<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[PrivacyTools]]></title><description><![CDATA[You are being watched. We’re providing resources to protect your privacy.]]></description><link>https://blog.privacytools.io/</link><image><url>https://blog.privacytools.io/favicon.png</url><title>PrivacyTools</title><link>https://blog.privacytools.io/</link></image><generator>Ghost 3.14</generator><lastBuildDate>Thu, 29 Jul 2021 19:07:24 GMT</lastBuildDate><atom:link href="https://blog.privacytools.io/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[The Future of PrivacyTools]]></title><description><![CDATA[<p>Since 2019, the PrivacyTools project has grown from its humble beginnings as a simple recommendations website. We operate huge online communities that consist of a number of federated platforms full of incredible people sharing advice and discussing online privacy.</p><p>Our work maintaining PrivacyTools has been extremely difficult of late without</p>]]></description><link>https://blog.privacytools.io/the-future-of-privacytools/</link><guid isPermaLink="false">60fcff959db12a03a603a0dc</guid><dc:creator><![CDATA[Daniel Gray]]></dc:creator><pubDate>Tue, 27 Jul 2021 16:18:45 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2021/07/goodcover-4.svg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2021/07/goodcover-4.svg" alt="The Future of PrivacyTools"><p>Since 2019, the PrivacyTools project has grown from its humble beginnings as a simple recommendations website. We operate huge online communities that consist of a number of federated platforms full of incredible people sharing advice and discussing online privacy.</p><p>Our work maintaining PrivacyTools has been extremely difficult of late without access to key assets such as the domain and without the participation of its founder. As a result, we as a team decided to to hold a <a href="https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw">vote for a new name</a>.</p><p>This name change is the first step in this process of regaining our independence as a community. Eventually, we plan on creating a new legal organization designed around the community to ensure our long-term sustainability. This will take some careful planning and time to get right, but we’re confident we can prevent this from ever happening again, and keep us independent of any one team member.</p><p>This was not an easy decision to make as we would of course have preferred to stick with PrivacyTools and take the organization to new heights, but without control or ownership over key assets such as the privacytools.io domain, that vision was impossible.</p><p>Unfortunately with federated services like Mastodon, Matrix and PeerTube we can't simply change the domain name for technical reasons. We plan to run these services on the old domain for a while yet.</p><p>As the long-term stability of these services is very much in question, we strongly encourage users of <a href="https://chat.privacytools.io/">chat.privacytools.io</a>, <a href="https://social.privacytools.io/">social.privacytools.io</a>, <a href="https://tube.privacytools.io/">tube.privacytools.io</a> to switch to other providers as soon as possible. It is possible we might bring these services back under our new domain, but that is yet to be determined.</p><p>Thank you for being with us on this journey, we hope you’ll stick around and see what’s next.</p><p>~ The (formerly) PrivacyTools Team</p>]]></content:encoded></item><item><title><![CDATA[What are security, privacy, and anonymity?]]></title><description><![CDATA[<p>We may think that we know the differences between privacy, security and anonymity, however we often mix them up. People will often criticize a product or service as “not private” when they really mean “not anonymous.” Privacy, security, and anonymity often complement each other but they are not always dependent</p>]]></description><link>https://blog.privacytools.io/privacy-security-anonymity/</link><guid isPermaLink="false">5fc95fe22275c103a845ca84</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Opinion]]></category><dc:creator><![CDATA[Nate Bartram]]></dc:creator><pubDate>Tue, 23 Feb 2021 10:21:42 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1548092372-0d1bd40894a3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXwxMTc3M3wwfDF8c2VhcmNofDF8fHNlY3VyaXR5fGVufDB8fHw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1548092372-0d1bd40894a3?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=MXwxMTc3M3wwfDF8c2VhcmNofDF8fHNlY3VyaXR5fGVufDB8fHw&ixlib=rb-1.2.1&q=80&w=2000" alt="What are security, privacy, and anonymity?"><p>We may think that we know the differences between privacy, security and anonymity, however we often mix them up. People will often criticize a product or service as “not private” when they really mean “not anonymous.” Privacy, security, and anonymity often complement each other but they are not always dependent on each other and they are definitely not the same thing. A service can be private without being anonymous, or even secure without being private. Which one should you prioritize? To some extent, there are no wrong answers. It really comes down to your threat model and what your desired goal is. It is perfectly fine to pick a product that provides privacy even though it doesn't provide anonymity. Futhermore, it's okay to pick a product that doesn't provide security if it does provide one of the other features. The important thing is that you need to be aware what these products and services are and aren’t offering you so that you can use them correctly.</p><p>There’s lots of ways to define privacy, security, and anonymity. Someone showed me <a href="https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298">this</a> definition and I really liked it. It seems to pretty much hit the nail on the head when applying these terms specifically to data privacy and cybersecurity:</p><p><strong>Anonymity: </strong><em>The sender and/or recipient's real ID is unknown</em></p><p>In the real world this could be a secret admirer sending a valentines day card. Online this could be when the ip (or fp/opsec) footprints cannot lead back to the poster: e.g. Tor</p><p><strong>Privacy: </strong><em>The contents of the message can only be seen/heard by the intended recipient(s)</em></p><p>In the real world this could be a whispered conversation between two people in the middle of Siberia. Online this could be a Signal message, which is end-to-end encrypted and only the recipient &amp; sender can read the contents</p><p><strong>Security</strong> (in the context of privacy/anonymity): <em>The parties involved are who they say they are</em></p><p>In the real world this could be something unique and verifiable such as a passport or fingerprints. Online this could be certificates or PGP signatures.</p><p>These topics often overlap: Privacy can help your security because if people don't know information about you, they can't effectively target you. For example, an attacker that doesn't know who you bank with cannot know which bank to target. Security can protect your privacy by forcibly controlling who has access to that information about you. Let’s take a few examples:</p><p><b>Security without Privacy or Anonymity</b></p><p>The most obvious example of this that comes to mind is Google. Google has had almost no major data breaches in all their years of existence, yet they know almost everything about everyone to the point that the former CEO Eric Schmidt remarked "<a href="https://www.zdnet.com/article/google-even-knows-what-youre-thinking/">We can more or less know what you're thinking about.</a>" Google offers world-class security with zero privacy or anonymity.</p><p><b>Security &amp; (some) Privacy without Anonymity</b></p><p>Consider the renowned encrypted messaging app Signal. Because your phone number is required, you can be unmasked by a court order or even a web search depending on the phone number you use. However, Signal is renowned for having some of the best security in the world, and the content of your messages and the information you transfer will be protected and controlled even if your identity is not. Top-notch security and privacy over the content of your messages, but anonymity cannot be guaranteed.</p><p><b>Anonymity without Security</b></p><p>Cash is a great example of this. Paying for a product in cash preserves your anonymity - unless the business requires it, you don't have to give any kind of information at all. Yet, you have no security if the seller doesn't deliver the item (unless you have a receipt). You have no protection from fraud or anything like that.