26 April 2023 | Privacy, Self-hosting
A list dedicated to providing the best tools and services to protect your online privacy. [UPDATED – 05 May 2023]
Please keep in mind that the software programs and services listed below are based on my personal knowledge and experience. I have not received any payment to include any specific software program or service in this list, and there are no affiliate links. However, it’s important to do your own research and make your own informed decisions based on your unique needs and circumstances.
This Awesome Privacy list has been inspired by privacytools.io, awesome-privacy.xyz, awesome-privacy by pluja and many others.
People often mix the concepts of privacy and anonymity, and sometimes security too. Here is a table that provides a comparison of privacy, anonymity, and security to help clarify the distinctions between these related concepts.
Concept | Definition | Example |
---|---|---|
Privacy | The ability to control access to personal information or actions. | Using a VPN to browse the internet to prevent your ISP from spying on you. |
Anonymity | The state of being unknown or unidentifiable. | Using a disposable email address when signing up for online services. |
Security | The protection of assets or resources from unauthorized access, use, disclosure, disruption, modification, or destruction. | Using a firewall to prevent unauthorized access to a computer network. |
Suppose you have a diary that you keep locked in a drawer in your bedroom. The diary is your personal possession, and you have the right to keep it private. The lock on the drawer provides a level of security that prevents others from accessing your diary without your permission. If you were to write in the diary using a pseudonym, you would be maintaining anonymity.
So, in this example, privacy refers to the ability to keep personal information or possessions away from others. Security refers to the protection of personal possessions from unauthorized access or theft. Anonymity refers to the state of being unknown or unidentifiable.
With this article, I hope to achieve the goal of helping you maintain all three of these.
All the pieces of software and services mentioned in this article are open-source.
Open source software is important for privacy because it enables greater transparency and accountability in the development of software. Since the source code is freely available for anyone to view, it can be inspected by security experts to identify any potential security vulnerabilities or backdoors that could be exploited by malicious actors. This means that security vulnerabilities can be identified and patched more quickly, reducing the risk of data breaches and other security incidents that could compromise personal information.
Do you have curtains in your home? This is because you want to keep certain activities private and don’t want strangers to know what you do. But why would you want large companies such as Google, Apple, Microsoft, Oracle, and even smaller companies to collect your personal information? Your answer may be, “I like targeted ads as they help me find new products,” or, “I want those companies to improve their products to help me serve better.” But that is not all they use your data for. Take a look at these articles:
Read this – https://thenextweb.com/news/read-this-if-youve-got-nothing-to-hide
I can cite over a hundred articles like these, but it is up to you to understand why privacy matters.
Apps that come preinstalled on phones, as well as those on the Google Play Store, often contain advertisements and tracking mechanisms. They may also request access to unnecessary information. Using open-source alternatives for basic apps can provide a more private and secure experience for users.
Stay away from app stores like Google Play Store, Amazon App Store, Samsung App Store, GetApps etc., as they are known to collect user data, such as app usage and location information.
Although, the best course of action is to download the source code and compile the application yourself, but the following alternates can also be helpful.
Alternates | Prospective Advantages | Conservative Disadvantages |
---|---|---|
F-Droid | ||
Aurora Droid | ||
SkyDroid | ||
Aurora Store |
Other alternates are Obtanium and FossDroid.
Stay away from preinstalled and third-party proprietary camera apps as they are known to collect user data.
Following are some better alternates:
Alternates | Prospective Advantages | Conservative Disadvantages |
---|---|---|
Libre Camera | ||
OpenCamera Sensors |
Another good alternate is AiCamera.
Stay away from preinstalled and third-party proprietary keyboards like GBoard, SwiftKey Keyboard, Samsung Keyboard, Mint Keyboard etc., as they are known to collect user data, including usage and clipboard data.
Following are some better alternates:
Alternates | Prospective Advantages | Conservative Disadvantages |
---|---|---|
OpenBoard | ||
FlorisBoard |
Other alternates are Indic Keyboard and AnySoftKeyboard.
Stay away from preinstalled and third-party proprietary File Manager apps like EZ Explorer, FK Commander etc., as they are known to collect user data, including usage data and metadata.
Following are some better alternates:
Alternates | Features |
---|---|
Material Files | |
Ghost Commander |
Other alternates are Simple File Manager and Amaze File Manager.
The choice of your operating system is very important as it is the most important piece of software on your device. And since it pretty much controls all your device’s hardware and software, it can have a significant impact on your privacy.
Choosing operating systems like Stock Android, iOS, Windows, and macOS can compromise privacy as these systems often come with pre-installed apps and services that collect user data. These systems also often rely on cloud-based services that store user data, increasing the risk of data breaches and privacy violations. In addition, these systems are closed-source, which means that their source code is not available to the public, making it difficult to identify potential security vulnerabilities. Finally, these systems are typically designed to work with proprietary hardware, which can limit the user’s ability to control their data and their device.
Imagine you have a secret toy that you do not want anyone else to know about. Your toy is hidden in a special place in your room where nobody can see it or touch it. Now, imagine that your parents can see everything you do in your room, even your secret hiding place. They can also tell your friends and other people about your toy.
