services:
- name: VeraCrypt
url: https://www.veracrypt.fr
icon: https://veracrypt.fr/favicon.ico
github: veracrypt/VeraCrypt
description: |
VeraCrypt is open source cross-platform disk encryption software. You can use
it to either encrypt a specific file or directory, or an entire disk or
partition. VeraCrypt is incredibly feature-rich, with comprehensive encryption
options, yet the GUI makes it easy to use. It has a CLI version, and a portable
edition. VeraCrypt is the successor of (the now deprecated) TrueCrypt.
- name: Cryptomator
url: https://cryptomator.org
icon: https://avatars.githubusercontent.com/u/11850518
github: cryptomator/cryptomator
tosdrId: 4403
iosApp: https://apps.apple.com/us/app/cryptomator/id1560822163
androidApp: org.cryptomator
description: |
Open source client-side encryption for cloud files - Cryptomator is geared
towards using alongside cloud-backup solutions, and hence preserves individual
file structure, so that they can be uploaded. It too is easy to use, but has
fewer technical customizations for how the data is encrypted, compared with
VeraCrypt. Cryptomator works on Windows, Linux and Mac - but also has excellent
mobile apps.
- name: age
url: https://age-encryption.org
github: FiloSottile/age
icon: https://i.ibb.co/H7hHddf/logo-white.png
description: |
`age` is a simple, modern and secure CLI file encryption tool and Go library.
It features small explicit keys, no config options, and UNIX-style composability
- name: Picocrypt
github: Picocrypt/Picocrypt
icon: https://avatars.githubusercontent.com/u/171401041
description: |
Picocrypt is a very small (hence Pico), very simple, yet very secure encryption tools
that you can use to protect your files. It's designed to be the go-to tool for encryption,
with a focus on security, simplicity, and reliability.
wordOfWarning: >
Where possible, choose a cross-platform and well established encryption method,
so that you are never faced with not being able to access your files using your current system.<br>
Although well-established encryption methods are usually very secure,
if the password is not strong, then an adversary may be able to gain access to your files,
with a powerful enough GPU.
If your system is compromised, then the password may also be able to be
skimmed with a keylogger or other similar malware, so take care to follow
good basic security practices
notableMentions:
- name: AES Crypt
url: https://www.aescrypt.com/
description: >
A light-weight and easy file encryption utility.
It includes applications for Windows, Mac OS, BSD and Linux, all of which can be
interacted with either through the GUI, CLI or programatically though an API
(available for Java, C, C# and Python). Although it is well established,
with an overall positive reputation, there have been some
[security issues](https://www.reddit.com/r/privacytoolsIO/comments/b7riov/aes_crypt_security_audit_1_serious_issue_found/)
raised recently.
- name: CryptSetup
url: https://gitlab.com/cryptsetup/cryptsetup
description: >
is a convenient
layer for use on top of [dm-crypt](https://wiki.archlinux.org/index.php/Dm-crypt).
[EncFS](https://github.com/vgough/encfs) is a cross-platform file-based encryption module,
for use within user local directories. [geli](https://www.freebsd.org/cgi/man.cgi?query=geli&sektion=8)
is a disk encryption subsystem included with FreeBSD.
- name: BitLocker
url: https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview
description: >
is popular among Microsoft Windows and enterprise users, and provides fast,
efficient and (if correctly configured) reasonably secure full drive encryption.
However it is not open source, has poor compatibility with other operating systems,
and has some very dodgy [defaults](https://www.diskcryptor.org/why-not-bitlocker/),
which could lead to your system being compromised. Similarly, Apple's
[FileVault](https://support.apple.com/en-us/HT204837) on MacOS is easy and secure,
but again, the source code is proprietary.
- name: DiskCryptor
url: https://www.diskcryptor.org/
description: |
Windows-only, open source, file and volume encryption solution,
that makes a good alternative to BitLocker.
