Software I recommend (list)
Introduction
Security is a process, so you cannot fully trust any application, organization, and the people behind it. Regarding this topic see:
I hope this modest work can help to defende you and fight the censorship and oppression we are experiencing especially in recent years, knowledge is power, so search, read, and think with your head! In this sector it’s very easy to meet organizations and projects that claim to defend privacy but in reality are just mousetraps.
Any reagrds do your own research!,if something is missing or wrong please contact me,to update it.
Requierements are :
- Needs to be FOSS
- Lightweight
- Security first
- Can easily be modified
- Clear references
- Privacy Policy has to be easily accessible
- Not sharing data with databrokers nor bad third-parties
- Project has to be maintained and updated regularly
Table of Contents
- Operating-Systems
- Shell
- Browsers
- Email-Client
- Email-Providers
- Instant-Messagging
- Virtualization
- Online-Guides
- Password-Manger
- Search-Engines
- Alternatives(for-Youtube…)
- Disk-Encryption
- File-Encryption
- Git-hosting
Operating Systems
- Arch-Linux
- Debian
- Gentoo
- Fedora
- Qubes
- Tails
- Nix-Os
- OpenBSD
- Whonix
- Pure-OS
- Subragaph-OS–Still in development
- Alpine Linux
Shell
Browsers
- Firefox there is a problem… it has to be hardnened via ffprofile or manual hardening with about:config {don’t worry dear reader a guide how to harden firefox will come}
- Librewolf
- Chromium
- Tor-Browser
Mobile
Email Providers
IM
Centralized
Matrix Clients
XMPP Clients
- pidgin
- Gajim
- Dino
- Psi
- Conversations (Android)
P2P
Virt.
Online Guides
- Paranoids-Bible
- Privacy-Tools
- Security List
- pluja/awesome-privacy
- Lissy93/awesome-privacy
- Privacy Blogs List
- The Hitchhiker’s Guide to Online Anonymity
- Surveillance Self-Defence
- PRISM Break
- The New Oil
- gofoss.net
- Defensive Computing Checklist
- Watch Your Hack
- Decentralize Today - Privacy Cookbook
Password Managers
Search Engines
ALternatives
Social Networks
- Mastodon
- diaspora
- friendica
- Pixelfed
- Pleroma
- Misskey
- Bibliogram - InstaGram Viewer
Video Sharing Alternatives
- Invidious
- Piped
- BitTube
- PeerTube
- DTube
Disk Encryption
File Encryption
Git Hosting
Notes
ProtonMail case: Recently it has jumped to the headlines the case in which the service ProtonMail has provided (and previously logged) the IP address of an activist, see: ProtonMail logged IP address of French activist after order by Swiss authorities. Regarding this, I have made my own opinion, which is the same as it was when I first became interested in these topics years ago after Lavabit case: No existing service in the world can “cover the ass” of someone who commits an action “judged to be criminal” or criminal, in the case of Proton, probably this person could not have been traced if he had used a VPN or if he had connected by Tor network, also the Proton team recommends using Tor when using their email service if you need to protect your IP address. Anyway, this is a very complex speech that can’t be covered here, my advice is to use at least one VPN, and if you use the ProtonMail service you can use it with another VPN service like Mullvad for example. This way you don’t relegate security to a single service, the disadvantage is that you have to trust one more service (the Hamletian doubts of Internet Privacy).