Just like your secret toy, your personal information on your device is also private, and you do not want anyone else to know about it. If you choose a privacy-oriented operating system, it will help you keep your personal information safe and hidden from others, just like your secret toy. But if you pick an operating system that does not prioritise privacy, it might share your personal information with others, just like your parents sharing about your toy with your friends.
It is important to recognise that when it comes to iOS, privacy may not be a top priority for Apple as a company. Read these articles: 1, 2, 3.
Similar to Apple, Google also collects and tracks your data on Android devices. When using an Android device, Google’s apps and services are integrated deeply within the system, allowing them to collect a vast amount of user data. Read these articles: 1, 2, 3.
However, there are several custom ROMs available that remove Google’s presence, and provide additional security and privacy features for users. Following are some options:
ROMs | Proactive Advantages | Conservative Disadvantages |
---|---|---|
LineageOS | ||
GrapheneOS | ||
/e/OS |
Please note that it is advisable to avoid rooting or flashing a custom ROM onto your device unless you possess advanced technical knowledge. If you still need an alternate, you may follow this Lemmy post – 100% FOSS Smartphone Hardening non-root Guide 4.0.
Avoid using proprietary operating systems like Windows and macOS. They are known to be closed-source, which means that their source code is not open to the public. This makes it difficult to know what kind of data is being collected and how it is being used. In addition, they are also known to have several security vulnerabilities that can be exploited by hackers to gain access to your personal information.
Read these articles: 1, 2, 3, 4, 5.
Following are some good, beginner-friendly alternates:
Operating Systems | Proactive Advantages | Conservative Disadvantages |
---|---|---|
Linux Mint | ||
Manjaro | ||
Edubuntu |
Following are some good alternative for advanced users:
Operating Systems | Proactive Advantages | Conservative Disadvantages |
---|---|---|
OpenBSD | ||
Arch Linux | ||
Tails | ||
Qubes OS |
There are a lot more options to choose from. If you need help picking a Linux-based operating system, Distrochooser is a very helpful tool.
If, for any reason, you have to rely on Microsoft Windows, you can debloat it and remove most of the telemetry using either AtlasOS or creating your own Tiny11 ISO using this guide, for a relatively safer experience.
Staying away from pre-installed OS on your Smart TV, like Google TV, WebOS etc., is a good idea. You can use the following for a safer experience:
Health related data is the considered to be the most sensitive of all. Staying away from pre-installed OS on your smartwatches is a good idea. You can use the following for a safer experience:
Download the operating systems from official sources only.
A password manager is a tool that securely stores your login information for websites and applications. With the prevalence of online accounts, it’s common for individuals to have dozens or even hundreds of different usernames and passwords to remember. Password managers alleviate the need to memorise multiple login credentials by providing a secure digital vault for storing them. This not only makes it easier to manage passwords, but it also improves security by allowing users to generate and store strong, unique passwords for each account.
Although, most password managers offer built-in 2FA features, it is not recommended to use it because it, kind of, defeats the purpose of “two-factors” as both, passwords and 2FA codes are available in one app.
People should avoid closed-source password managers, like 1Password, Dashlane, LastPass etc., because they cannot be audited or verified by the public, leaving users to rely on the company’s word that their passwords are being stored and managed securely. Closed-source password managers may also have backdoors or vulnerabilities that can be exploited by hackers or government agencies. Additionally, closed-source password managers may collect and sell user data without their knowledge or consent. Read these articles – 1, 2.
Following are some good alternates:
Password Manager | Proactive Advantages | Conservative Disadvantages |
---|---|---|
Bitwarden | ||
Vaultwarden | ||
KeePassXC (Linux/Windows/macOS) KeePassDX (Android) StrongBox (macOS/iOS) KeeWeb (WebApp) |
||
LessPass (Android/iOS/Browser Add-On/CLI) |
Some other good options are Padloc and Passbolt. For some users Proton Pass (Beta) may be a good option, but don’t keep all your apples in one basket.
Privacy analysers are tools that scan applications on your device and identify privacy and security risks. They can help you identify apps that collect unnecessary data or have security vulnerabilities, giving you greater control over your online privacy. These tools are particularly important in today’s world, where many apps and services collect large amounts of user data without clear disclosure or user consent. By using a privacy analyser, you can identify problematic apps and take steps to protect your personal information.
Following are some good analysers that you can use to aid your privacy:
Application | Features |
---|---|
Exodus | |
Pi-hole | |
OpenWPM |
Stay away from search engines made by Big Tech companies who do not respect your privacy, like Google, Microsoft Bing etc.
Read these articles – 1, 2.
Consider using the following alternates:
Application | Features |
---|---|
SearxNG | |
DuckDuckGo |
There are many other good options you may want to look into, like Startpage, Qwant and Whoogle.
You should always turn on 2FA whenever it is possible. Stay from SMS based 2FA and authenticator apps like Authy and Google Authenticator, that do not give the utmost importance to your privacy.