######################
###### Browsers ######
######################
- name: Browsers
alternativeTo: ['Chrome', 'Safari', 'Firefox', 'Edge', 'Opera']
services:
- name: LibreWolf
icon: https://librewolf.net/icon.svg
url: https://librewolf.net
openSource: true
tosdrId: 6389
description: |
LibreWolf is an independent fork of Firefox that aims to provide better default
settings to improve on privacy, security and user freedom. Mozilla telemetry is
disabled, ties with Google (Safe Browsing) are severed, the content blocker
[uBlock Origin](https://github.com/gorhill/uBlock) is included and privacy
defaults are guided by research like the
[Arkenfox project](https://github.com/arkenfox/user.js/).
- name: Brave Browser
url: https://brave.com
icon: https://brave.com/static-assets/images/brave-logo-sans-text.svg
github: brave/brave-browser
tosdrId: 1487
description: |
Brave Browser, currently one of the most popular private browsers - it provides
speed, security, and privacy by blocking trackers with a clean, yet fully-featured
UI. It also pays you in [BAT tokens](https://basicattentiontoken.org/) for using it.
Brave also has Tor built-in, when you open up a private tab/ window.
- name: Firefox
url: https://www.mozilla.org/firefox
icon: https://www.mozilla.org/media/protocol/img/logos/firefox/logo.fedb52c912d6.svg
openSource: true
tosdrId: 188
description: |
Significantly more private, and offers some nifty privacy features than Chrome,
Internet Explorer and Safari. After installing, there are a couple of small tweaks
you will need to make, in order to secure Firefox. For a though config, see
[@arkenfox's user.js](https://github.com/arkenfox/user.js/). You can also follow
one of these guides by: [Restore Privacy](https://restoreprivacy.com/firefox-privacy/)
or [12Bytes](https://codeberg.org/12bytes/firefox-config-guide)
- name: Tor Browser
url: https://www.torproject.org/
icon: https://www.torproject.org/static/images/favicon/favicon.ico
openSource: true
tosdrId: 2845
androidApp: org.torproject.torbrowser
description: |
Tor provides an extra layer of anonymity, by encrypting each of your requests, then
routing it through several nodes, making it near-impossible for you to be tracked by
your ISP/ provider. It does make every-day browsing a little slower, and some sites
may not work correctly. As with everything there are
[trade-offs](https://github.com/Lissy93/personal-security-checklist/issues/19)
- name: Cromite
url: https://www.cromite.org/
icon: https://camo.githubusercontent.com/fc003f5ff33669908e7b929692fdbb8d10ec7df5ffa5e02e4d9becf405dd7804/68747470733a2f2f7777772e63726f6d6974652e6f72672f6170705f69636f6e2e706e67
github: uazo/cromite
description: |
Cromite is a Chromium fork based on Bromite with built-in support for ad blocking and an eye for privacy.
notableMentions: >
**Mobile Browsers**: [Mull](https://f-droid.org/en/packages/us.spotco.fennec_dos/) Hardened fork of FF-Fenix (Android),
[Firefox Focus](https://support.mozilla.org/en-US/kb/focus) (Android/ iOS),
[DuckDuckGo Browser](https://help.duckduckgo.com/duckduckgo-help-pages/mobile/ios/) (Android/ iOS),
[Orbot](https://guardianproject.info/apps/orbot/) + [Tor](https://www.torproject.org/download/#android) (Android),
[Onion Browser](https://onionbrowser.com/) (iOS)<br><br>
**Additional Desktop**: [Nyxt](https://nyxt.atlas.engineer/), [WaterFox](https://www.waterfox.net), [Epic Privacy Browser](https://www.epicbrowser.com), [PaleMoon](https://www.palemoon.org), [Iridium](https://iridiumbrowser.de/), [Sea Monkey](https://www.seamonkey-project.org/), [Ungoogled-Chromium](https://github.com/Eloston/ungoogled-chromium), [Basilisk Browser](https://www.basilisk-browser.org/) and [IceCat](https://www.gnu.org/software/gnuzilla/)
12Bytes also maintains a list privacy & security [extensions](https://12bytes.org/articles/tech/firefox/firefox-extensions-my-picks/)
wordOfWarning: >
New vulnerabilities are being discovered and patched all the time - use a browser
that is being actively maintained, in order to receive these security-critical updates.<br>
Even privacy-respecting browsers, often do not have the best privacy options enabled by default.