</p><p><b>Security with Privacy &amp; Anonymity</b></p><p>XMPP is arguably the best example of this. XMPP allows you to sign up without any real information, over a VPN or Tor connection for total anonymity. Additionally, the conversations can be protected by OMEMO encryption, meaning the data itself is also private. When used properly, this is as closed to perfect as you can get, if a bit user-unfriendly. (Editor's note: XMPP is not officially endorsed by PrivacyTools for reasons listed <a href="https://github.com/privacytools/privacytools.io/issues/1854">here</a>.)</p><h3 id="closing-thoughts">Closing Thoughts</h3><p>These three concepts are not necessarily dependent on each other. A secure product does not guarantee privacy, a private product does not guarantee security, and anonymity does not guarantee either. Also as I said before, there is nothing wrong with valuing one facet over another.  It's also okay to use Signal even though it doesn't give you total anonymity. Just be sure you understand how a product is meant to be used and where it both shines and falls short. It would be awful to use Google thinking that it will give your communications total privacy and then your financial details get stolen by a <a href="https://nypost.com/2020/09/23/shopify-says-rogue-employees-may-have-stolen-customer-data/">rogue employee</a>. Or if you used a service like Signal to organize protests in a hostile country only to be arrested once your phone number is unmasked. Know the limitations of the services you choose and decide what features are important to you. It’s also important to know that privacy and security are sliding scales. This is could be an entire blog post on its own. Think of passwords. Any password – even “password” - is technically more secure than no password at all. But a 16-character randomly-generated password is <b>even more</b> secure than “password.” Sometimes it’s okay to find a solution that offers a blend – less privacy in one area in exchange for more security in another, or vice versa. Once again, it all comes back to your threat model, your needs, and your resources.</p><p><em>Cover photo by </em><a href="https://unsplash.com/@fantasyflip"><em>Philipp Katzenberger</em></a><em>. Originally published on <a href="https://thenewoil.xyz/privsecanon.html">The New Oil</a>.</em></p>]]></content:encoded></item><item><title><![CDATA[US Government Continues Encryption War]]></title><description><![CDATA[Wars can be fought in the real world but there is also a virtual battlefield - and it is just as harmful. ]]></description><link>https://blog.privacytools.io/us-government-continues-encryption-war/</link><guid isPermaLink="false">5f7ae8b16fef6403bbf0d1f6</guid><dc:creator><![CDATA[Freddy ]]></dc:creator><pubDate>Sat, 07 Nov 2020 04:46:46 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2020/10/binarycrypto.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2020/10/binarycrypto.png" alt="US Government Continues Encryption War"><p>Wars can be fought in the real world but there is also a virtual battlefield - and it is just as harmful. The <a href="https://www.judiciary.senate.gov/press/rep/releases/graham-cotton-blackburn-introduce-balanced-solution-to-bolster-national-security-end-use-of-warrant-proof-encryption-that-shields-criminal-activity">Lawful Access to Encrypted Data Act</a> is the latest attempt to access people's encrypted data and it serves as another reinforcement.</p><blockquote>This type of “warrant-proof” encryption adds little to the security of the communications of the ordinary user, but it is a serious benefit for those who use the internet for illicit purposes.</blockquote><p>This statement is plainly false. Encryption has as much benefit, if not more, for ordinary users. Encryption is used in every website that has the padlock sign (HTTP<strong>S</strong>), in every iPhone app since 2016, in every Android app since 2018 and in almost every modern application - and for good reason. Encryption helps protect sensitive information (such as that shared with your bank, or any time you use a password on a website). It may also help protect files which are not in use (at rest), or in the event the server is accessed by an unauthorised person (such as a criminal attempting to siphon off important data).</p><p>In 2016, Bruce Schneier wrote an article on <a href="https://www.schneier.com/essays/archives/2016/04/the_value_of_encrypt.html">the value of encryption</a> clearly outlining why encryption is needed. Schneier went on to say that when the US Government was <a href="https://blog.privacytools.io/us-government-wages-war-on-encryption/">previously</a> <a href="https://en.wikipedia.org/wiki/Crypto_Wars">fighting cryptography</a>, he wondered if they were aware how much they relied on it themselves. No-one is above the law, so if you ban strong encryption, the FBI should not use it either. Attorney General Barr <a href="https://www.theregister.com/2019/07/23/us_encryption_backdoor/">gives the impression</a> that the government, along with certain large companies, should have an exception to the law. Barr recognises that there are some things that are secret, but he doesn't recognise that regular citizens might also want to enjoy privacy as well.</p><blockquote>“We are not talking about protecting the nation’s nuclear launch codes,” Barr told the International Conference on Cyber Security at Fordham University.</blockquote><blockquote>“Nor are we necessarily talking about the customized encryption used by large business enterprises to protect their operations. We are talking about consumer products and services such as messaging, smart phones, email, and voice and data applications."</blockquote><p>Somehow, because your average Joe does not have government level secrets, he is no longer entitled to encryption. We are all humans, and we all need privacy. By taking away encryption, you are taking away privacy online.</p><p>This act is aimed at Section 230, which ensures that no interactive computer service provider shall be treated as the publisher or speaker of content published by their users - an essential part of the survival of all search engines, social media platforms and video sharing sites. Without it, the internet would become a self-censored platform – one that is more concerned with fending off lawsuits than providing a medium for ideas and innovation as it originally was.</p><p>It is easy to sympathise with an act that is being pushed through on the grounds that terrorists, paedophiles and drug-dealers all use encryption. Reading the <a href="https://www.nytimes.com/interactive/2019/09/28/us/child-sex-abuse.html">New York Times</a>' <a href="https://www.nytimes.com/2020/02/19/podcasts/the-daily/child-sex-abuse.html">reporting</a> on online images of  sexual abuse would leave some wondering why this sort of Act has not been passed already. Equally, if no-one had encryption then it would certainly be easier to catch the aforementioned crooks and fellons.</p><p>Encryption, however, did not create these problems; these crimes were around long before it came into existence. In addition, those who partake in illicit activity will always find loopholes and ways to do so, such as using products or encryption tools that don't have backdoors. Criminals do not obey laws by definition. Furthermore, many innocent people use similar encryption to these criminals, but only to protect privacy, not hide any illegalities and yet they could still be subject to some kind of prosecution. It is assumed the use or possession of non-backdoored software would also become an offence if too many people used that instead. Statistically, it's agreed there are many more innocent people in society than criminals; those innocent people would be punished as a result of the bad actions of a few.