Encryption Against Mass Surveillance
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.
Best Privacy Tools and Alternatives
Privacy-enhancing Services
Cryptocurrency Tools and Services
Improve the privacy of your friends & family by sharing this website
For easy copy & paste on social media platforms, messengers and emails.Web Browsers for better Internet Privacy
Firefox: Reliable, fast and privacy friendly
It's recommended to install additional browser addons to strengthen Firefox even more. Firefox is able to sync accross all your devices on different platforms. Firefox is not the perfect out of the box solution but It's definetly worth it to take the extra time and setup Firefox properly.
Check for WebRTC & DNS leaks and learn how to fix them with the connection check at mullvad.net.
Hardening & Tweaking: The default settings of Firefox are not the best choice to be a privacy respecting browser. Use Firefox Profilemaker to adjust the settings. An alternative is to download the hardened Arkenfox's user.js - Place this in your Firefox's user.js directory and it will fix everything for you. You can also do it manually.
Tor: Encrypted out of the box for extra privacy and anonymity
Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy. It's not recommended to install additional browser addons. Plugins or addons may bypass Tor or compromise your privacy.
Tutorials: Installing, Tor Bridges, Gaining Anonymity and Tracking via anonymized Tor/VPN traffic.
Brave: Fast, cross-platform and block ads & trackers
Not a popular choice within the privacy community but it offers a complete package out of the box on all platforms and is suitable for beginners or if setup time is a factor at the given situation. Wikipedia offers more information about it's controversies.
Android and iOS - DuckDuckGo: Privacy Browser
Built-in advertising trackers blocking, private search and forces sites to use an encrypted connection if available.
Android - Bromite: Based on Chromium
Chromium browser with privacy and security enhancements, built-in adblocking and DNS over HTTPS support.
iOS - Onion Browser: Connection to the Tor Network
There are certain anonymity-related issues with Onion Browser due to iOS limitations.
Privacy related browser checks:
- BrowserLeaks.com: A wide range of security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.
- LocateJS: Predicts your location by analyzing your connection and system data. This scan allows you to understand how your location can be pinpointed even while using a VPN, location spoofer or private mode.
- ipleak.net: Supports checks for WebRTC leaks, DNS leaks, Geolocation, Torrent Address detection and more.
- Cover Your Tracks by EFF.org: Test your browser to see how well you are protected from tracking and fingerprinting. It shows your browser’s most unique and identifying characteristics. Less unique is better.
- PrivacyTests.org: Open-source tests of web browser privacy. A useful resource for comparing browsers.
More Information:
- How does HTTPS / Browser Encryption work?
- Your first choice for better internet privacy: Firefox Browser
“If you want to keep a secret, you must also hide it from yourself.” ― George Orwell, 1984
Browser Addons to improve your internet privacy even further
uBlock Origin: Block Ads and Trackers
It's recommended to use this plugin with Firefox, but it's also available for other browsers. Firefox on Android supports also uBlock Origin plugin.
HTTPS Everywhere: Secure Connections
This plugin is already included in Brave (Desktop & Mobile), Tor (Desktop & Android) and Onion Browser (iOS only). It can be installed for Firefox on Android. Most browsers support HTTPS already after activation.
We are not linking to the plugin directly anymore, instead straight to the Tutorial of EFF.org on how to activate HTTPS in every browser. After the end of this year, the extension will be in “maintenance mode.” for 2022.
Decentraleyes: Block Content Delivery Networks
Emulates Content Delivery Networks locally by intercepting requests and injecting it into the environment. Automatically, and no configuration required. Can be installed for Firefox on Android.
ClearURLs: Automatically remove tracking elements from URLs
Removes tracking from URLs automatically in the background. Lightweight and useful.
xBrowserSync: Encrypted bookmarks across devices and browsers
No sign up is required and no personal data is ever collected. To start syncing simply download xBrowserSync for your desktop browser or mobile platform, enter an encryption password and click Create New Sync!
Cookie AutoDelete: Automatically Delete Cookies
When a tab closes, any cookies not being used are automatically deleted. Keep the ones you trust (forever/until restart) while deleting the rest. Also available for Chrome.
“If you want to keep a secret, you must also hide it from yourself.” ― George Orwell, 1984
The best and most reliable VPN Services for your Privacy
We have compared 185 different VPN providers, but our strict criteria left only the three best providers. Our recommended providers are operating outside the USA or other Five Eyes countries, use a strong encryption, accept Crypto currencies or cash payments, support OpenVPN, have a no logging policy and have a long history of operating.
Mullvad: 60 Euro Yearly
Based in Sweden. Operating since 2009. Accepts Bitcoin, BCH and Cash. Native desktop and mobile clients are available for Android and iOS and are easy to use. Money back guarantee for 30 days.