After installing, check the privacy & security settings, and update the configuration to
something that you are comfortable with. 12Bytes maintains a comprehensive guide on
[Firefox Configuration for Privacy and Performance](https://codeberg.org/12bytes/firefox-config-guide)
############################
###### Search Engines ######
############################
- name: Search Engines
alternativeTo: ['Google', 'Bing', 'Yahoo', 'Baidu', 'Yandex']
services:
- name: DuckDuckGo
url: https://duckduckgo.com
icon: https://duckduckgo.com/favicon.png
openSource: true
tosdrId: 222
iosApp: https://apps.apple.com/us/app/duckduckgo-private-browser/id663592361
androidApp: com.duckduckgo.mobile.android
subreddit: duckduckgo
description: |
DuckDuckGo is a very user-friendly, fast and secure search engine. It's totally
private, with no trackers, cookies or ads. It's also highly customisable, with
dark-mode, many languages and features. They even have a [.onion](https://3g2upl4pq6kufc4m.onion)
URL, for use with Tor and a [no Javascript version](https://duckduckgo.com/html/)
- name: Qwant
url: https://www.qwant.com
icon: https://avatars.githubusercontent.com/u/1692504
iosApp: https://apps.apple.com/us/app/qwant-private-search/id924470452
androidApp: com.qwant.liberty
subreddit: Qwant
tosdrId: 527
description: |
French service that aggregates Bings results, with its own results. Qwant doesn't
plant any cookies, nor have any trackers or third-party advertising. It returns
non-biased search results, with no promotions. Qwant has a unique, but nice UI.
- name: Startpage
url: https://www.startpage.com
icon: https://www.startpage.com/favicon.ico
tosdrId: 418
openSource: false
description: |
Dutch search engine that searches on Google and shows the results (slightly
rearranged). It has several configurations that improve privacy during use
(it is not open source)
- name: Brave Search
url: https://search.brave.com/
icon: https://i.ibb.co/GH1n4wf/Brave-Search-Icon.png
description: >-
Brave Search is a privacy-focused search engine that does not track users or
their searches, does not use secret algorithms or user profiling, and is
based on its own search index.
github: brave/brave-browser
tosdrId: 1487
iosApp: https://apps.apple.com/us/app/brave-private-browser-adblock/id1052879175
androidApp: com.brave.browser
discordInvite: ''
subreddit: brave_browser
openSource: true
securityAudited: true
acceptsCrypto: false
- name: Mojeek
url: https://mojeek.com
icon: https://www.mojeek.com/favicon.png
openSource: false
tosdrId: 2432
iosApp: https://apps.apple.com/gb/app/mojeek/id1505807785
androidApp: mojeek.app
subreddit: mojeek
description: |
British search engine providing independent and unbiased search results using
its own crawler. Has a zero tracking policy (it is not open source)
notableMentions:
- name: MetaGear
url: https://metager.org
- name: YaCy
url: https://yacy.net
- name: Searx
url: https://github.com/searxng/searxng
description: >
Self-hostable search engines that use the results of multiple other
engines (such as Google and Bing) at the same time. They're open source
and self-hostable, although using a [public instance](https://searx.space)
has the benefit of not singling out your queries to the engines used.
A fork of the original [Searx](https://searx.github.io/searx/).