</p><p>It is not feasible for a government to make a law of this sort that can apply outside of it's own country. Governments around the world would almost certainly disagree on which countries should be allowed access to the backdoor. As a result, this backdoor would most certainly lead to every unauthorised party having access, as the key to decrypt the data would be discovered by third parties, this would result in completely broken encryption for all. In federated networks, such as Matrix, it's not even possible to add a backdoor to every homeserver. Federation decentralises trust, which means that the person deploying the server isn't necessarily the same entity who makes the client software or server software. Matrix has even written a <a href="https://matrix.org/blog/2020/10/19/combating-abuse-in-matrix-without-backdoors">thorough article</a> on how to combat this sort of abuse without backdoors. </p><p>Weakening encryption will only result in criminals using strong encryption anyway, without fighting any of the problems that the the law claims to solve. There is no easy solution, and it is down to politicians to provide one. Yes, encryption can be used by people with bad intentions, but it is also used by so many ordinary people who would never think to use it in a malicious way. Nearly every tool in life can be used for nefarious purposes, but does not mean it should be unavailable for legitimate non-criminal uses. You could hit someone with a hammer, but it doesn't mean hammers should be made out of foam, because if they were, people would just use knives instead. Weakening encryption will not solve these issues, and that's probably because they were not the the focus of the Act. Instead, it seems that this law seeks to criminalises strong encryption that does not have backdoors, even though the government knows full well that this will not stop criminals. The US Government should stop devising new ways to breach its citizens privacy, and focus on combating the issues that this Act fails to.</p><p>In 1988, Timothy May <a href="https://activism.net/cypherpunk/crypto-anarchy.html">predicted</a> that “the State will of course try to slow or halt the spread of [encryption], citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration”. He was spot on.</p><p><em>Cover artwork by <a href="https://setofprinciples.com/">Zan</a></em></p>]]></content:encoded></item><item><title><![CDATA[blacklight447 Taking Over PrivacyTools Service Administration]]></title><description><![CDATA[<p>I am announcing today my departure as sysadmin from the PrivacyTools project. Long-time team member and current editor-in-chief, <a href="https://social.privacytools.io/@blacklight447">blacklight447</a>, will be taking over as interim project sysadmin to manage existing services currently operated by PrivacyTools, including Mastodon and Matrix.</p><p>blacklight447 is a trustworthy member of the PrivacyTools community and an</p>]]></description><link>https://blog.privacytools.io/blacklight447-taking-over/</link><guid isPermaLink="false">5f8321746fef6403bbf0d2b7</guid><category><![CDATA[Updates]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Sun, 11 Oct 2020 15:23:18 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2021/02/goodcover-4.svg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2021/02/goodcover-4.svg" alt="blacklight447 Taking Over PrivacyTools Service Administration"><p>I am announcing today my departure as sysadmin from the PrivacyTools project. Long-time team member and current editor-in-chief, <a href="https://social.privacytools.io/@blacklight447">blacklight447</a>, will be taking over as interim project sysadmin to manage existing services currently operated by PrivacyTools, including Mastodon and Matrix.</p><p>blacklight447 is a trustworthy member of the PrivacyTools community and an experienced sysadmin. I do not forsee any decline in the quality of service you currently expect from PrivacyTools services, they will continue to be provided in their current capacity.</p><p>🐬 So long, and thanks for all the fish.</p>]]></content:encoded></item><item><title><![CDATA[Introducing our PeerTube Instance]]></title><description><![CDATA[<p>Since April 2019, one of the primary goals of PrivacyTools has been to promote the creation and use of decentralized and federated networks to replace the centralized giants like Google and Facebook that have taken control of the internet over the last decade. Already we've launched Mastodon and WriteFreely instances</p>]]></description><link>https://blog.privacytools.io/introducing-our-peertube-instance/</link><guid isPermaLink="false">5f020c85b6f58f03b3d05ffc</guid><category><![CDATA[Press Release]]></category><category><![CDATA[Updates]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[PeerTube]]></category><category><![CDATA[Video]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Sun, 05 Jul 2020 19:32:55 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2020/07/peertube-cover-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2020/07/peertube-cover-1.jpg" alt="Introducing our PeerTube Instance"><p>Since April 2019, one of the primary goals of PrivacyTools has been to promote the creation and use of decentralized and federated networks to replace the centralized giants like Google and Facebook that have taken control of the internet over the last decade. Already we've launched Mastodon and WriteFreely instances with thousands of users, and our <a href="https://chat.privacytools.io">Matrix homeserver</a> is one of the largest in the Matrix fediverse. </p><p>This week, we're happy to announce another instance in <a href="https://www.privacytools.io/services/">our foray into federated platforms</a>, <a href="https://tube.privacytools.io/videos/overview"><strong>tube.privacytools.io</strong></a>, an open and curated PeerTube instance that you can use to view videos on any instance in the interconnected PeerTube network.</p><h2 id="what-is-peertube">What is PeerTube?</h2><p>PeerTube is software you can install on a server that allows you to create your very own video hosting website, a "homemade YouTube" if you will. The difference between PeerTube and YouTube is that PeerTube is not a massive platform centralizing videos from all their users on a single server farm. Instead, PeerTube connects many small and independent video hosting providers, using the same technology as Mastodon and WriteFreely: ActivityPub.</p><p>PeerTube is the only video hosting platform that combines open code, federation, and peer-to-peer broadcasting/viewing into a single service, ensuring that the network is completely free and robust, even if your video goes viral!</p><p>In an ideal world, every content creator would host their own PeerTube instance and upload their videos there, and every viewer would host their own PeerTube and use it to follow others. Federated platforms thrive with as many instances as possible, and if that is something that excites you, you should definitely check out <a href="https://joinpeertube.org">joinpeertube.org</a> for more details on setting up an instance.</p><h2 id="our-instance">Our Instance</h2><p>Of course, there are always users who simply don't have the time, knowledge, or budget to host their own services, and that's fine too! That's why we launched our instance with <a href="https://tube.privacytools.io/about/instance">open registration</a>, so you can join the PeerTube community just by creating an account. An account on our instance will allow you to like, comment on, and subscribe to the numerous videos and video creators on the PeerTube platform.</p><p>Of course, since PeerTube is ActivityPub-based, you can actually subscribe with <em>any</em> ActivityPub platform, including subscribing to creators with a Mastodon account: </p><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2020/07/image-2.png" class="kg-image" alt="Introducing our PeerTube Instance"></figure><p>An account on PeerTube simply gives you a more video-centric viewing experience compared to Mastodon, but you have the option to choose what works best for you!</p><h2 id="for-content-creators">For Content Creators</h2><p>We do realize that for video creators, hosting your own PeerTube platform is a unique challenge. Depending on your size, servers and bandwidth can quickly become costly. And even though PeerTube tries to mitigate this as much as possible with Peer-to-Peer video viewing, that cost may still be significant to you.</p><p>That's why we are offering free, unlimited video hosting to privacy and technology focused content creators. That's no limit to either video storage or bandwidth, and we believe our infrastructure can handle many, many viewers at high performance to get your content out to as many people as possible.</p><p>Uploading to PeerTube is as simple as pasting a link to an existing YouTube video you hold the copyright to, or uploading it manually yourself. If you don't want to upload to PeerTube regularly, please reach out anyways, we can run automated scripts on our side of things that will mirror your YouTube channel for you with very little effort, with your permission.