Amount of servers in Oct 2021: 763 VPN servers, in 38 different countries. Source
ProtonVPN: Limited free version available, otherwise 48 EUR Yearly
Based in Switzerland. Operating since 2016. Accepts Bitcoin, but you need an existing account or contact their support team in advance. Easy to use native desktop and mobile clients are available for Android and iOS.
Amount of servers in Oct 2021: 1200+ VPN servers available in 55 different countries. Source
IVPN: 60 USD Yearly
Based in Gibraltar. Operating since 2009. Accepts Bitcoin, Monero and Cash. Native desktop and mobile clients are available for Android and iOS and are easy to use. Money back guarantee for 30 days.
Amount of servers in Oct 2021: 139 VPN servers available in 32 different countries. Source
More Information:
- A Complete Guide to Virtual Private Networks (VPNs)
- How is the Five Eyes Intelligence Alliance Related to Your Privacy?
Friendly reminder
Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. If you are looking for anonymity, you should use the Tor Browser instead of a VPN. Don't replace good security practices with a VPN service. If you're looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you.
“WAR IS PEACE.” ― Ministry of Truth
Private Email Providers
ProtonMail: Secure email for the independent professional
Based in Switzerland, founded in 2013. Free and paid plans include all security features, including end-to-end encryption, zero-access encryption, anti-phishing, anti-spam and 2FA. Own Android, iOS Apps and web interface. Paid plans enable custom domains. Accessible via Tor Network.
Tutanota: Easy to use and private by design
Based in Germany, founded in 2011. Native cross platform apps available. Paid plans enable custom domains. No third-party email clients are supported, users need to use the wide range of native apps.
Disroot: Secure email for your desktop client or via a web interface
Based in The Netherlands, founded in 2015. Free plans support custom domains. Users can choose between their web client or third party desktop clients like Thunderbird. Disroot allows for encrypted emails to be sent from their webmail application using OpenPGP.
mailbox.org: Secure e-mail inbox 100% powered by eco-friendly energy
Based in Germany, founded in 2014. Paid plans enable custom domains. Users can choose between their web client or third party desktop clients like Thunderbird.
StartMail: Trusted and reliable encrypted email provider
Based in The Netherlands, founded in 2014. Paid plans enable custom domains. Users can choose between their web client or third party desktop clients like Thunderbird.
More Information:
- How is the Five Eyes Intelligence Alliance Related to Your Privacy?
- Lavabit: Suspension and gag order and the connection to Edward Snowden
“Society develops a type of self-censorship, with the knowledge that surveillance exists - a self-censorship that is even expressed when people communicate with each other privately.” ― Julian Assange
Anonymous Email Forwarding with Aliases
SimpleLogin: Hide your existing email address
Emails are forwarded to your real email address. If you reply to a sender it will use your alias, too. It is designed to be user friendly and available on many platforms.
AnonAddy: Anonymous email forwarding
Third party apps for Android and iOS are available. Support GPG/OpenPGP Encryption.
“Facebook is not your friend, it is a surveillance engine.” ― Richard Stallman
Email Clients for better Internet Privacy
Desktop - Thunderbird: Reliable, fast and privacy friendly
Mozilla Thunderbird is a email client, personal information manager, news client, RSS and chat client.
Browser - Mailvelope: end-to-end encryption for your existing email address
Bring email encryption straight into your Browser. We recommend using Firefox for this. It can be used to encrypt and sign electronic messages, including attached files, without the use of a separate, native email client (like Thunderbird) using the OpenPGP standard. List of supported email providers.
Android and iOS - Canary Mail: Intuitive Design & Impeccable Security
Canary's security suite is second to none with Seamless End-To-End Encryption, Full PGP Support, Biometric App Lock, On-Device Fetch, No Ads, No Data Mining & Open Source Mail Sync Engine. Also available for Mac.
Android - K-9 Mail: Advanced Email for your phone
K-9 Mail is an open source email client focused on making it easy to chew through large volumes of email. Designed for both novice and power users and offers lots of features for everyone.
“Privacy is what allows us to determine who we are and who we want to be” ― Edward Snowden
The Best Privacy Respecting Search Engines
Startpage: Dutch search engine company that highlights privacy
Based in the Netherlands. Launched in 1998.
Brave Search: A completely independent index without tracking
Based in the US. Launched in June 2021. Blog post about the new Brave Search beta.
DuckDuckGo: Privacy and avoiding the filter bubble of personalized results
Based in US. Some of DuckDuckGo's code is free software, but the core is proprietary. Launched in 2008.
Swisscows: Privacy and family friendly Bing search results
Based in Switzerland. Launched in 2014. Proprietary source code.