- name: Communication
sections:
#################################
###### Encrypted Messaging ######
#################################
- name: Encrypted Messaging
alternativeTo: ['whatsapp', 'facebook messenger', 'wechat', 'telegram', 'snapchat', 'viber', 'line', 'discord']
services:
- name: Signal
url: https://signal.org
openSource: true
github: signalapp/Signal-Server
tosdrId: 528
iosApp: https://apps.apple.com/us/app/signal-private-messenger/id874139669
androidApp: org.thoughtcrime.securesms
icon: https://signal.org/assets/images/favicon/android-chrome-192x192.png
subreddit: signal
description: |
Probably one of the most popular, secure private messaging apps that combines
strong encryption (see [Signal Protocol](https://en.wikipedia.org/wiki/Signal_Protocol))
with a simple UI and plenty of features. It's widely used across the world, and
easy-to-use, functioning similar to WhatsApp - with instant messaging, read-receipts,
support for media attachments and allows for high-quality voice and video calls.
It's cross-platform, open-source and totally free. Signal is
[recommended](https://twitter.com/Snowden/status/661313394906161152)
by Edward Snowden, and is a perfect solution for most users.
- name: Session
url: https://getsession.org
icon: https://getsession.org/favicon.ico
openSource: true
tosdrId: 3015
github: oxen-io/lokinet
subreddit: Session_Messenger
androidApp: network.loki.messenger
iosApp: https://apps.apple.com/us/app/session-private-messenger/id1470168868
description: |
Session is a fork of Signal, however unlike Signal it does not require a mobile
number (or any other personal data) to register, instead each user is identified
by a public key. It is also decentralized, with servers being run by the community
though [Loki Net](https://loki.network), messages are encrypted and routed through
several of these nodes. All communications are E2E encrypted, and there is no
meta data.
- name: XMPP
url: https://xmpp.org
icon: https://xmpp.org/favicon.ico
openSource: true
github: xsf/xmpp.org
description: |
XMPP, also known as Jabber, is an open standard for decentralized messaging that
has been widely used for decades. It has actually been the basis upon which
WhatsApp, Facebook's Chat and Google's Talk were built, but these companies
(eventually) chose to remove the interoperability with other servers. Prominent
XMPP clients support [OMEMO end-to-end encryption](https://en.wikipedia.org/wiki/OMEMO),
which is based on the [Double Ratchet Algorithm](https://en.wikipedia.org/wiki/Double_Ratchet_Algorithm)
that is used in Signal. For more hands-on information and to register an account
you can visit [JoinJabber](https://joinjabber.org).
- name: Matrix
url: https://matrix.org
icon: https://matrix.org/assets/favicon.ico
openSource: true
tosdrId: 2455
github: matrix-org/dendrite
description: |
Matrix is a decentralized open network for secure communications, with E2E
encryption with Olm and Megolm. Along with the [Element](https://element.io/)
client, it supports VOIP + video calling and IM + group chats. Since Matrix has
an open specification and Simple pragmatic RESTful HTTP/JSON API it makes it easy
to integrates with existing 3rd party IDs to authenticate and discover users, as
well as to build apps on top of it.
notableMentions:
- name: Chat Secure
url: https://chatsecure.org
- name: KeyBase
url: https://keybase.io/
description: >
Allows encrypted real-time chat, group chats, and public and
private file sharing. It also has some nice features around cryptographically
proving social identities, and makes PGP signing, encrypting and decrypting messages easy.
However, since it was [acquired by Zoom](https://keybase.io/blog/keybase-joins-zoom) in 2020,
it has no longer been receiving regular updates.
- name: OpenPGP
url: https://www.openpgp.org
description: >
can be used over existing chat networks (such as email or message boards).
It provides cryptographic privacy and authentication, PGP is used to encrypt messages.<br />
**Note/ Issues with PGP** PGP is [not easy](https://restoreprivacy.com/let-pgp-die/)
to use for beginners, and could lead to human error/ mistakes being made,
which would be overall much worse than if an alternate, simpler system was used.
Do not use [32-bit key IDs](https://evil32.com/) - they are too short to be secure.
There have also been vulnerabilities found in the OpenPGP and S/MIME,
defined in [EFAIL](https://efail.de/), so although it still considered
secure for general purpose use, for general chat, it may be better to
use an encrypted messaging or email app instead.
wordOfWarning: >
Many messaging apps claim to be secure, but if they are not open source,
then this cannot be verified - and they **should not be trusted**.