</p><p><a href="https://tube.privacytools.io/video-channels/techlore_channel/videos">Techlore</a> is the first content creator to partner with us to bring his <a href="https://www.youtube.com/channel/UCs6KfncB4OV6Vug4o_bzijg">YouTube content</a> to the PeerTube network! We're very excited to get his videos out to our community. If you want to experience the PeerTube viewing experience for yourself, check out his channel on our instance.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2020/07/image-5.png" class="kg-image" alt="Introducing our PeerTube Instance"><figcaption><a href="https://tube.privacytools.io/video-channels/techlore_channel/videos">https://tube.privacytools.io/video-channels/techlore_channel/videos</a></figcaption></figure><p>But maybe you already host a PeerTube instance already, or the idea of setting one up doesn't scare you. Please, reach out to us anyways! We are happy to follow informative non-spammy instances to boost your content on our discover page, and provide <a href="https://docs.joinpeertube.org/#/admin-following-instances?id=instances-redundancy">instance redundancy</a> to reduce the bandwidth load on your own instance. PeerTube's redundancy controls allow our server to mirror your content, so that viewers will automatically download content from us as well.</p><p>Over the last week we've been working with <a href="https://tube.privacytools.io/accounts/sunknudsen@peertube.sunknudsen.com/video-channels">Sun Knudsen</a>, a privacy content creator who recently launched his own PeerTube instance to mirror his YouTube content. By enabling video redundancy with his server, we're able to share the bandwidth load without harming user viewing experiences. Check out his channel for some more great content!</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2020/07/image-7.png" class="kg-image" alt="Introducing our PeerTube Instance"><figcaption><a href="https://tube.privacytools.io/video-channels/sunknudsen_channel@peertube.sunknudsen.com/videos">https://tube.privacytools.io/video-channels/sunknudsen_channel@peertube.sunknudsen.com/videos</a></figcaption></figure><p>Finally, if you're not a content creator, but you know someone else who would be perfect for the PeerTube platform, please encourage them to reach out!</p><p>Our instance will be highly curated: We are primarily looking for content creators who will help advance the message of online privacy and self-hosted technologies, so unfortunately we can't provide accounts for every creator under the sun. But, even if your content isn't quite compatible with the tone of our local PeerTube community, we are still happy to help you find the perfect instance for your content, or help set up your own node in the fediverse.</p><h2 id="final-thoughts">Final Thoughts</h2><p>We are very happy to support PeerTube and we believe there is tons of fantastic content to watch on the network.</p><p>PeerTube is currently in the middle of a <a href="https://joinpeertube.org/roadmap">crowdsourcing campaign</a> through the end of this year. They have currently surpassed their target of €20,000 for the month of July and are well on their way to raising their final goal of €60,000 by November.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2020/07/image-8.png" class="kg-image" alt="Introducing our PeerTube Instance"><figcaption><a href="https://joinpeertube.org/roadmap">https://joinpeertube.org/roadmap</a></figcaption></figure><p>Contributions will fund the development of many new features coming to PeerTube's future, including additional plugin and playlist functionality, and live-streaming! If you are interested in contributing to the future of federated and Peer-to-Peer online video, please consider sending some support their way.</p><p>And of course, if you like what we're doing here at PrivacyTools, consider a <a href="https://opencollective.com/privacytools">contribution</a> to our project as well. The donations of all our fantastic supporters will allow us to continue hosting and promoting great services for years to come!</p><p>If nothing else, <a href="https://tube.privacytools.io">create a PeerTube account</a> or <a href="https://joinpeertube.org">instance</a>, and get watching :)</p><h3 id="media">Media</h3><p><a href="https://github.com/privacytools/brand">Branding Resources</a></p><p><strong><strong><strong><strong>You are being watched. </strong></strong></strong></strong>Private and state-sponsored organizations are monitoring and recording your online activities. Since 2015, PrivacyTools has been providing services, tools and knowledge to protect your privacy against global mass surveillance.</p><h3 id="press-contacts">Press Contacts</h3><p><strong><strong><strong><strong>Jonah Aragon</strong></strong></strong></strong><br>PrivacyTools<br><a href="mailto:jonah@privacytools.io">jonah@privacytools.io</a></p>]]></content:encoded></item><item><title><![CDATA[Why I Decided to Run a Tor Relay]]></title><description><![CDATA[<p>It makes me smile when I come across someone struggling with the decision of whether or not to get a <a href="https://www.privacytools.io/providers/vpn/">VPN</a>. It makes me smile not because of the indecision and relative lack of knowledge, but because it wasn't so long ago I was in exactly the same position—perceiving</p>]]></description><link>https://blog.privacytools.io/why-i-decided-to-run-a-tor-relay/</link><guid isPermaLink="false">5eae4eb627295604daae5029</guid><category><![CDATA[Opinion]]></category><category><![CDATA[Tor]]></category><dc:creator><![CDATA[Sam Howell]]></dc:creator><pubDate>Mon, 04 May 2020 18:49:20 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2020/05/tor-blog-cover.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2020/05/tor-blog-cover.png" alt="Why I Decided to Run a Tor Relay"><p>It makes me smile when I come across someone struggling with the decision of whether or not to get a <a href="https://www.privacytools.io/providers/vpn/">VPN</a>. It makes me smile not because of the indecision and relative lack of knowledge, but because it wasn't so long ago I was in exactly the same position—perceiving VPNs to be some kind of extreme measure only the paranoid and the criminal resorted to. How wrong I was.</p><p>In just a few months I've come to realise that something like a VPN is in fact a basic measure one might take in the effort to more freely roam the Internet—tainted as it is by censorship, surveillance and many other forms of state control. So where do you go from <em>realising </em>these issues if you know them to be the threats that they are to democracy and freedom? You seek to <em>take control</em>.</p><p>You discover the <a href="https://www.torproject.org/">Tor Project</a>—or rather, you learn more about a network that's been around for years and for years has suffered the type of reputation which only blinds everyday people from its incredible potential for positive change in numerous oppressed countries around the world.</p><p>At the time of writing there are over 6,300 Tor relays, and I like to think this number will continue to grow steadily. Each one—no matter its uptime, bandwidth or overall reputation, or whether it’s a Guard, Middle or Exit—each one is the direct result of an individual deciding to sacrifice money, time and effort for the cause of fighting for a freer Internet: enabling millions of users—journalists, bloggers, whistleblowers, activists and everyday people like you and I—to communicate anonymously, and therefore safely, wherever we are in the world.</p><p>Like many others, at first I was unsure about running my own relay. The usual doubts and questions arose: surely it's too difficult; I don’t know much about servers, and it’s surely expensive and beyond my skill-set to configure one as a Tor relay. But then I watched this talk by the articulate, intelligent and passionate Tor Project developer <a href="https://www.invidio.us/watch?v=Wl5OQz0Ko8c">Jacob Appelbaum</a> (if you do nothing else today, watch it).</p><p>Jacob couldn’t have made a better case for direct action, requesting of the audience:</p><blockquote>Raise your hand if you think anonymity is something that is good and you think is a fundamental human right that we should all have...<br>Now raise your hand if you want to do something about it...<br>Now keep your hand up if you’re going to run a Tor relay...<br>Everybody that put your hand down, why aren’t you running a Tor relay? You can do something about it right now.</blockquote><p>And this is when it struck me, as I hope it struck many others at that talk: Am I doing enough? Can I claim to take this subject seriously if I’m not willing to invest the effort to really <em>be a part</em> of the solution. Not simply to donate money—which of course is still a great way to contribute—but to truly, technologically support the Tor network.