Searx: Privacy-respecting metasearch engine
Hosted in multiple locations around the world. Self-hostable, open source metasearch engine. Users can access existing public instances.
- Whoogle Search: Get Google search results, but without any ads, javascript, AMP links, cookies, or IP tracking.
“We should not be comfortable or content in a society where the only way to remain free of surveillance and repression is if we make ourselves as unthreatning, passive, and compliant as possible.” ― Glenn Greenwald
The Best Privacy-Friendly World Maps Alternatives
Avoid: Apple Maps, Bing Maps, Google Earth and Google Maps.
OpenStreetMap: Free, collaborative world wide map
OpenStreetMap is a map of the world, created by people like you and free to use under an open licence.
OsmAnd: Map and navigation app that uses OpenStreetMap data
Global mobile map viewing and navigation for online and offline OpenStreetMap.
Organic Maps: Offline hike, bike, trails and navigation
Organic Maps is an Android & iOS offline maps app for travelers, tourists, hikers, and cyclists based on top of crowd-sourced OpenStreetMap data and curated with love by MapsWithMe (Maps.Me) founders.
“The way to make people trustworthy is to trust them.” ― Ernest Hemingway
Secure Password Managers
"If you're having login problems I feel bad for you son. I've got 99 passwords and remember only 1." Jay-Z, 2022
Bitwarden: Easy to use, modern, cross platform and convenient
Bitwarden is our top choice. You can import your previous passwords from other password managers with ease. Free for personal use. Available for Desktop, all Browsers, Android and iOS.
LessPass: Securely generated passwords with no storage or snyc needs
If you like Bitwarden but don't like syncing or storage of passwords then LessPass is your choice. Browsers, mobile phones and the command line are supported platforms.
KeePassXC: Reliable, old school and cross platform
Securely store passwords using industry standard encryption, quickly auto-type them into desktop applications, and use browser extension to log into websites. KeePassDX for Android: Google Play or F-Droid.
Spectre: Generated passwords, no storage needed
Formerly Master Password. Passwords aren't stored: they are generated on-demand from your name, the site, and your master password. No syncing, backups, or internet access needed. The Windows version requires to install Java. Same principle like LessPass, but LessPass is more convenient to use because of the Browser Addons.
More Information:
- Hashing & Authentication: How are your passwords stored on websites?
- Advanced Password Management and Storage
- Choosing and Using Strong Passwords and Manage them easily
“I don't want to live in a society that does these sort of things... I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under.” ― Edward Snowden
Privacy Two-Factor Authentication (2FA) Tools
Avoid: Authy or Google Authenticator.
Raivo OTP: Easy-to-use and lightweight with sync for iOS
There is also a MacOS app available to automatically and securely copy one-time passwords tapped in Raivo OTP for iOS to the clipboard of your Mac. Works across multiple iCloud accounts.
More Information:
“WAR IS PEACE.” ― Ministry of Truth
File Sharing and Synchronizating
OnionShare: Anonymous file transfer via Tor
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Share files, host websites, and chat anonymously via a new tabbed interface for maximum productivity.
Syncthing: Continuous file synchronization
Synchronizes files between two or more computers in real time, safely protected from prying eyes. Your data is your data alone and you deserve to choose where it is stored, whether it is shared with some third party, and how it's transmitted over the internet.
“We watch our own people more closely than anyone else in the world.” ― Edward Snowden
File Encryption Software
VeraCrypt: On-the-fly Disk Encryption
It can create a virtual encrypted disk that works just like a regular disk but within a file. It can also encrypt a partition or the entire storage device with pre-boot authentication.
GNU Privacy Guard: Email Encryption
GnuPG allows you to encrypt and sign your data and communications. Following are download links for different platforms. Mac: GPG Suite. OpenKeychain for Android: Google Play and F-Droid.
7-Zip: Easy to use with strong AES-256 encryption
File archiver with a high compression ratio and built-in encryption functionality.
Cryptomator: Encrypt Dropbox, Google Drive and other cloud storage
Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to a cloud service.
Hat.sh: Simple, fast, secure client-side file encryption in your browser
A web app that provides secure file encryption in the browser. The app never uploads the files to the server. It uses modern secure cryptographic algorithms with chunked AEAD stream encryption/decryption.
More Information:
- GPG/PGP Based Encryption & Authentication for Emails
- Full Disk Encryption: Strongest Counter to Surveillance, Attack and Theft of Your Devices
“We don't have to ask for our privacy, we can take it back” ― Edward Snowden
Encrypted Cloud Storage Services
Avoid: Dropbox, Google Drive, Microsoft OneDrive and Apple iCloud.