This applies to [Telegram](https://telegram.org), [Threema](https://threema.ch),
[Cypher](https://www.goldenfrog.com/cyphr), [Wickr](https://wickr.com/),
[Silent Phone](https://www.silentcircle.com/products-and-solutions/silent-phone/)
and [Viber](https://www.viber.com/), to name a few - these apps should not
be used to communicate any sensitive data.
[Wire](https://wire.com/) has also been removed, due to
a [recent acquisition](https://blog.privacytools.io/delisting-wire/)
###########################
###### P2P Messaging ######
###########################
- name: P2P Messaging
intro: >
With [Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer) networks,
there are no central server, so there is nothing that can be raided,
shut-down or forced to turn over data. There are P2P networks available
that are open source, E2E encrypted, routed through Tor services,
totally anonymous and operate without the collection of metadata.
services:
- name: Oxen
url: https://oxen.io/
github: oxen-io/lokinet
tosdrId: 6622
icon: https://oxen.io/favicon.ico
description: |
Oxen (previously Loki) is an open source set of tools that allow users to transact
and communicate anonymously and privately, through a decentralised, encrypted,
onion-based network.
Session is a desktop and mobile app that uses these private routing protocols to
secure messages, media and metadata.
- name: Briar
url: https://briarproject.org
icon: https://briarproject.org/img/briar_logo_circle.png
androidApp: org.briarproject.briar.android
openSource: true
tosdrId: 2559
description: |
Tor-based Android app for P2P encrypted messaging and forums. Where content is
stored securely on your device (not in the cloud). It also allows you to connect
directly with nearby contacts, without internet access (using Bluetooth or WiFi).
- name: Ricochet Refresh
url: https://www.ricochetrefresh.net
openSource: true
github: blueprint-freespeech/ricochet-refresh
icon: https://www.ricochetrefresh.net/apple-touch-icon.png
followWith: Desktop
description: |
Desktop instant messenger, that uses the Tor network to rendezvous with your
contacts without revealing your identity, location/ IP or meta data. There are
no servers to monitor, censor, or hack so Ricochet is secure, automatic and easy
to use.
- name: Jami
url: https://jami.net
icon: https://jami.net/assets/images/favicon/apple-touch-icon-57x57.png
github: savoirfairelinux/jami-project
iosApp: https://apps.apple.com/ca/app/jami/id1306951055
androidApp: cx.ring
description: |
P2P encrypted chat network with cross-platform GNU client apps. Jami supports
audio and video calls, screen sharing, conference hosting and instant messaging.
- name: Tox & qTox client
url: https://tox.chat
icon: https://tox.chat/theme/img/favicon.ico
openSource: true
subreddit: projecttox
followWith: Desktop
description: |
Open source, encrypted, distributed chat network, with clients for desktop and
mobile - see [supported clients](https://tox.chat/clients.html). Clearly documented
code and multiple language bindings make it easy for developers to integrate with
Tox.
notableMentions:
- name: Cwtch
url: https://cwtch.im
- name: BitMessage
url: https://github.com/Bitmessage/PyBitmessage
- name: RetroShare
url: https://retroshare.cc
#############################
###### Encrypted Email ######
#############################
- name: Encrypted Email
alternativeTo: ['gmail', 'outlook', 'yahoo mail', 'icloud mail', 'aol mail', 'zoho mail']
intro: >
Email is not secure - your messages can be easily intercepted and read.
Corporations scan the content of your mail, to build up a profile of you,
either to show you targeted ads or to sell onto third-parties.