</p><p>It struck me that I have enough money, time and access to the right information to run my own relay. So it begged the question: Why <em>wouldn’t</em> I?</p><p>At the time of writing my relay has been flagged ‘valid’, ‘running’ and ‘fast’ and is on track to have relayed around 750GB by the end of the month. It feels good. It feels really good.</p><p><em>This article was <a href="https://samhowell.uk/dark/blog/blog-Tor_Relay.html">originally published</a> on my personal blog at <a href="https://samhowell.uk/">samhowell.uk</a>, on February 15th, 2019. It is made available under the <a href="https://creativecommons.org/licenses/by-sa/4.0/">Creative Commons By-SA 4.0 License</a>.</em></p>]]></content:encoded></item><item><title><![CDATA[Relisting Startpage.com]]></title><description><![CDATA[<p>Dear PrivacyTools community,</p><p>In October 2019, we learned that System1 had become the majority shareholder in Startpage.com via a new System1 subsidiary, Privacy One Group. Due to the uncertainty surrounding the acquisition and the initial lack of clear communication from the Startpage team towards the privacy community, we were</p>]]></description><link>https://blog.privacytools.io/relisting-startpage/</link><guid isPermaLink="false">5eae256e27295604daae4ea1</guid><category><![CDATA[Press Release]]></category><category><![CDATA[Updates]]></category><category><![CDATA[Startpage]]></category><category><![CDATA[Trust]]></category><category><![CDATA[Relisting]]></category><dc:creator><![CDATA[nitrohorse]]></dc:creator><pubDate>Sun, 03 May 2020 16:22:06 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2020/05/startpage-cover.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2020/05/startpage-cover.png" alt="Relisting Startpage.com"><p>Dear PrivacyTools community,</p><p>In October 2019, we learned that System1 had become the majority shareholder in Startpage.com via a new System1 subsidiary, Privacy One Group. Due to the uncertainty surrounding the acquisition and the initial lack of clear communication from the Startpage team towards the privacy community, we were forced to delist Startpage from PrivacyTools's <a href="https://www.privacytools.io/providers/search-engines/">search engine recommendations</a>. In an <a href="https://blog.privacytools.io/delisting-startpage/">explanatory blog post</a>, we asked for more clarity surrounding the situation, stating:</p><blockquote>...there are still so many unanswered questions, we can no longer recommend the service with good confidence. If Startpage aims to be re-considered, they will have to answer the questions above, preferably along with an explanation of why it took them so long to get proper answers out to the public.</blockquote><p>Shortly after this, the PrivacyTools team was able to get an open line of communication with Startpage.com CEO Robert Beens, who vocalized his regret for not answering our questions more quickly and providing more clarity to the community from the start. From their perspective nothing fundamental had changed due to the acquisition, except that they would now have the resources to market Startpage efficiently thanks to System1. Unfortunately, Startpage failed to put themselves in the place of their users, and understand that their lack of transparancy at the beginning would erode the trust they shared with the privacy community.</p><p>By December, <a href="https://github.com/privacytools/privacytools.io/issues/1562#issue-531606344">Startpage had responded to our questions</a>. More recently they also clarified that <a href="https://system1.com/terms/privacy-policy">System1's privacy policy</a> does not relate to Startpage; <a href="https://www.startpage.com/en/privacy-policy/">Startpage's privacy policy remains unchanged</a>:</p><blockquote>Having a new shareholder in the company will not change any aspect of 
the privacy we offer. We are a Dutch company and will continue to be so,
 fully complying with Dutch and EU privacy regulations (GDPR). We don’t 
store or share any personal data. No change either. Our clear privacy 
policy will stay the same. Management / founders (including myself) 
continue to have an important stake in the company and will continue to 
be fully committed to our privacy mission!</blockquote><p>They also created new support pages clarifying the privacy implications of System1's relationship with Startpage:</p><ul><li><a href="https://support.startpage.com/index.php?/Knowledgebase/Article/View/1277/0/startpage-ceo-robert-beens-discusses-the-investment-from-privacy-one--system1">Startpage CEO Robert Beens discusses the investment from Privacy One / System1</a></li><li><a href="https://support.startpage.com/index.php?/Knowledgebase/Article/View/1275/0/what-is-startpages-relationship-with-privacy-onesystem1-and-what-does-this-mean-for-my-privacy-protections">What is Startpage's relationship with Privacy One/System1 and what does this mean for my privacy protections?</a></li><li><a href="https://support.startpage.com/index.php?/Knowledgebase/Article/View/1276/0/what-is-the-startpage-privacy-guarding-data-flow">What is the Startpage privacy-guarding data flow?</a></li></ul><p>Additionally, Beens joined an <a href="https://invidio.us/watch?v=h-3fW0w2ayg">interview with Techlore</a> in February answering his questions and further questions from the privacy community.</p><p>We prepared a <a href="https://github.com/privacytools/privacytools.io/pull/1592">merge request in December</a> for relisting Startpage in case we decided to do so, but did not have plans to merge it until the whole team felt confident (which we knew would take time). 5 months later, we sync'd up as a team, and decided to re-list them (with a warning explaining these events) which you can now find on PrivacyTools <a href="https://www.privacytools.io/providers/search-engines">here</a>. Our confidence and trust in Startpage has grown, and we're appreciative of Startpage's cooperation and willingness to address the concerns of our community. </p><p>We also hope this encourages any services that may end up being delisted for one reason or another to take action and improve themselves in this same fashion. We don't like delisting the services we've previously trusted and recommended, and we are always happy to see when steps are taken to regain community trust.</p><h3 id="media">Media</h3><p><a href="https://github.com/privacytools/brand">Branding Resources</a></p><p><strong><strong>You are being watched. </strong></strong>Private and state-sponsored organizations are monitoring and recording your online activities. Since 2015, PrivacyTools has been providing services, tools and knowledge to protect your privacy against global mass surveillance.</p><h3 id="press-contacts">Press Contacts</h3><p><strong><strong>Jonah Aragon</strong></strong><br>PrivacyTools<br><a href="mailto:jonah@privacytools.io">jonah@privacytools.io</a><br>763-392-3051</p>]]></content:encoded></item><item><title><![CDATA[Shutting Down Gitea]]></title><description><![CDATA[<p>Hello everyone! As a part of our ongoing server migration we have made the decision to discontinue our Gitea installation at <a href="https://git.privacytools.io">git.privacytools.io</a>. Ultimately this service was used by a very small number of users, and continues to consume too many resources to make this a cost-effective platform to</p>]]></description><link>https://blog.privacytools.io/shutting-down-gitea/</link><guid isPermaLink="false">5e98927327295604daae4e5b</guid><category><![CDATA[Press Release]]></category><category><![CDATA[Updates]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Thu, 16 Apr 2020 17:30:00 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2020/04/gitea-closure.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2020/04/gitea-closure.png" alt="Shutting Down Gitea"><p>Hello everyone! As a part of our ongoing server migration we have made the decision to discontinue our Gitea installation at <a href="https://git.privacytools.io">git.privacytools.io</a>. Ultimately this service was used by a very small number of users, and continues to consume too many resources to make this a cost-effective platform to host.</p><p>Effective today logins and repository creations will be disabled, and our installation will be made read-only to allow any existing users to download any repository information they need. If you are unable to access any data you need in a private repository, please email me at jonah@privacytools.io.</p><p>In 30 days we will shut down the server entirely, and all resources will be completely inaccessible. The server and all related backups will be destroyed shortly thereafter.