MEGA: Files are transmitted and stored securely with end-to-end encryption
Company is based in New Zealand. The free plan offers 20 GB storage and a daily 5GB transfer limit.
Nextcloud: Self-hosting or choose a provider for your data
Nextcloud is functionally similar to Dropbox, Office 365 or Google Drive. It can be hosted in the cloud or on-premises. It is scalable from home office solutions based on the low cost Raspberry Pi all the way through to full sized data centre solutions that support millions of users.
Filen: Zero knowledge end-to-end encrypted cloud storage
Hosted in Germany. The free plan offers 10 GB storage and unlimited bandwith.
If you're not able to switch your cloud service immediatly, consider encrypting with Cryptomator.
More Information:
“I had been looking for leaders, but I realized that leadership is about being the first to act.” ― Edward Snowden
Photo Gallery Managers
ente: simple, encrypted photo storage
Your photos are encrypted and hosted in datacenters in The Netherlands and France (Source). Migration options available: Local HDD, Google, Apple and Amazon Photos. Free trial of 1 GB for 365 days available. Use coupon code "PRIVACYTOOLS" to get 10% off in the first year.
PhotoPrism: AI-powered app for browsing, organizing & sharing your photos
No hosted solution available yet, but coming soon. Tag and find pictures automatically. Try the demo.
Piwigo: Photo management software for the web
Cloud-hosted and self-hosted versions available. Comes with user management. Demo.
- reddit.com/r/selfhosted: Google Photos - The Megathread
- github.com/awesome-selfhosted: More self-hosted options
“The reason you're reading this book is that I did a dangerous thing for a man in my position: I decided to tell the truth.” ― Edward Snowden
Secure Web Hosting & Domain Provider
OrangeWebsite: Icelandic Web Hosting with Free Speech
Based in Iceland, founded in 2009. Accepts Bitcoin and cash by mail. 100% Green energy.
Privex: Secure Private VPS and Dedicated Server hosting
Based in Belize, founded in 2017. Server locations: Finland, Germany, USA, Sweden, Netherlands, Canada and Japan. Accepted cryptocurrencies: Bitcoin, Litecoin, HIVE / HBD, Monero (XMR), EOS and Dogecoin.
1984 Web Hosting: Safeguarding privacy and civil rights
Based in Iceland, founded in 2006. Accepts Bitcoin. 100% Green energy.
Njalla: A privacy-aware domain registration service
Based in Sweden, founded in 2017 by Peter Sunde the Co-founder of The Pirate Bay.
Bahnhof Cloud: Covered by strong free speech and data protection laws
Based in Sweden, founded in 1994. Payments only with Credit Card or PayPal.
“If wars can be started by lies, they can be stopped by truth.” ― Julian Assange
Buy Cryptocurrency
LocalMonero: Monero (XMR) P2P marketplace
Accessiable via Tor and I2P. The biggest, most trusted and well-established P2P Monero exchange in the XMR community.
Bisq: Decentralized, open source P2P marketplace for desktop
Buy and sell bitcoin for fiat (or other cryptocurrencies) privately and securely using Bisq's peer-to-peer network and open-source desktop software. No registration required. Easy to use.
LocalCryptos: P2P marketplace for multiple currencies
Sign up either with your Ethereum wallet or email address. Fees: 0.75% for buyers and 0.25% for sellers.
Binance: Largest cryptocurrency exchange world-wide with P2P Feature
Founded in 2017 and became quickly the largest exchange in the world in terms of daily trading volume of cryptocurrencies. P2P trading available. Update: Sep 17, 2021: Binance requires all users to get verified.
Worth Mentioning:
“We'd do well to remember that at the end of the day, the law doesn't defend us; we defend the law. And when it becomes contrary to our morals, we have both the right and the responsibility to rebalance it toward just ends.” ― Edward Snowden
Monero: A privacy-enhanced cryptocurrency for anonymity
Cake Wallet: For Android and iOS with a modern design
Modern wallet design to store, send, receive and exchange XMR.
Monerujo: Android only with multiple wallets support
Multiple wallets, QR code scanning and able to pay BTC addresses.
Donate Monero to PrivacyTools.io
Easy copy & paste. Your donation for Pizza, Coffee and Beer is highly appreciated.Worth Mentioning:
“A child born today will grow up with no conception of privacy at all.” ― Edward Snowden
Privacy-enhancing Bitcoin Wallets
CoinJoin is a trustless method for combining multiple Bitcoin payments from multiple spenders into a single transaction to make it more difficult for outside parties to determine which spender paid which recipient. Unlike many other privacy solutions, coinjoin transactions do not require a modification to the bitcoin protocol.
