Page last edited → 11 April 2023
Page last reviewed → 11 April 2023
Index
1. Passwords and data breaches
2. Device security
3. Private conversations and meetings
4. Collaborative documents and file sharing
5. Personal notes and office suite
6. Cloud storage, data encryption and backups
7. Web browsing
8. Sexual and reproductive health
9. Identity and Internet traffic protection
10. Maps and navigation
11. Translators
12. Decentralized social networks
13. Creative suite
14. Internet censorship and shutdowns
15. Playful things
16. Advanced tools
Passwords and data breaches
Firefox Monitor
Mozilla
Find out if you’ve been in a data breach. Stay safe with a simple yet powerful tool that tracks whether your personal information has been exposed in a data breach. We’ll help you understand what to do next and continuously monitor for any new breaches — all at no cost to you.
Have I Been Pwned?
Troy Hunt
Check if your email or phone is in a data breach.
- The Facebook Phone Numbers Are Now Searchable in Have I Been Pwned
- Have you been ‘pwned’ in a data breach? Troy Hunt can tell (AP)
- The Legitimisation of Have I Been Pwned
- Donate
1Password
The world’s most-loved password manager. 1Password is the easiest way to store and use strong passwords. Log in to sites and fill forms securely with a single click.
- 1Password Support
- Use 1Password as an authenticator for sites with two-factor authentication
- Securely share 1Password items with anyone
- How to create a strong 1Password account password
- 1Password Strong Password Generator
- Security is not just a feature. It’s our foundation.
- 1Password Security Design white paper
Bitwarden
Move fast and securely with the password manager trusted by millions. Drive collaboration, boost productivity, and experience the power of open source with Bitwarden, the easiest way to secure all your passwords and sensitive information.
- Bitwarden Help Center
- Bitwarden Authenticator (TOTP)
- Bitwarden Send
- Bitwarden Strong Password Generator
- Compliance, Audits, and Certifications
Pwned Passwords
Have I Been Pwned/Troy Hunt
Pwned Passwords are hundreds of millions of real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they’re at much greater risk of being used to take over other accounts. They’re searchable online as well as being downloadable for use in other online systems.
Password Strength Testing Tool
Bitwarden
Think you have a strong password? Find out here.
FreeOTP
Red Hat
FreeOTP is a two-factor authentication application for systems utilizing one-time password protocols. Tokens can be added easily by scanning a QR code. If you need to generate a QR code, try our QR code generator.
Aegis Authenticator
Beem Development
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services.
Authy
Twilio
Enable 2FA for your favorite sites. Go beyond the password and protect yourself from hackers and account takeovers.
YubiKey
Yubico
The industry’s #1 security key, enabling strong two-factor, multi-factor and passwordless authentication.
SoloKeys
Secure Login. Open Source. Easy. The first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.
Nitrokey
Nitrokey protects emails, files, hard drives, server certificates and online accounts.
Device security
iVerify
Trail of Bits
Protect Your Digital Life. Built by the leaders in security research at Trail of Bits, iVerify helps you keep your devices and online accounts secure from vulnerabilities.
- Introducing iVerify, the security toolkit for iPhone users
- This App Will Tell You if Your iPhone Gets Hacked (Motherboard/VICE)
VirusTotal
Chronicle/Alphabet
Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.
Private conversations and meetings
Signal
Signal is an end-to-end encrypted messaging app. Privacy isn’t an optional mode, it’s just the way that Signal works. Every message, every call, every time.
- Encrypted profiles
- Private contact discovery
- Sealed sender
- Customizable disappearing messages
- View-once media
- Private link previews
- Private GIF search
- Encrypted stickers
- Private groups
- Private stories
- Note to Self
- Screen Sharing
- Face blurring tools
- Always Relay Calls
- Signal Support
- Government Requests
- Privacy Policy
- Donate to Signal
Proton Mail
Proton AG
Secure email that protects your privacy. Keep your conversations private. Proton Mail is an encrypted email service based in Switzerland.
- Email that puts your security first
- Proton Easy Switch
- Enhanced tracking protection
- Proton Mail encryption explained
- We believe in the power of open source
- Transparency report
- How to pay for Proton services in Russia
Proton Calendar
Proton AG
Your schedule is worth protecting. Your calendar is a record of your life. Proton Calendar helps keep it private.
- The world’s most secure calendar
- Proton Easy Switch
- We believe in the power of open source
- Transparency report
- How to pay for Proton services in Russia
Tutanota
Tutao
Tutanota is the world’s most secure email service, easy to use and private by design. You get fully encrypted calendars and contacts with all our personal and business email accounts.