</p><p>We feel that this will allow us to focus on our other existing services and bring new and useful platforms online for our users. We thank you for your support and understanding!</p><p>Best,<br>Jonah<br>Services Administrator</p><h3 id="media">Media</h3><p><a href="https://github.com/privacytools/brand">Branding Resources</a></p><p><strong>You are being watched. </strong>Private and state-sponsored organizations are monitoring and recording your online activities. Since 2015, PrivacyTools has been providing services, tools and knowledge to protect your privacy against global mass surveillance.</p><h3 id="press-contacts">Press Contacts</h3><p><strong>Jonah Aragon</strong><br>PrivacyTools<br><a href="mailto:jonah@privacytools.io">jonah@privacytools.io</a><br>763-392-3051</p>]]></content:encoded></item><item><title><![CDATA[Protecting Your Privacy With a Virtual Machine While Using Zoom]]></title><description><![CDATA[With the COVID-19 outbreak keeping many at home, Zoom has seen a huge increase in use with schools and businesses. But with growing privacy and security concerns, how can you stay safe?]]></description><link>https://blog.privacytools.io/protecting-your-privacy-while-using-zoom-at-home/</link><guid isPermaLink="false">5e868a8402ef133bb433917c</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Guides]]></category><dc:creator><![CDATA[Daniel Gray]]></dc:creator><pubDate>Fri, 03 Apr 2020 18:35:05 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2020/04/zoom-cover.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2020/04/zoom-cover.jpg" alt="Protecting Your Privacy With a Virtual Machine While Using Zoom"><p>With the ongoing COVID-19 pandemic, many of us have had to make rapid lifestyle adjustments to keep up with social distancing and isolation rules. More of us are working and studying from home, and using telecommunication tools for conferences and lectures is becoming a daily habit for people around the world.</p><p>One of these tools in particular, <a href="https://en.wikipedia.org/wiki/Zoom_Video_Communications">Zoom</a>, has seen a huge increase in use since the COVID-19 outbreak. This is due in part to their clever marketing and support materials they've provided to teachers, students, office workers, and employers. Consumer Reports privacy researcher Bill Fitzgerald has suggested Zoom is using the pandemic as a <a href="https://www.insidehighered.com/news/2020/03/25/pivot-online-raises-concerns-ferpa-surveillance">selling opportunity</a>.</p><h2 id="zoom-s-privacy-woes">Zoom's Privacy Woes</h2><p>Of course, everyone is keen to continue work and keep productivity at a steady rate through this crisis, and to many employers Zoom appears to be a great option to do so. And Zoom is happy to take on customers who will likely continue to use their services after the pandemic subsides, where they can continue to <a href="https://www.consumerreports.org/video-conferencing-services/zoom-teleconferencing-privacy-concerns/">mine the personal data of their users</a>.</p><p>Many institutions and workplaces did not have preparations in place for a crisis of this scale, requiring them to adopt technology without taking the time to consider the privacy and security implications of the solutions chosen, — of which <a href="https://en.wikipedia.org/wiki/Zoom_Video_Communications#Privacy">there are a number</a> — prompting bans from organizations like the United Kingdom's <a href="https://metro.co.uk/2020/03/25/concern-zoom-video-conferencing-mod-bans-security-fears-12455327/">Ministry of Defence</a> and <a href="https://www.reuters.com/article/us-spacex-zoom-video-commn/elon-musks-spacex-bans-zoom-over-privacy-concerns-memo-idUSKBN21J71H">SpaceX</a>. Zoom may not be suitable for you or your organization, as privacy breaches continue to pop up. Just days ago it was revealed that Zoom was <a href="https://www.vice.com/en_us/article/k7e95m/zoom-leaking-email-addresses-photos">leaking email addresses and other profile information</a> to other users with an address on the same domain. More bad news for Gmail users!</p><p>Zoom is not the best choice for protecting communications privacy. Zoom <a href="https://protonmail.com/blog/zoom-privacy-issues/">falsely claims</a> to support <a href="https://en.wikipedia.org/wiki/End-to-end_encryption">end-to-end encryption (E2EE)</a>, when in fact Zoom only uses regular <a href="https://en.wikipedia.org/wiki/Transport_Layer_Security">transport layer security (TLS)</a> such as that used when visiting https websites. This means that Zoom can see the contents of your conversations and calls, when this would not be possible with true end-to-end encryption.</p><p>If you do have the ability to choose what platform you use, we recommend considering <a href="https://meet.jit.si/">Jitsi</a> or <a href="https://bigbluebutton.org/">BigBlueButton</a>, two options which can be hosted by your business or institution internally, rather than relying on their cloud offerings. At PrivacyTools, we've also compiled a list of recommendations for <a href="https://www.privacytools.io/software/real-time-communication/">Real-Time Communication</a> you can also check out, especially if you need more than just video.</p><p>But sometimes we don't have the opportunity to choose the platforms we must use to communicate with our coworkers, students, and friends. If you are required to use Zoom or software like this, that you do so using a Virtual Machine (VM). A VM is a program that works like a completely separate computer inside your computer. The "host" operating system, which is your main system, continues to run everything you might need, while a "guest" operating system <em>also</em> runs completely independently. You can run any programs you want — like Zoom! — inside this guest operating system, and they will be completely isolated from your system and files. It won't even know the host exists!</p><p>Using a VM will help with maintaining some security, especially if you need to use a personal device at home to work. Bugs like these recently discovered exploits that allowed <a href="https://medium.com/bugbountywriteup/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5">malicious websites to enable your webcam</a>, the <a href="https://techcrunch.com/2020/04/01/zoom-doom/">use your camera without consent</a> and the discovery of a user's <a href="https://www.bleepingcomputer.com/news/security/zoom-lets-attackers-steal-windows-credentials-run-programs-via-unc-links/">Windows username and ability to steal credentials</a> would not have been possible, as Zoom would be completely isolated on your device and would not be able to run at all when your VM was shut down. It's also worth noting that Zoom has decided on a <a href="https://techcrunch.com/2020/04/02/zoom-freezes-feature-development-to-fix-security-and-privacy-issues/">complete feature freeze</a> in an attempt improve security and privacy.</p><p>When Zoom is confined in the VM, it cannot see what applications are open outside on your host operating system. We recommend users avoid attaching their webcam, (if they can). However, some users have reported that it is encouraged or required by their school or employer. Fortunately in these cases, you can still attach your webcam as-needed to the guest operating system for full functionality.</p><!--kg-card-begin: html-->    <script type="application/ld+json">
    {
      "@context": "http://schema.org",
      "@type": "HowTo",
      "name": "Setting Up Zoom in a VM",
      "description": "Creating a Virtual Machine for applications like Zoom is a relatively easy task for most tech-savvy users. We are going to outline the basic steps you need here, but if you need more guidance I've created a separate guide with detailed instructions and screenshots to help you through the process.",
      "tool": [
        {
          "@type": "HowToTool",
          "name": "computer"
        }, {
          "@type": "HowToTool",
          "name": "VirtualBox"
        }
      ],
      "supply": [
        {
          "@type": "HowToSupply",
          "name": "Debian ISO"
        }
      ],
      "step": [
        {
          "@type": "HowToStep",
          "text": "Verify your Debian ISO is legitimate"
        }, {
          "@type": "HowToStep",
          "text": "Install VirtualBox and the VirtualBox Extension Pack"
        }, {
          "@type": "HowToStep",
          "text": "Create a new VM in VirtualBox. Set the type to Linux / Debian, give it a good amount of RAM, and create a virtual hard disk."