Through the [Prism Program](https://en.wikipedia.org/wiki/PRISM_(surveillance_program)),
the government also has full access to your emails (if not end-to-end encrypted) -
this applies to Gmail, Outlook Mail, Yahoo Mail, GMX, ZoHo, iCloud, AOL and more.<br><br>
For a more details comparison of email providers, see
[email-comparison.as93.net](https://email-comparison.as93.net/)
services:
- name: ProtonMail
url: https://protonmail.com
icon: https://proton.me/favicons/android-chrome-192x192.png
openSource: false
github: ProtonMail/WebClients
tosdrId: 491
androidApp: ch.protonmail.android
iosApp: https://apps.apple.com/us/app/proton-mail-encrypted-email/id979659905
subreddit: ProtonMail
description: |
An end-to-end encrypted anonymous email service. ProtonMail has a
modern easy-to-use and customizable UI, as well as fast, secure native mobile
apps. ProtonMail has all the features that you'd expect from a modern email
service and is based on simplicity without sacrificing security. It has a free
plan or a premium option for using custom domains (starting at $5/month).
ProtonMail requires no personally identifiable information for signup, they have
a [.onion](https://protonirockerxow.onion) server, for access via Tor, and they
accept anonymous payment: BTC and cash (as well as the normal credit card and PayPal).
- name: Tuta
icon: https://tuta.com/resources/favicon/logo-favicon.svg
openSource: true
github: tutao/tutanota
tosdrId: 157
url: https://tuta.com
subreddit: tutanota
androidApp: de.tutao.tutanota
iosApp: https://apps.apple.com/us/app/encrypted-email-tuta/id922429609
description: |
Free and open source email service based in Germany. It has a basic intuitive UI,
secure native mobile apps and desktop email clients, anonymous signup, and an encrypted calendar. Tuta has a
full-featured free plan and premium subscription plans allowing for
custom domains (starting at $3/month). Tuta
[does not use OpenPGP](https://tuta.com/blog/posts/differences-email-encryption/)
like other encrypted mail providers, instead they use a standardized, hybrid method
consisting of symmetrical and asymmetrical algorithms (with AES256, and RSA 2048
or ECC (x25519) and Kyber-1024). This causes compatibility issues when communicating with contacts
using PGP. But it does allow them to encrypt much more of the header data (body,
attachments, subject lines, and sender names etc) which PGP mail providers cannot do. The recent upgrades
to Tuta's encryption algorithm makes data stored and sent with their service safe against attacks
posed by quantum computers.
- name: Forward Email
url: https://forwardemail.net
icon: https://forwardemail.net/img/android-chrome-192x192.png
github: forwardemail/free-email-forwarding
openSource: true
description: |
An open source, privacy-focused, encrypted email service supporting SMTP, IMAP, and API access
- name: Mailfence
url: https://mailfence.com?src=digitald
icon: https://mailfence.com/c/mailfence/images/favicon/android-chrome-192x192.png
openSource: false
tosdrId: 1694
subreddit: Mailfence
androidApp: com.contactoffice.mailfence
iosApp: https://apps.apple.com/us/app/mailfence/id1628808776
description: |
Mailfence supports OpenPGP so that you can manually exchange encryption keys
independently from the Mailfence servers, putting you in full control. Mailfence
has a simple UI, similar to that of Outlook, and it comes with bundled with
calendar, address book, and files. All mail settings are highly customizable,
yet still clear and easy to use. Sign up is not anonymous, since your name, and
prior email address is required. There is a fully-featured free plan, or you can
pay for premium, and use a custom domain ($2.50/ month, or $7.50/ month for 5
domains), where Bitcoin, LiteCoin or credit card is accepted.
- name: MailBox.org
url: https://mailbox.org
icon: https://i.ibb.co/zJtHBTZ/mailfence.png
openSource: false
tosdrId: 1517
subreddit: Mailbox_org
description: |
A Berlin-based, eco-friendly secure mail provider. There is no free plan, the
standard service costs €12/year. You can use your own domain, with the option of
a [catch-all alias](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain).