Samourai: Android Wallet
Built-in trustless CoinJoin. Full offline mode. Designed to keep miner fees as low as possible.
Sparrow Wallet: Lightweight Desktop Wallet
Built-in trustless CoinJoin. Easy to use and offers users a quick start guide.
BitLox: Hardware Wallet
Fully secured cryptocurrency wallet with the mind of keeping your Bitcoin transactions anonymous. Their Bitcoin Block Explorer is accessible over the Tor and I2P network.
Wasabi: Desktop Wallet
Non-custodial, privacy-focused Bitcoin wallet for Desktop, that implements trustless CoinJoin.
Edge: Android and iOS Wallet with multi-asset support
Touch ID (fingerprint) support, offers in-app buy and sell.
Electrum: Cross-platform with support of Hardware Wallets
Decentralized servers, encrypted, cached blockchain for improved speeds.
- https://en.bitcoin.it/wiki/CoinJoin
- Open Source Portfolio Managers and Trackers for Wealth Management - GitHub Gem
“Under observation, we act less free, which means we effectively are less free.” ― Edward Snowden
Cryptocurrency Swap
Cryptocurrency exchanges which allow for direct peer-to-peer cryptocurrency transactions to take place securely and without the need for a third party to oversee transfer of assets. DEX are more anonymous than commercial exchanges which implement know your customer (KYC) requirements.
UnstoppableSwap: Send Bitcoin, receive Monero using Atomic Swaps
This is brand new technology and might have unexpected bugs. Be careful and only test with small amounts. Read the Official announcement from August 20, 2021.
SideShift.ai: No Account required on this crypto exchange
Swap between BTC, ETH, BCH, XMR, XAI and 30+ other cryptocurrencies.
WizardSwap: Supports Privacy Cryptocurrencies
Platform charges 0.1% fee but liquidity providers set their margins. Accessible via Tor (.onion).
Telegram Channels are targeted by scammers, don't share your key phrases with anyone. Admins of the official channels are not sending private messages to users. Beware of anyone reaching out via private message.
Worth Mentioning:
“What is right is not always the same as what is legal” ― Edward Snowden
Encrypted and Secure Instant Messaging
Avoid: Facebook Messenger, Google Hangouts, LINE, Telegram, Snapchat, Tencent QQ, Viber, WeChat, WhatsApp.
Session: Decentralized, cross-platform, end-to-end encrypted
No phone number or email address is required to signup. Similar functionality like Element, but still in an earlier stage of development. Decentralized servers routed through Lokinet.
Element: Decentralized, cross-platform, end-to-end encrypted Team Chat
A modern alternative to IRC or Discord. Good for team chats and groups.
Status: Decentralized, cross-platform, end-to-end encrypted
No phone number or email address is required to signup. Uses the peer-to-peer (p2p) messaging protocol Waku that removes centralized third parties from messages.
Signal: Centralized, cross-platform and encrypted messaging
Similar look and feel of WhatsApp and other commonly used messaging apps, makes switching easy. Signal requires your phone number as an personal identifier.
Threema: Centralized, encrypted messaging for mobile
No native desktop apps available yet, but there is a web version for your browser. No phone number is required to signup but there is a payment involved to get the app. Fortunately the Threema shop accepts Bitcoin.
Cwtch: Decentralized, end-to-end encrypted and takes place over Tor
User friendly, lightweight, for desktop and Android. End-to-end encrypted and takes place over Tor v3 onion services. Privacy-preserving, multi-party messaging protocol. Built to be metadata resistant.
Briar: Decentralized, encrypted messaging for activists and journalists
Briar doesn't rely on a central server - messages are synchronized directly between the users' devices via Bluetooth or Wi-Fi. Online sync via the Tor network is possible, too. Protecting users from surveillance.
Tox: Decentralized, encrypted messaging, voice, video, screen and file sharing
Wide range of features but a highly experimental protocol, use with caution.
Delta Chat: Decentralized, cross-platform, end-to-end encrypted via Email
Delta Chat doesn't have their own servers but uses the most massive and diverse open messaging system ever: the existing e-mail server network. Chat with anyone if you know their e-mail address, no need for them to install DeltaChat. All you need is a standard e-mail account. How does Delta Chat protect my Metadata?
Sounds slow? It's using Push-IMAP to make it fast. List of recommended Email providers.
“Who controls the past controls the future. Who controls the present controls the past.” ― George Orwell, 1984
Encrypted Video & Voice Messengers
Avoid: Skype, Zoom, TeamSpeak, Discord and Ventrilo.
Jitsi Meet: Fully encrypted video conferencing, no account needed
Desktop version downloads can be found here.