- Secure email made for you
- Secure email
- Zero-knowledge calendar
- Inactive accounts policy
- Transparency Report & Warrant Canary
- Helping Ukraine
Ricochet Refresh
Blueprint for Free Speech
Ricochet Refresh is an open-source project to allow private and anonymous instant messaging.
OnionShare’s “Chat Anonymously” feature
Micah Lee
Chat with friends securely and anonymously using the Tor network.
Collaborative documents and file sharing
CryptPad
CryptPad is a collaborative office suite that is end-to-end encrypted and open-source.
- CryptPad Calendar
- About CryptPad
- CryptPad Public Roadmap
- CryptPad Documentation
- What we can’t know, what we must know, what we want to know
- Privacy, distributed computation, and architectures of resilience
- CryptPad discussed in an episode of the FLOSS Weekly podcast
- Donate
Skiff Pages
Protect your notes, documents, and wikis with Skiff Pages – end-to-end encrypted and fully collaborative.
Tresorit Send
Share confidential files with our end-to-end encrypted links. Your files get encrypted before they leave your device and never get decrypted until accessed by your recipient.
FileSend
Standard Notes
Simple, encrypted file sharing. FileSend secures files with client-side AES-256 encryption and does not log IP addresses. Files are permanently deleted from our servers on download or after specified duration.
OnionShare
Micah Lee
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network.
Personal notes and office suite
Standard Notes
Stand for privacy. Write fearlessly. Standard Notes helps you gain control in a world that often feels out of control. Protect your life’s work with end-to-end encryption, advanced security, and unmatched privacy controls.
- Features
- Stand for Privacy
- Built to Last
- Write Fearlessly
- Our Principles
- Blog
- Listed blogging platform
- Help center
LibreOffice and Collabora Office
LibreOffice is a free and powerful office suite, and a successor to OpenOffice.org (commonly known as OpenOffice). Its clean interface and feature-rich tools help you unleash your creativity and enhance your productivity.
Note: LibreOffice is available as a desktop app for Linux, macOS, and Windows. On mobile the Document Foundation team (the people behind LibreOffice) recommends Collabora Office from Collabora.
Cloud storage, data encryption and backups
Proton Drive
Secure cloud storage and file sharing. Proton Drive is an end-to-end encrypted Swiss vault for your files that protects your data.
- Your privacy, secured by math
- We believe in the power of open source
- Transparency report
- How to pay for Proton services in Russia
Sync
The safe space to get your best work done. Sync is a file storage and document collaboration platform that helps teams stay safe, secure and connected in the cloud.
VeraCrypt
IDRIX
VeraCrypt is a free open source disk encryption software for Windows, macOS and Linux. Brought to you by IDRIX and based on TrueCrypt 7.1a.
- Introduction
- Beginner’s Tutorial
- Documentation
- Frequently Asked Questions
- Downloads
- Encryption toolkit for media makers: VeraCrypt guide (FPF)
- Donation to VeraCrypt
Cryptomator
Skymatic
Put a lock on your cloud. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service.
FreeFileSync
Zenju
FreeFileSync is a folder comparison and synchronization software that creates and manages backup copies of all your important files. Instead of copying every file every time, FreeFileSync determines the differences between a source and a target folder and transfers only the minimum amount of data needed. FreeFileSync is Open Source software, available for Windows, macOS, and Linux.
Web browsing
Firefox
Mozilla
Get the browsers that put your privacy first — and always have. Get the privacy you deserve. Enhanced Tracking Protection is automatic in every Firefox browser.
- Mozilla Support
- Switching from Chrome to Firefox
- Enhanced Tracking Protection in Firefox for desktop
- Enhanced Tracking Protection in Firefox for iOS
- Enhanced Tracking Protection in Firefox for Android
- How Firefox Sync keeps your data safe
- HTTPS-Only Mode in Firefox
- Firefox DNS-over-HTTPS
- Common Myths about Private Browsing
- Facebook Container extension
- Firefox Multi-Account Containers extension
- How is Facebook Container different from Multi-account Containers?
- Permission request messages for Firefox extensions
- Mozilla Manifesto
- Donate to Mozilla now
Mullvad Browser
Amagicom AB + Tor Project
The Mullvad Browser is a privacy-focused web browser developed in a collaboration between Mullvad VPN and the Tor Project. It’s designed to minimize tracking and fingerprinting. You could say it’s a Tor Browser without the Tor Network. Instead, you can use it with a trustworthy VPN. The idea is to provide one more alternative – beside the Tor Network – to browse the internet with more privacy. To get as many people as possible to fight the big data gathering of today. To free the internet from mass surveillance.
