Semantic search

Jump to: navigation, search


Privacy Badger
Privacy Badger automatically blocks spying ads and invisible trackers as you browse. It's there to ensure that companies can't track your browsing without your consent. Privacy Badger sends the Do Not Track header with each request and evaluates the likelihood that you are still being tracked. If a domain appears to be tracking you on multiple websites, Privacy Badger automatically blocks your request from being sent to the tracking domain. Our extension shows you one of three states for each tracker. Red means block the tracker. Yellow means that we don't send cookies or referers to the tracker. Green means unblocked (probably because the third party does not appear to be tracking you - yet). You can click on the Privacy Badger icon in your browser's toolbar if you wish to override the automatic blocking settings. Nothing can stop the Privacy Badger from eating cookies when it's hungry! Privacy Badger is a project of the Electronic Frontier Foundation (https://www.eff.org)
Privacy Redirect
Redirects Twitter, YouTube, Instagram, Google Maps and Reddit requests to privacy friendly alternatives such as Nitter, Invidious, Bibliogram and OpenStreetMap. Allows for setting custom instances or random choice, toggling all redirects on/off and more.
Privoxy
Privoxy is a Web proxy based on Internet Junkbuster with advanced filtering capabilities for protecting privacy, filtering Web page content, managing cookies, controlling access, and removing ads, banners, pop-ups, and other obnoxious Internet junk. It is useful for both stand-alone systems and multi-user networks.
Prousdata
Prousdata restores files and folders for next user session. Main tool helps to manage protections scope: user, elements, forbids.
Proxyknife Heckert gnu.tiny.png
GNU Proxyknife is a customizable multithread proxy hunter. It can help users behind strict firewall find suitable free proxies. gnu Proxyknife reads proxylist1 from the file, stdin or the web, then validates the free proxies and prints the good ones. Time intervals and the others which are userful to estimate the speed or capability of every proxy are also printed. The whole processing can be customized by the user, which is different from the other hunters. In url mode, Proxyknife can read a large number of proxies on machines with little memory. It works on GNU/Linux, SunOS, OSF1 and more.
PyBitmessage
PyBitmessage is the official instant messaging client designed for Bitmessage(a P2P encrypted decentralised communication protocol).
Red Matrix
Originally authored by Mike Macgirvin (also the original author of Friendica), the RedMatrix is a super network created from a huge number of smaller independent and autonomous websites - which are linked together into a cooperative publishing and social platform. It consists of an open source webapp providing a complete multi-user decentralised publishing, sharing, and communications system - known as a "hub". Each hub provides communications (private messaging, chat, blogging, forums, and social networking), along with media management (photos, events, files, web pages, shareable apps) for its members; all in a feature-rich platform. These hubs automatically reach out and connect with each other and the rest of the matrix. Privacy and content ownership always remain under the direct personal control of the individual; and permission to access any item can be granted or denied to anybody in the entire matrix. What makes the RedMatrix unique is what we call "magic authentication" - which is based on our groundbreaking work in decentralised identity services. No other platform provides this ability. Within the matrix the boundaries between different hubs are blurred or seemingly non-existent. Identity in the matrix is considered transient and potentially nomadic. "Who you are" has nothing to do with "what computer you're connected to", and website content can adapt itself according to who is viewing it. You have the ability to "clone" your identity to other hubs; which allows you to continue to communicate with your friends seamlessly if your primary hub is ever disabled (temporarily or permanently). The RedMatrix is ideal for communities of any size, from private individuals and families to online forums, business websites, and organisations. It can be used by anybody who has communications or web content that they wish to share, but where they desire complete control of whom they share it with.
Ricochet
Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with your contacts without revealing your location or IP address. Instead of a username, you get a unique address that looks like ricochet:rs7ce36jsj24ogfw. Other Ricochet users can use this address to send a contact request - asking to be added to your contacts list. You can see when your contacts are online, and send them messages (and soon, files!). Your list of contacts is only known to your computer - never exposed to servers or network traffic monitoring. Everything is encrypted end-to-end, so only the intended recipient can decrypt it, and anonymized, so nobody knows where it’s going and where it came from.
Sandstorm
Some web applications, particularly federated ones, are suitable for running on your local machine rather than hosting on an remote server you don't control. Sandstorm is a platform designed to help you run and maintain these applications, retain your data on your own machine, and optionally use their federation features to contact and publish to remote servers at your own discretion. Representative webapps supported include Ghost (blogging), GNU MediaGoblin (media sharing), Mailpile (email), Tiny Tiny RSS (feedreading) and others.
Seafile
Seafile provides the full facilities to replace proprietary cloud storage and file syncing solutions. It offers the ability to self-host the server on your own hardware as well as make use of commercial services that host it for you. It offers a desktop client for all major operating systems. Major features include:
  • File syncing
  • File version control
  • Client side encryption
  • Public share linking
  • Group and Organisation collaboration
Seafile Community Edition may be used as a free software replacement for Dropbox, Spideroak, Wuala and similar proprietary programs and services. Seafile Professional Edition is not free software as per the license outlined here: https://manual.seafile.com/deploy_pro/seafile_professional_sdition_software_license_agreement/
Searx.me 0.9.x
An add-on bassed on searx.me, a hackable metasearch default engine for Firefox searx.me 0.9.x is an add-on for privacy-respecting search for Firefox. searx.me 0.9.x is bassed on searx.me wich is a privacy-respecting free metasearch engine. Features
  • Self hosted
  • Does not track its users
  • Does not share its users data with third parties
  • Does not use cookies by default
  • Does not profile its users
  • Does not collect its users data
  • Offers secure, encrypted connections (HTTPS/SSL)
  • Hosted by organisations, such as La Quadrature du Net, which promote digital rights
SecureChatAnywhere
SecureChatAnywhere is a lightweight program written in Java with the purpose of making it easy to encrypt and decrypt any kind of text messages using AES-128/CBC symmetric encryption. The graphical user interface (GUI) is designed as a convenient "copy & paste tool" for computers to manage encryption and decryption stand-alone, in other words without relying on any kind of external communication.
Send (file sharing)
Send is a self-hosted tool that allows sending files with encryption. It's a community fork of Firefox Send, a discontinued service by Mozilla. Files are encrypted in the browser before being uploaded to the server. Files are stored for 24 hours then deleted from the server. ffsend is a CLI client for Send. A list of available instances can be found here.
SilverTunnel-NG
SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org)
SimpleLogin
SimpleLogin is a service that allows users to use email aliases through its web application. Users can prevent online services from knowing their real email address by using email aliases when signing up. If an alias is no longer needed, it can simply be deleted.
Smart HTTPS
Automatically changes HTTP addresses to the secure HTTPS, and if loading encounters error, reverts it back to HTTP.
Startpage HTTPS Privacy Search Engine
Add Startpage - The World's Most Private Search Engine - to your search box. Startpage does not record your IP address. Search the Web in the best possible privacy!
Subrosa
Subrosa is an end to end encrypted messaging, voice, and video chat app that runs in the browser. Subrosa supports group chats, desktop notifications, and much more without requiring a download. Encrypted user blobs are synchronized to Subrosa's servers, however Subrosa never has access to the keys required to decrypt the blob or messages.
Terms of Service; Didn’t Read
Terms of Service; Didn't Read (ToS;DR) is a community project and browser plugin which aims to analyze and grade the terms of service (TOS) and privacy policies of major Internet sites and services. Each aspect of a TOS or privacy policy is assessed as positive, negative, or neutral. Services are graded from A (best) to E (worst).
Tor Browser
Tor Browser, previously known as Tor Browser Bundle (TBB), is the flagship product of the Tor Project. It consists of a modified Mozilla Firefox ESR web browser, the TorButton, TorLauncher, NoScript and HTTPS Everywhere Firefox extensions and the Tor proxy. The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.