Instead, consider using any of the following as your preferred 2FA app:
Application | Features |
---|---|
Aegis (Android) | |
Tofu (iOS) | |
Gnome Authenticator (Linux) |
Some other good alternates are ente Auth, WinAuth, Authenticator Pro and Owky. Most password managers support generating 2FA codes, but it is not recommended to use a single app as both – a password manager and a 2FA code generator.
While many people think of VPNs as tools for hiding their IP address and encrypting internet traffic, VPNs can also serve a variety of other purposes. For instance, businesses often use VPNs to connect remote employees to their company’s network securely. This allows employees to access important files and resources from anywhere in the world without compromising security. In addition, VPNs can be used to create mesh networks that allow multiple devices to connect and communicate directly with each other. This is especially useful in disaster relief scenarios, where traditional communication infrastructure may be damaged or destroyed. By using VPN technology to establish a mesh network, first responders are able to coordinate more effectively and respond to emergencies more efficiently.
To put it simply, a VPN is much more than just an IP hiding app. It’s a powerful tool that can be used in a variety of settings to solve a wide range of problems. Whether you’re a remote worker who needs to connect to your company’s network securely, or a first responder who needs to communicate effectively in a disaster zone, a VPN can help you stay connected and protected.
If you are using applications and protocols like Hamachi, NetCloud by Cradlepoint, Cisco’s L2F and L2TP, Apple’s SSTP etc., in your business environment or even at home, then shifting to an open source alternative is a good idea. Following are some good options:
Application | Features |
---|---|
Tailscale | |
Headscale | |
strongSwan | |
PiVPN |
Some other solutions that you may want to look at are SoftEtherVPN and ZeroTier.
As you already know, a VPN can also provide some form of online privacy and can help with geo-blocked content on the internet, but choosing a bad VPN provider can make things worse. For example, the free VPN apps on Google Play Store are a bad idea, as they make money by selling your data to third-parties.
Following are some reputed VPN providers in the privacy community:
Application | Features |
---|---|
Mullvad | |
ProtonVPN | |
IVPN | |
Xeovo VPN |
Some other privacy focused VPN providers are RiseupVPN, AirVPN and AzireVPN.
Please note, that setting up your own VPN may not be a very good idea, especially if you are the only individual using it. A personal VPN server on a VPS can prevent your ISP from tracking and logging the sites you visit, and is a better option than using an untrustworthy VPN provider. But online service providers will be able to track you and make a detailed profile about you since you are the only one connecting to their servers using your VPS’s IP address.
It is a good idea to avoid closed source, proprietary browsers, like Google Chrome, Microsoft Edge, Opera etc., as they tend to collect a lot of user data. Read this study. There are many good, privacy focused alternatives, that will provide you with a much better experience.
Web Browsers | Proactive Advantages | Conservative Disadvantages |
---|---|---|
Mozilla Firefox | ||
LibreWolf | ||
Brave | ||
Tor Browser |
Other good options are Un-googled Chromium, Mullvad Browser and Privacy Browser.
To harden Firefox and its forks, you can check out arkenfox/user.js, Firefox Profile Maker or ArchWiki Guide. There are plenty of other tutorials/guides as well.
All third-party web browsers on iOS are just Safari in disguise. The following list contains browser suggestions for Android devices only.
Web Browsers | Features |
---|---|
Mull | |
Bromite | |
Brave | |
Tor Browser |
Another good option is Privacy Browser.
It is a good idea to keep JavaScript turned off in your browser, unless you really, really need it. NoScript is a browser add-on that lets you control it easily.
Using proprietary apps and protocols for social media and communication/messaging can potentially harm users’ privacy in several ways. Data collection, lack of transparency, third-party sharing, invasive permissions, backdoors and vulnerabilities, lack of end-to-end encryption, vendor lock-in, monetisation of user data, limited user control, lack of accountability etc. are a few concerns.
Dating apps often collect a wide range of personal information, including your location, age, gender, sexual orientation, and even your preferences. This data can be used to build detailed profiles of users, potentially revealing sensitive and private information. They share user data with third-party companies for advertising and marketing purposes. This can lead to the creation of comprehensive user profiles, which are then used for targeted ads or sold to other companies. They typically use location data to match users with potential partners. While this is essential for their functionality, it also means that your movements and routines can be tracked, potentially compromising your privacy. Dating apps use complex algorithms to recommend potential matches. These algorithms may take into account your behaviour on the app, preferences, and interactions. While they aim to improve user experiences, they can also be used to predict user behaviour and target them with specific content or ads.
Like any online platform, dating apps are vulnerable to data breaches and cyberattacks. If these companies do not have robust security measures in place, user data could be exposed to hackers. In some cases, dating apps have faced legal action and investigations over their data practices. Users may not always be aware of how their data is being used or shared.
Read these articles – 1, 2, 3.
Consider avoiding proprietary apps like Tinder, OKCupid etc.
Alovoa is a privacy respecting, free and open-source alternate to these services. As sensitive data is heavily encrypted, it will be safe even if a data breach were to occur.
Bobby must be madd.
Music – Other Projects – – Privacy Policy – About
Comments