They provide good account security and email encryption, with OpenPGP, as well as
encrypted storage. There is no dedicated app, but it works well with any standard
mail client with SSL. There's also currently no anonymous payment option.
notableMentions:
- name: HushMail
url: https://www.hushmail.com
- name: Soverin
url: https://soverin.net
- name: StartMail
url: https://www.startmail.com
- name: Posteo
url: https://posteo.de
- name: Disroot
url: https://disroot.org/en
wordOfWarning: |
- When using an end-to-end encryption technology like OpenPGP, some metadata
in the email header will not be encrypted.
- OpenPGP also does not support Forward secrecy, which means if either
your or the recipient's private key is ever stolen, all previous messages
encrypted with it will be exposed. You should take great care to keep your
private keys safe.
###########################
###### Email Clients ######
###########################
- name: Email Clients
alternativeTo: ['microsoft outlook', 'apple mail', 'thunderbird', 'em client', 'mailbird', 'postbox']
intro: >
Email clients are the programs used to interact with the mail server.
For hosted email, then the web and mobile clients provided by your email
service are usually adequate, and may be the most secure option.
For self-hosted email, you will need to install and configure mail clients for web, desktop or mobile.
A benefit of using an IMAP client, is that you will always have an offline backup of all email messages
(which can then be encrypted and archived), and many applications let you aggregate multiple mailboxes
for convenience. Desktop mail clients are not vulnerable to the common browser attacks, that their web
app counterparts are.
services:
- name: Mozilla Thunderbird
url: https://www.thunderbird.net
icon: https://www.thunderbird.net/media/img/thunderbird/ios-icon-180.png
subreddit: Thunderbird
openSource: true
tosdrId: 3365
description: |
Free and open source email application developed and backed by Mozilla -it's secure,
private easy and customizable. As of V 78.2.1 encryption is built in, and the
[TorBirdy](https://trac.torproject.org/projects/tor/wiki/torbirdy) extension routes
all traffic through the Tor network. Forks, such as
[Betterbird](https://github.com/Betterbird/thunderbird-patches) may add additional features.
- name: eM Client
url: https://www.emclient.com
icon: https://www.emclient.com/favicon.ico
tosdrId: 432
androidApp: com.emclient.mailclient
iosApp: https://apps.apple.com/us/app/em-client/id1561166404
description: |
Productivity-based email client, for Windows and MacOS. eM Client has a clean user
interface, snappy performance and good compatibility. There is a paid version, with
some handy features, including snoozing incoming emails, watching for replies for a
specific thread, message translation, send later, and built-in Calendar, Tasks,
Contacts and Notes. Note, eM Client is proprietary, and not open source.
- name: SnappyMail
url: https://snappymail.eu
icon: https://snappymail.eu/static/img/logo-256x256.png
github: the-djmaze/snappymail
description: |
Simple, modern, fast web-based mail client. This is an IMAP-only fork of
[RainLoop](http://www.rainloop.net) that mitigates a severe
[RainLoop vulnerability](https://thehackernews.com/2022/04/unpatched-bug-in-rainloop-webmail-could.html)
and adds several new [features](https://snappymail.eu/comparison).
- name: RoundCube
url: https://roundcube.net
icon: https://roundcube.net/images/roundcube_logo_icon.svg
github: roundcube/roundcubemail
description: |
Browser-based multilingual IMAP client with an application-like user interface. It
provides full functionality you expect from an email client, including MIME support,
address book, folder manipulation, message searching and spell checking.
- name: FairEmail
url: https://email.faircode.eu
icon: https://raw.githubusercontent.com/M66B/FairEmail/master/app/src/main/ic_launcher-web.png
github: M66B/FairEmail
androidApp: eu.faircode.email
description: |
Open source, fully-featured and easy mail client for Android. Supports unlimited
accounts and email addresses with the option for a unified inbox. Clean user
interface, with a dark mode option, it is also very lightweight and consumes minimal
data usage.