        }, {
          "@type": "HowToStep",
          "text": "Adjust the VM's settings and attach the Debian ISO you've downloaded"
        }, {
          "@type": "HowToStep",
          "text": "Start your new Debian VM and complete the Debian installer"
        }, {
          "@type": "HowToStep",
          "text": "Install VirtualBox Guest Additions"
        }, {
          "@type": "HowToStep",
          "text": "Attach any devices (like webcams) you need"
        }
      ],
      "totalTime": "PT1H"
    }
    </script><!--kg-card-end: html--><h2 id="setting-up-zoom-in-a-vm">Setting Up Zoom in a VM</h2><p>Creating a Virtual Machine for applications like Zoom is a relatively easy task for most tech-savvy users. We are going to outline the basic steps you need here, but if you need more guidance I've created a <a href="https://assets.privacytools.io/aragon-drop/zoom_tutorial.pdf">separate guide with detailed instructions</a> and screenshots to help you through the process.</p><h3 id="what-you-ll-need">What You'll Need</h3><ul><li>A computer capable of running a Virtual Machine. Most modern machines should be, but it is worth <a href="https://www.technorms.com/8208/check-if-processor-supports-virtualization">double-checking</a>.</li><li>A Virtual Machine "hypervisor": This is what actually runs the VM. For most people the free <a href="https://www.virtualbox.org/wiki/Downloads">VirtualBox</a> program works well, and it is what we use in our guide. Advanced users may wish to use a solution like Parallels, VMWare Workstation, Hyper-V, or Gnome Boxes, all of which will support this functionality as well.</li><li>VirtualBox users who need webcam support should also download the <a href="https://www.virtualbox.org/wiki/Downloads">VirtualBox Extension Pack</a> from their download page.</li><li>A Debian ISO (Linux installer <a href="https://cdimage.debian.org/debian-cd/current/amd64/iso-cd/">download</a>, <a href="https://cdimage.debian.org/debian-cd/current/amd64/bt-cd/">torrent</a>)</li></ul><h3 id="overview">Overview</h3><ol><li><a href="https://www.debian.org/CD/verify">Verify your Debian ISO is legitimate</a>. If it's compromised now it might not boot, or you might be inadvertently installing malware!</li><li>Install VirtualBox and the VirtualBox Extension Pack if you haven't already.</li><li>Create a new VM in VirtualBox. Set the type to Linux / Debian, give it a good amount of RAM (30-40% of your total RAM is good for most users), and create a virtual hard disk.</li><li>Open the VM's settings and attach the Debian ISO you've downloaded. You can also adjust the video memory (typically setting this to 128MB or higher is best).</li><li>Start your new Debian VM and complete the Debian installer that should automatically start.</li><li>Install <a href="https://www.virtualbox.org/manual/ch04.html">VirtualBox Guest Additions</a> in Debian.</li><li>Attach any devices (like webcams) you might need to use to the VM, and reboot the VM.</li></ol><p>Now you can install pretty much any software you'd like in your new Linux VM, and it will be completely isolated from your main machine. Remember if any of this is confusing, I've created a more <a href="https://assets.privacytools.io/aragon-drop/zoom_tutorial.pdf">complete walkthrough</a> you can download that explains these steps in detail. Once you're in, you can use the web browser built into Debian to download Zoom, and you're good to go!</p>]]></content:encoded></item><item><title><![CDATA[US Government Wages War on Encryption]]></title><description><![CDATA[As the world finds itself preoccupied with COVID-19, the United States government is trying to pass a law to ban encryption. It's called the EARN IT act, and it has potentially devastating repercussions for encryption and companies that use it.]]></description><link>https://blog.privacytools.io/us-government-wages-war-on-encryption/</link><guid isPermaLink="false">5e7635bc3a7daf0182255b1f</guid><category><![CDATA[Opinion]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Security]]></category><category><![CDATA[Encryption]]></category><category><![CDATA[Government]]></category><category><![CDATA[Coronavirus]]></category><category><![CDATA[United States]]></category><dc:creator><![CDATA[Freddy ]]></dc:creator><pubDate>Sun, 29 Mar 2020 12:00:00 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2020/03/lindsey-graham-encryption-1.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2020/03/lindsey-graham-encryption-1.png" alt="US Government Wages War on Encryption"><p>As the world finds itself preoccupied with COVID-19, the United States government is trying to pass a law to ban encryption.</p><p>It's called the <a href="https://www.schneier.com/blog/archives/2020/03/the_earn-it_act.html">EARN IT act</a>, and while it claims to combat the sexual exploitation of children online, it has potentially devastating repercussions for encryption and companies that use it.</p><blockquote>EARN IT focuses specifically on Section 230, which has historically given tech companies freedom to expand with minimal liability for how people use their platforms. Under EARN IT, those companies wouldn't automatically have a liability exemption for activity and content related to child sexual exploitation. Instead, companies would have to "earn" the protection by showing that they are following recommendations for combatting child sexual exploitation laid out by a 16-person commission.</blockquote><p><em>(Source: WIRED "<a href="https://www.wired.com/story/earn-it-act-sneak-attack-on-encryption/">The EARN IT Act Is a Sneak Attack on Encryption</a>")</em></p><p>The <a href="https://www.privacytools.io/providers/#usa">US government</a> has never been a fan of cryptography even though they make extensive use of it themselves. The "<a href="https://en.wikipedia.org/wiki/Crypto_Wars">Crypto Wars</a>" provide more than enough evidence to suggest that this might not be the only reason they wish to ban the use of encryption by the public. A suspicion only further realized when you understand the breadth of the National Security Agency's <a href="https://en.wikipedia.org/wiki/Edward_Snowden#Global_surveillance_disclosures">spying capabilities</a> as demonstrated by Edward Snowden.</p><p>The logic behind the EARN IT act does not seem to add up.  If we ban things because unsavory people use them then why does the US allow guns, for example? The problem is that strong lobbies who have the power to influence both politicians and the voting public exist to ensure that things like guns are never banned. Meanwhile, privacy advocates have such a small voice in comparison.</p><p>It is also important to note that encryption is available to everyone, yet only a few use it for the wrong reasons. I am not responsible for the actions of anyone except myself. Group punishment is rarely the best option. PGP and similar encryption software were created to improve the privacy of communications and online file storage. The idea of secrecy or privacy is bound to attract some of the wrong people, and yet encryption is also a force for great good. It is used by governments to keep their secrets safe and privacy-seekers to take control of their information. It is used by activists, victims, and thousands of others who rely on it for their personal safety. And it is used by millions of regular people who use encryption — perhaps not even realizing it — on a daily basis to keep their identity, finances, medical information, and more out of the hands of criminals and ne'er-do-wells.