“IGNORANCE IS STRENGTH.” ― Ministry of Truth
Encrypted DNS Clients for Improved Internet Privacy
dnscrypt-proxy: Flexible DNS proxy, supports modern encrypted protocols
(Desktop) A flexible DNS proxy, with support for modern encrypted DNS protocols including DNSCrypt V2, DNS-over-HTTPS and Anonymized DNSCrypt. Also allows for advanced monitoring, filtering, caching and client IP protection through Tor, SOCKS proxies or Anonymized DNS relays.
Unbound: Validating, recursive, caching DNS resolve
(Desktop) Validating, recursive, caching DNS resolve with support for DNS-over-TLS. Designed to be fast, lean, and secure Unbound incorporates modern features based on open standards. Unbound was recently audited.
Nebulo: Light-weight, customizable and battery efficient
(Android) Non-root, small-sized DNS changer utilizing DNS-over-HTTPS and DNS-over-TLS.
DNSCloak: iOS GUI and Wrapper for dnscrypt-proxy
(iOS) Allows for the use for dnscrypt-proxy on an iPhone or iPad, which gives users the ability to encrypt their DNS requests through the use of an on-device VPN profile.
Firefox: Built-in DNS-over-HTTPS resolver
(Desktop) If you're using Firefox you don't need additional tools. DNS-over-HTTPS (DoH) FAQ.
“A child born today will grow up with no conception of privacy at all.” ― Edward Snowden
Encrypted DNS Resolvers for Improved Internet Privacy
AdGuard DNS: Blocking of Ads, Trackers and Malicious Domains
Supports: DNS-over-TLS (DoT), DNS-over-HTTPS (DoH) and DNSCrypt. Based in Cyprus.
Quad9: Open DNS Recursive Service for Free Security and Privacy
Supports: DNS-over-TLS (DoT), DNS-over-HTTPS (DoH) and DNSCrypt. Based in Switzerland.
NextDNS: Blocks Threats, Ads and Trackers on Websites and Apps
Supports: DNS-over-TLS (DoT), DNS-over-HTTPS (DoH) and DNSCrypt. Based in United States.
Cloudflare: High Performance DNS Resolver
Supports: DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH). Based in United States.
Definitions Explained
DNS-over-TLS (DoT): A security protocol for encrypted DNS on a dedicated port 853. Some providers support port 443 which generally works everywhere while port 853 is often blocked by restrictive firewalls.
DNS-over-HTTPS (DoH): Similar to DoT, but uses HTTPS instead, being indistinguishable from "normal" HTTPS traffic on port 443 and more difficult to block. DoH contains metadata such as user-agent (which may include system information) that is sent to the DNS server.
DNSCrypt: With an open specification, DNSCrypt is an older, yet robust method for encrypting DNS.
“If wars can be started by lies, they can be stopped by truth.” ― Julian Assange
DNS Network Level Ad Blocking for better Privacy and Speed
NextDNS: Blocks security threats, ads and trackers
The major advantage of NextDNS over AdGuard DNS is to be able to configure the service to your needs via parental controls, website restrictions or block whole categories of websites and apps. Easy to setup within minutes. Comes with setup guides for all systems. 300,000 queries/month for free, after that it will just work like a classic non-blocking DNS service.
AdGuard DNS: Blocks tracking, ads and phishing for free
Easy to setup within minutes. Comes with setup guides for all systems. You only need to enter two IP adresses.
Pi-hole: Self-hosted solution for experts
You can run Pi-hole in a container, or deploy it directly to a supported operating system via installer.
More self-hosted expert solutions: pfBlockerNG Plugin for pfSense and Artica.
“We'd do well to remember that at the end of the day, the law doesn't defend us; we defend the law. And when it becomes contrary to our morals, we have both the right and the responsibility to rebalance it toward just ends.” ― Edward Snowden
YouTube Alternatives
“You can't assume any place you go is private because the means of surveillance are becoming so affordable and so invisible.” ― Howard Rheingold
Decentralized Social Networks
Redact: Delete your digital footprint
Allows you to automatically clean up your old posts from services like Twitter, Reddit, Facebook, Discord and more all in one place. Delete by key word, sentiment and content type.
More Information:
“If you're doing nothing wrong, you have nothing to hide from the giant surveillance apparatus the government's been hiding.” ― Stephen Colbert
Blog Software for Self and Managed Hosting
Worth Mentioning:
“Privacy is what allows us to determine who we are and who we want to be” ― Edward Snowden
Encrypted Digital Notebooks
Logseq: A local-first notebook for organizing and collaboration
Not encrypted, but the server will never store or analyze your private notes. Your data are plain text files.
“2 + 2 = 5” ― Ministry of Truth
Productivity & Collaboration Privacy Tools for Work
Etherpad: Instant collaborative web text editor
Highly customizable open-source online editor providing collaborative editing in real time.