- FAQ
- What is the Mullvad Browser? (Tor Project)
- We’ve Teamed Up With Mullvad VPN to Launch the Mullvad Browser (Tor Project)
Firefox Focus
Mozilla
Simply private mobile browsing. Firefox Focus is your dedicated privacy browser with automatic tracking protection. With Focus, your pages load faster and your data stays private.
DuckDuckGo
Private Search. Search anonymously. We don’t track you. Ever.
uBlock Origin
Raymond Hill
Finally, an efficient wide-spectrum content blocker. Easy on CPU and memory.
Privacy Badger
Electronic Frontier Foundation (EFF)
Privacy Badger is a browser extension that automatically learns to block invisible trackers.
Blacklight
The Markup/Surya Mattu
A Real-Time Website Privacy Inspector. Who is peeking over your shoulder while you work, watch videos, learn, explore, and shop on the internet? Enter the address of any website, and Blacklight will scan it and reveal the specific user-tracking technologies on the site—and who’s getting your data. You may be surprised at what you learn.
Cover Your Tracks
Electronic Frontier Foundation (EFF)
See how trackers view your browser. Test your browser to see how well you are protected from tracking and fingerprinting.
TinEye
Idée
Reverse Image Search. Find where images appear online.
LibreSpeed
Federico Dossena
Free and Open Source Speedtest.
WhereGoes
Have you ever wondered: Where does this link go? The URL redirect checker follows the path of the URL. It will show you the full redirection path of URLs, shortened links, or tiny URLs.
Sexual and reproductive health
Euki
Women Help Women (WHW)
Euki: A sexual health app that adapts to YOU. Euki helps you get answers that you can trust without making assumptions about who you are, what you do or don’t already know, or how you identify.
- App launch blog post (WHW)
- In Post Roe v. Wade Era, Mozilla Labels 18 of 25 Popular Period and Pregnancy Tracking Tech With *Privacy Not Included Warning (Mozilla)
- Donate to Euki
Identity and Internet traffic protection
Firefox Relay
Mozilla
Protect your identity with secure phone and email masking. Our secure, easy-to-use email and phone masks help keep your identity private so you can sign up for new accounts anonymously, stop spam texts and junk calls, and get only the emails you want in your inbox.
Image Scrubber
Everest Pipkin
This is a tool for anonymizing photographs taken at protests. It will remove identifying metadata (Exif data) from photographs, and also allow you to selectively blur parts of the image to cover faces and other identifiable information. All processing happens directly in the browser- no information is stored or sent anywhere.
Mullvad VPN
Amagicom AB
You have a universal right to privacy. Browse the web securely and privately with Mullvad VPN. It’s fast, trustworthy, and easy to use.
- Mullvad help center
- Connection check
- What is privacy?
- Why Mullvad VPN?
- Kill switch
- Lockdown mode
- DNS content blockers
- We value open source
- Third-party security audits
- Privacy policy
- No-logging of user activity policy
- Mullvad’s account numbers get longer – and safer
- The ownership and future of Mullvad VPN
- How we handle government requests for user data
- Swedish legislation relevant to us as a VPN provider
IVPN
Privatus Limited
Resist Online Surveillance. What you do online can be tracked by organizations you may not know or trust and become part of a permanent record. A VPN can’t solve this on its own, but can prevent your ISP from being able to share or sell your data.
- Help Center
- What is a VPN?
- Do you offer a kill switch or VPN firewall?
- AntiTracker
- Third-party security audits
- Manifesto
- Privacy Policy
- Transparency Report
- In support of Ukraine: distributing free IVPN accounts
1.1.1.1
Cloudflare
The free app that makes your Internet safer.
DNS leak test
Privatus Limited
A web tool that lets you check to make sure your VPN is not leaking your DNS requests.
Tor Browser and Onion Browser
Browse Privately. Explore Freely. Defend yourself against tracking and surveillance. Circumvent censorship.
Note: The Tor Browser is available for Android, Linux, macOS, and Windows. On iOS and iPadOS the Tor Project recommends the Onion Browser.
- Tor Browser User Manual
- How can we help?
- Tor Check
- The Tor Social Contract
- Donate Now to the Tor Project
- Support Onion Browser
Orbot
Guardian Project
Tor VPN for Smartphones. Keep Apps Safe.
Snowflake
Tor Project
Help people in censored countries access the Internet without restrictions. Once you install and enable the extension, wait for the snowflake icon to turn green, this means a censored user is connecting through your extension to access the Internet!