See also

Tor2web
The software originally developed by Aaron Swartz and Virgil Griffith is now developed and mainteined by the Hermes Center for Transparency and Digital Human Rights as part of the (GlobaLeaks) project.
TorBirdy
The TorBirdy extension configures Mozilla Thunderbird (Icedove and possibly other related Mozilla mail clients) to make connections over the Tor anonymity network. It also takes steps to protect anonymity at the application level by reducing unique identifiers, disabling unsafe plugins, disabling insecure protocols, helpfully configuring other software such as Enigmail and GnuPG in anonymity protecting ways and more.
UBO-Scope
Warnings: uBO-Scope will be able to function accurately only for WebExtensions-based blockers -- it is unable to do its job properly with legacy-based blockers. The popup panel of this extension may sometimes be affected by an issue which has been fixed in Firefox 57: "WebExtension browser action popup scrolls to the top on changing an element's style" https://bugzilla.mozilla.org/show_bug.cgi?id=1324499 You should read the documentation to better understand purpose and usage: https://github.com/gorhill/uBO-Scope#preamble To inform you about your own third-party exposure on the web pages you visit through a third party exposure score. Important: The lower the 3rd-party exposure score, the better. Third-party ("3rd-party") exposure is quite an important component of the more general concept of privacy exposure. In the scope of uBO-Scope, "3rd-party" is defined as follow: A network request to a remote server which has a different base domain name than the base domain name of the URL in the address bar is deemed "3rd-party". A 3rd-party exposure score is derived not only from the number of distinct third parties on a web page, but also from the ubiquitousness of each of these distinct third parties. The ubiquitousness of a specific 3rd party is measured according to how frequently this 3rd party is used on web pages you visit. This means the ubiquitousness of a 3rd party will be representative of your browsing history and whether the 3rd party was blocked or not on the pages you visited. uBO-Scope does not alter network traffic, it only observes it. For every network request, blocked or allowed, it will extract the base domain name. If the base domain name of the network request is different from the base domain name extracted from the URL of the web page, the network request will be deemed 3rd-party and uBO-Scope will store the pair [3rd-party base domain name, 1st-party base domain name] in its database, to be used to compute and show your overall 3rd-party exposure score of web pages you visit in the future. Your 3rd-party exposure score depends on your past browsing history and the tools you used (if any) which have blocked network requests, and how these tools (if any) are configured. uBO-Scope does not depend on uBlock Origin to do its job, it will work with any content blocker, or no content blocker.
UBlock Origin
µBlock Origin (µBO, pronounced micro-block origin) is a wide-spectrum blocker for browsers with a simple point-and-click interface to allow users to filter and block server requests, domains, scripts, and more. By default it blocks ads, trackers and malware sites. Users should note that uBlock Origin and uBlock, while they have some history, are now distinct programs whose code base has diverged form each other for some time, with uBlock Origin being the more actively developed and better maintained of the two.
UMatrix
uMatrix (stylized µMatrix) is a point-and-click matrix-based firewall, with many privacy-enhancing tools. Point & click to forbid/allow any class of requests made by your browser. Use it to block scripts, iframes, ads, facebook, etc.
Ublock-origin
uBlock Origin (or uBlock) is not an ad blocker; it's a general-purpose blocker. uBlock blocks ads through its support of the Adblock Plus filter syntax. uBlock extends the syntax and is designed to work with custom rules and filters. Furthermore, advanced mode allows uBlock to work in default-deny mode, which mode will cause all 3rd-party network requests to be blocked by default, unless allowed by the user. That said, it's important to note that using a blocker is NOT theft. Don't fall for this creepy idea. The ultimate logical consequence of blocking = theft is the criminalisation of the inalienable right to privacy. Ads, "unintrusive" or not, are just the visible portions of privacy-invading apparatus entering your browser when you visit most sites nowadays. uBlock₀'s main goal is to help users neutralize such privacy-invading apparatus — in a way that welcomes those users who don't wish to use more technical, involved means (such as µMatrix). EasyList, Peter Lowe's Adservers, EasyPrivacy and Malware domains are enabled by default when you install uBlock₀. Many more lists are readily available to block trackers, analytics, and more. Hosts files are also supported. Once you install uBlock₀, you may easily un-select any of the pre-selected filter lists if you think uBlock₀ blocks too much. For reference, Adblock Plus installs with only EasyList enabled by default.
VoteOn.Date
Quickly and easily coordinate meetups. Free, but also anonymous, with no login required. Name your event, select time slots, and invite participants
Wellenreiter
Wellenreiter is a GTK/Perl wireless network discovery and auditing tool. Prism2, Lucent, and Cisco based cards are supported. It is the easiest to use Linux scanning tool. No card configuration has to be done anymore. The whole look and feel is pretty self-explaining. It can discover networks (BSS/IBSS), and detects ESSID broadcasting or non-broadcasting networks and their WEP capabilities and the manufacturer automatically. DHCP and ARP traffic are decoded and displayed to give you further information about the networks. An ethereal/tcpdump-compatible dumpfile and an Application savefile will be automaticly created. gpsd can be used to track the location of the discovered networks.
Wikipedia (English SSL)
Wikipedia is an openly-editable, free content internet encyclopedia. This search bar add-on utilizes SSL to protect searches between You and Wikipedia.
Wikipedia (SSL)
Wikipedia is an openly-editable, free content internet encyclopedia. This search bar add-on utilizes SSL to protect searches between You and Wikipedia.
Wireguard
WireGuard is a virtual private network software. It is built in to the Linux (and linux-libre) kernel by default. It intends to be faster and simpler than IPSec and OpenVPN. While initially released for the Linux kernel, it is now a cross-platform project. Some users consider WireGuard to already be the most secure and easiest to use among all of the VPN solutions.


Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.