CryptPad: End-to-end encrypted collaboration suite
Plenty of features: Rich text, code, presentation, sheet, form, kanban, whiteboard and CryptDrive.
ONLYOFFICE: Collaborative online document editors
Features: Online document editors, platform for document management, corporate communication, mail and project management tools.
LibreOffice: Complete desktop office solution
LibreOffice consists of programs for word processing, creating and editing of spreadsheets, slideshows, diagrams and drawings, working with databases, and composing mathematical formulae. It is available in 115 languages.
EtherCalc: Instant collaborative web spreadsheet
Your data is saved on the web, and people can edit the same document at the same time. Everybody's changes are instantly reflected on all screens.
Vikunja: Self-hosted team task manager with modern features
The project is still under development and the native apps are not final yet, but the web version works great. Offers an import feature from Todoist, Trello and Microsoft To-Do.
“The NSA has built an infrastructure that allows it to intercept almost everything.” ― Edward Snowden
Privacy Friendly Operating Systems
“I had been looking for leaders, but I realized that leadership is about being the first to act.” ― Edward Snowden
Privacy and Security Tools for Windows 10 and 11
“Surveillance is the business model of the Internet.” ― Bruce Schneier
Privacy Friendly Mobile Operating Systems
CalyxOS: Secure features for your Google Pixel Phone
Only Google Pixel devices and Xiaomi Mi A2 are supported. Source.
GrapheneOS: Improved privacy and security for your Google Pixel device
Only Google Pixel devices are supported, new models are recommended. Source.
“Surveillance is the business model of the Internet.” ― Bruce Schneier
Android Keyboard Alternatives That Respect Your Privacy
AnySoftKeyboard: One of the most customizable keyboards available
Get it on F-Droid. Supports lots of languages via external packages.
OpenBoard: Look and feel of Gboard without the tracking
Get it on F-Droid. No dependency on Google binaries.
FlorisBoard: Modern, user-friendly, customizable and privacy respecting
Get it on F-Droid. Currently in early-beta state.
Simple Keyboard: Super lightweight (<1MB) and minimal features
Get it on F-Droid. For people who like it minimalistic. No emojis, gifs, spell checker or swipe typing.
“Society develops a type of self-censorship, with the knowledge that surveillance exists - a self-censorship that is even expressed when people communicate with each other privately.” ― Julian Assange
Open Source Router Firmware
“The NSA has built an infrastructure that allows it to intercept almost everything.” ― Edward Snowden
Self-Contained Anonymizing Networks
Tor: Most popular, biggest and cross-platform network available
Tor, short for The Onion Router, is for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than six thousand relays, for concealing a user's location and usage from anyone conducting network surveillance or traffic analysis.
I2P: Censorshipo-resistant peer-to-peer network
The Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by end-to-end encrypting the user's traffic, and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world.
Freenet: Decentralized, anonymous communication without fear of censorship
Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship.
ZeroNet: Uses existing Bitcoin cryptography and the BitTorrent network
ZeroNet is a decentralized web-like network of peer-to-peer users. Instead of having an IP address, sites are identified by a public key (specifically a bitcoin address). The private key allows the owner of a site to sign and publish changes, which propagate through the network. Sites can be accessed through an ordinary web browser when using the ZeroNet application, which acts as a local webhost for such pages.
Retroshare: P2P communication and file sharing built on GNU Privacy Guard
Peer-to-peer communication and file sharing app based on a friend-to-friend network built on GNU Privacy Guard (GPG). Optionally, peers may communicate certificates and IP addresses to and from their friends.
IPFS: Protocol and P2P network for storing and sharing data
The InterPlanetary File System (IPFS) is a protocol and peer-to-peer network for storing and sharing data in a distributed file system. IPFS uses content-addressing to uniquely identify each file in a global namespace connecting all computing devices
GNUnet: Software framework in support of a free and open society
For decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery, resource allocation, communication over many transports (such as TCP, UDP, HTTP, HTTPS, WLAN and Bluetooth) and various basic peer-to-peer algorithms for routing, multicast and network size estimation.
“My sole motive is to inform the public as to that which is done in their name and that which is done against them.” ― Edward Snowden
Privacy Friendly Translation Tools
DeepL Translate: The world's most accurate translator
Warning: The free version of DeepL does not respect your privacy, only the paid pro version. Source: Privacy Policy. The texts of free users are used to train and improve the neural networks and translation algorithms.
Lingva Translate: Alternative front-end for Google Translate without tracking
Retrieves translations without using any Google-related service, preventing them from tracking.