- Browser extension for Firefox
- Browser extension for Brave, Chrome and others
- Donate Now to the Tor Project
Maps and navigation
OsmAnd
Offline Maps and Navigation.
OpenStreetMap
OpenStreetMap Foundation (OSMF)
OpenStreetMap is a map of the world, created by people like you and free to use under an open license.
Translators
Firefox Translations
Mozilla
Translate web sites in your browser without using the cloud. Firefox Translations provides automated translation of web content. Unlike cloud-based alternatives, translation is done locally, on the client-side, so that the text being translated does not leave your machine.
Translate
Apple
Translate lets you quickly and easily translate your voice and text between any combination of 11 languages. Designed to be the best and easiest-to-use app for translating phrases, conversations, and even the text around you. Translate combines high-quality translations with an intuitive design, so that translating is quick and easy.
Feature highlight: On-device mode – Enable a fully offline experience in Translate and for downloaded languages. Keep your translations private without needing to turn off your internet connection.
DeepL Translator
DeepL
The world’s most accurate and nuanced machine translation.
Decentralized social networks
Mastodon
Social networking that’s not for sale. Your home feed should be filled with what matters to you most, not what a corporation thinks you should see. Radically different social media, back in the hands of the people.
Creative suite
GNU Image Manipulation Program (G*MP)
The Free & Open Source Image Editor. G*MP is a cross-platform image editor available for GNU/Linux, macOS, Windows and more operating systems.
Krita
Krita is a professional free and open source painting program. It is made by artists that want to see affordable art tools for everyone.
Inkscape
Draw Freely. Inkscape is a Free and open source vector graphics editor for GNU/Linux, Windows and macOS.
Kdenlive
KDE
Free and Open Source Video Editor.
Audacity
Free, open source, cross-platform audio software.
Scribus
Open Source Desktop Publishing.
Internet censorship and shutdowns
OONI Explorer
Open Observatory of Network Interference (OONI)
OONI Explorer is an open data resource on internet censorship around the world. Since 2012, millions of network measurements have been collected from more than 200 countries. OONI Explorer sheds light on internet censorship and other forms of network interference worldwide.
OONI Probe
Open Observatory of Network Interference (OONI)
Are websites and social media apps blocked? Is your network unusually slow? Run OONI Probe to find out! With this app, you will examine the blocking of websites and instant messaging apps, measure your network’s speed and performance, and check whether systems that could be responsible for censorship and surveillance are in your network.
- User Guide: OONI Probe Mobile App
- User Guide: OONI Probe Desktop App
- Risks: Things you should know before running OONI Probe
Cost Of Shutdown Tool (COST)
NetBlocks
NetBlocks Cost of Shutdown Tool™ (COST) is a data-driven online service that enables anyone – including journalists, researchers, advocates, policy makers, businesses, and others – to quickly and easily produce rough estimates of the economic cost of Internet disruptions.
Playful things
Cookie Consent Speed.Run
Fred Wordie
Since GDPR came into our lives, we’ve all had to struggle with obtaining our basic privacy rights. With each cookie banner we have all been honing our skills, learning to navigate ambiguous options and distrust obvious buttons. Now is your chance to show what you have learnt.
Are you anonymous?
Gautam Krishna R
Do you think that switching to your browser’s private browsing mode or incognito mode will make you anonymous? Sorry to disappoint you, but you are wrong! Everyone can track you. You can check it out for yourself.
Click Click Click
Moniker and VPRO
Created by Moniker (Roel Wouters & Luna Maurer) and made in conjuction with We Are Data travelling installation, Clickclickclick.click reveals the browser events used to monitor our online behaviour.
Crytch
Moritz Ebeling and Leon Lukas Plum
Crytch (“encrypt a sketch”) is an online tool for creating encrypted messages. It follows the concept of visual cryptography: The information is present but hidden in chaos while only the correct key can reassemble the correct image. Inspired by the techniques from Moni Naor and Adi Shamir, we translated the idea to digital vector line-drawings: When anchorpoints are separately moved in different directions, the original image becomes distorted, lines that previously displayed information become meaningless.
Advanced tools
Dangerzone
Freedom of the Press Foundation (FPF)
Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs.
Haven: Keep Watch
Freedom of the Press Foundation (FPF) and Guardian Project
Protect personal spaces and possessions without compromising privacy.
Tails
Tails is a portable operating system that protects against surveillance and censorship.
- How Tails works
- Install Tails
- Documentation
- Warnings: Tails is safe but not magic!
- Donate to fight surveillance and censorship
QuickHash GUI
Ted Smith
QuickHash GUI is an open-source graphical interface data hashing tool for Linux, Windows, and macOS.