- name: K-9 Mail
url: https://k9mail.app
icon: https://k9mail.app/assets/img/k9-logo.svg
github: thunderbird/thunderbird-android
tosdrId: 3624
androidApp: com.fsck.k9
description: |
K-9 (or Thunderbird for Android) is open source,
very well supported and trusted - k9 has been around for nearly
as long as Android itself! It supports multiple accounts, search, IMAP push email,
multi-folder sync, flagging, filing, signatures, BCC-self, PGP/MIME & more. Install
OpenKeychain along side it, in order to encrypt/ decrypt emails using OpenPGP.
wordOfWarning: >
One disadvantage of mail clients, is that many of them do not support 2FA,
so it is important to keep your device secured and encrypted
#############################
###### Mail Forwarding ######
#############################
- name: Mail Forwarding
intro: >
Revealing your real email address online can put you at risk.
Email aliasing allows messages to be sent to [anything]@my-domain.com and
still land in your primary inbox. This protects your real email address
from being revealed.
Aliases are generated automatically, the first time they are used.
This approach lets you identify which provider leaked your email address,
and block an alias with 1-click.
services:
- name: Addy
url: https://addy.io
icon: https://addy.io/apple-touch-icon.png
github: anonaddy/anonaddy
tosdrId: 2220
iosApp: https://apps.apple.com/us/app/addymanager/id1547461270
androidApp: com.khalidwar.anonaddy
description: |
An open source anonymous email forwarding service, allowing you to
create unlimited email aliases. Has a free plan.
- name: 33Mail
url: http://33mail.com
icon: https://33mail.com/favicon.ico
openSource: false
tosdrId: 8301
description: |
A long-standing aliasing service. As well as receiving, 33Mail also lets you reply
to forwarded addresses anonymously. Free plan, as well as Premium plan ($1/ month)
if you'd like to use a custom domain. Note that 33Mail usese Google Analytics.
- name: SimpleLogin
url: https://simplelogin.io
openSource: true
icon: https://simplelogin.io/favicon.ico
tosdrId: 2552
androidApp: io.simplelogin.android
iosApp: https://apps.apple.com/us/app/simplelogin-email-alias/id1494359858
description: |
Fully open source (view on [GitHub](https://github.com/simple-login)) alias service
with many additional features. Can be self-hosted, or the managed version has a free
plan, as well as hosted premium option ($2.99/ month) for using custom domains.
- name: Firefox Private Relay
url: https://relay.firefox.com
icon: https://relay.firefox.com/favicon.svg
openSource: true
github: mozilla/fx-private-relay
tosdrId: 4158
description: |
Developed and managed by Mozilla, Relay is a Firefox addon, that lets you make an
email alias with 1 click, and have all messages forwarded onto your personal email.
Relay is totally free to use, and very accessible to less experienced users, but also
[open source](https://github.com/mozilla/fx-private-relay), and able to me self-hosted
for advanced usage.
- name: ForwardEmail
url: https://forwardemail.net
icon: https://forwardemail.net/img/android-chrome-192x192.png
github: forwardemail/free-email-forwarding
description: |
Simple open source catch-all email forwarding service. Easy to self-host (see on
[GitHub](https://github.com/forwardemail/free-email-forwarding)), or the hosted version
has a free plan as well as a ($3/month) premium plan.
- name: ProtonMail
followWith: Professional plan or higher
url: https://protonmail.com/pricing
icon: https://proton.me/favicons/android-chrome-192x192.png
tosdrId: 491
openSource: true
description: |
If you already have ProtonMail's Professional (€8/month) or Visionary (€30/month) package,
then an implementation of this feature is available via the Catch-All Email feature.
##################################
###### Mail Security Tools ######
#################################
- name: Email Security Tools
alternativeTo: ['boomerang', 'mailtrack', 'grammarly for email', 'wisestamp', 'hubspot sales']
services:
- name: Enigmail
url: https://www.enigmail.net
icon: https://upload.wikimedia.org/wikipedia/commons/5/50/Enigmail_logo_2018.svg
description: |
Mail client add-on, enabling the use of OpenPGP to easily encrypt, decrypt,
verify and sign emails. Free and open source, Enigmail is compatible with Interlink
Mail & News and Postbox. Their website contains thorough documentation and