LibreTranslate: No ties to proprietary services and can be self-hosted
100% Self-Hosted. No Limits. No Ties to Proprietary Services.
Translate Shell: Command-line translator for your terminal
Formerly Google Translate CLI is a command-line translator powered by Google Translate (default), Bing Translator, Yandex.Translate and Apertium.
“What state surveillance actually is is best understood by the NSA's own documents and own words, which I think as you know I happen to have a lot of.” ― Glenn Greenwald
Open Source Torrent Clients without Ads and Tracking
Your IP address is exposed while using any Torrent Client. Consider using a VPN provider to hide your IP. If you are using µTorrent that includes ads and tracking, select your alternative here.
“The solution to government surveillance is to encrypt everything” ― Eric Schmidt
Disk & File Cleaners with Privacy Features
BleachBit: Disk space cleaner, privacy manager and system optimizer
Shredding files and wiping unallocated disk space to minimize data remanence.
ExifCleaner: Privacy metadata removal tool
Removes metadata for the most popular image and video formats. It also supports PDF files and comes with batch-processing to process multiple files at once. Drag and Drop interface, easy to use.
Czkawka: Simple, fast and free app to remove duplicated files
No privacy features but a neat little tool to declutter your computer and free disk space.
More Information:
- Manufacturer Tools for Wiping HDD and SSD Drives
- File-Change Detection or Integrity Monitoring Systems
- Deleting and Decluttering Data to Improve Privacy
“The way to make people trustworthy is to trust them.” ― Ernest Hemingway
RSS Feed Readers
“You can't assume any place you go is private because the means of surveillance are becoming so affordable and so invisible.” ― Howard Rheingold
Secure Whistleblower Tools
SecureDrop: Whistleblower submission system for news organizations
Software that news websites install to offer whistleblowers a plattform for secure communication and file transfers. Requires Tor Browser for anonymity in order to access. List of organizations using SecureDrop.
Haven: Monitoring of intrusions into home, office and hotel rooms
An Android application that leverages on-device sensors to provide monitoring and protection of physical areas. Turns Android phones into a motion, sound, vibration and light detector, watching for unwanted intruders.
Briar: P2P encrypted messaging for activists and journalists
Briar doesn't rely on a central server - messages are synchronized directly between the users' devices via Bluetooth or Wi-Fi. Online sync via the Tor network is possible, too. Protecting users from surveillance.
GlobaLeaks: Easily set up and maintain a secure whistleblowing platform
Alternative to SecureDrop. Easily set up a secure and anonymous whistleblowing initiative. Designed to be user-friendly, the software is customisable and protects the whistleblower's privacy and submissions by default.
OnionShare: Anonymous file transfer via Tor
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Share files, host websites, and chat anonymously via a new tabbed interface for maximum productivity.
EFF: Surveillance Self-Defense Guides
Electronic Frontier Foundation offers tips, tools and how-tos for safer online communications.
- Whistleblower Guide: How Privacy Tools Can Protect You From Retaliation
- How to Counteract Forensic Linguistics
- Freedom of the Press Foundation: Protects, defends, and empowers public-interest journalism.
- The Hitchhiker’s Guide to Online Anonymity: How I learned to start worrying and love privacy anonymity.
“There is a massive apparatus within the US government that with complete secrecy has been building this enormous structure that has only one goal, and that is to destroy privacy and anonymity, not just in the United States but around the world.” ― Glenn Greenwald
Known Privacy Related Incidents & Gag Orders to Date
2021, ProtonMail: ProtonMail logged IP address of French activist after an order by Swiss authorities. Source
2021, WindScribe VPN: Servers were not encrypted as they should have been allowing MITM attacks by authorities. Source
2021, DoubleVPN: Servers, logs, and account info seized by law enforcement. Source
2021, Tutanota Email: Forced to monitor two user accounts for three months implicated in a blackmail case. Source
Transparency Report & Warrant Canary for the secure email service Tutanota
2017, PureVPN: Forced to disclose information of one user to the FBI. Source
2014, EarthVPN: User was arrested based on logs provider to the Dutch Polic because of a bomb hoax. Source
2013, Lavabit Email: Secure E-Mail provider Lavabit shuts down after fighting a secret gag order. Source
2011, HideMyAss VPN: User was de-anonymized, and logs were provided to the FBI in a labeled "LulzSec fiasco". Source
What is a Warrant Canary?
A term for a regularly published statement that a service provider has not received legal process that it would be prohibited from saying it had received, such as a national security letter. Transparency reports and warrant canaries have an important role to play in the fight against illegal and unconstitutional national security process, including National Security Letters and other secret court processes. Wikipedia
“Under observation, we act less free, which means we effectively are less free.” ― Edward Snowden