</p><p>People with the wrong intent will always find ways to get around anti-encryption laws, and there are many forms of communication that would be impossible to police. <a href="https://www.obsessivefacts.com/memespeech">Memespeech</a> for example, is a supposedly censor-proof method of encryption which hides messages inside normal passages of free speech by adjusting the letter formatting. While Memespeech was built as a counter to the EARN IT act, it demonstrates that any encryption technology — including itself — could be easily built and utilized by the wrong people. Banning encryption unfortunately won't prevent pedophiles from communicating, it will only harm law-abiding citizens.</p><p>If you live in the United States, the best thing you can do right now is to call your representatives and tell them not to pass the bill. The EFF has built a <a href="https://act.eff.org/action/protect-our-speech-and-security-online-reject-the-graham-blumenthal-bill">helpful tool</a> if you are struggling with this.</p><p>In this time of struggle, we must continue to pay a close eye on all aspects of our governments and their actions. The US government is already taking advantage of the situation, as they are currently also in talks with phone companies to <a href="https://www.nbcnews.com/tech/tech-news/u-s-wants-smartphone-location-data-fight-coronavirus-privacy-advocates-n1162821">use phone location data to help track the spread of the virus</a>. Even if this power could be used responsibly to help prevent the spread of disease, historically we have seen that when power is handed to governments in the midst of a crisis, it is incredibly difficult to take it away in the aftermath.</p><p>And if you find these ideas alarming, it is also important to realize <strong>your</strong> privacy is being abused on a daily basis. If you aren't already aware of this and actively doing something against it, this is a great time to get started and find out more. There are lots of great <a href="https://www.privacytools.io/">websites</a>, <a href="https://www.reddit.com/r/privacytoolsIO/">communities</a>, and <a href="https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q">video channels</a> to help you learn.</p><p><em>Cover photo by <a href="https://www.flickr.com/photos/gageskidmore/17830267732/">Gage Skidmore</a></em></p>]]></content:encoded></item><item><title><![CDATA[Welcoming Safing as our First Sponsor]]></title><description><![CDATA[<p>I am very excited to introduce <a href="https://safing.io/">Safing ICS Technologies GmbH</a> as the first sponsor of the PrivacyTools project. Safing is developing the Safing Privacy Network ("SPN", formerly Gate17), a decentralized network designed to protect both connection data and metadata, and focusing on speed and usability.</p><p>Safing and its founders share</p>]]></description><link>https://blog.privacytools.io/welcoming-safing-first-sponsor/</link><guid isPermaLink="false">5df911d798e2bc3bba8d49d5</guid><category><![CDATA[Updates]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Fri, 20 Dec 2019 17:08:14 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/12/safingcard-2.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/12/safingcard-2.png" alt="Welcoming Safing as our First Sponsor"><p>I am very excited to introduce <a href="https://safing.io/">Safing ICS Technologies GmbH</a> as the first sponsor of the PrivacyTools project. Safing is developing the Safing Privacy Network ("SPN", formerly Gate17), a decentralized network designed to protect both connection data and metadata, and focusing on speed and usability.</p><p>Safing and its founders share many of the same privacy ideals as our team, and we are very excited to support each other moving forward. You can read more about this sponsorship and what it means to them on the <a href="https://safing.io/blog/2019/12/20/announcing-the-privacytools-sponsorship/">Safing Blog</a>.</p><blockquote>We are delighted to be in a position where we are able to share our resources, and equally enthusiastic that we can start this off by supporting the amazing team behind the PrivacyTools venture.</blockquote><p>SPN is still in development, with a Kickstarter launch planned for January 2020. Therefore, we have not been able to test their products first hand. But, the PrivacyTools team has been very impressed with their company <a href="https://safing.io/our-values/">values</a> and founders, and the <a href="https://safing.io/files/whitepaper/Gate17.pdf">technical details</a> behind SPN sound promising. We hope to watch Safing grow with the privacy community and encourage you to check out their website at <a href="https://safing.io/">Safing.io</a><a href="https://www.reddit.com/r/safing">.</a></p><hr><h2 id="the-future-for-privacytools">The Future for PrivacyTools</h2><p>Some of our members have asked us about our plans for funding like this, and we have a lot of short- and long-term goals I would like to take this opportunity to share with you.</p><p>Right now it is important for us to stay put. Funding from our initial sponsors like Safing will be saved and used carefully. PrivacyTools has always existed in a precarious position of private funding and high out-of-pocket expenses, so having a reserve in place and continual future funding will help ensure our self-sustainability and independence. If we were to use this funding to expand our services <em>now</em>, we would be in a situation where we are too reliant on a single entity (in this case Safing), which might jeopardize our independence despite the best intentions of everybody involved.</p><p>In the future we wish to offer more services, especially on platforms that currently receive little support. Networks like Mastodon are reaching relatively high adoption levels, while smaller projects like PeerTube could use some additional exposure.</p><p>The problem with projects like PeerTube is mostly resource-based. In PeerTube's case, storage is a huge issue for us to provide. Future sponsors and private <a href="https://opencollective.com/privacytools/">funding</a> of PrivacyTools can hopefully change that around. While we don't wish to do this solely with Safing's money for the independence reasons outlined above, it <em>is</em> in the works. If you want to support our mission, please consider giving a monthly donation to us at <a href="https://opencollective.com/privacytools/">OpenCollective</a>, every dollar counts. Our end goal is to be completely funded by our fantastic community, and I really believe that is possible.</p><p>We also wish to increase the reliability of our current services, and expand our server network internationally. This will allow more redundancy and increase performance for many users. Currently, all of our users connect to a single datacenter in France, causing slowdowns for many. Additionally, a few months ago we were the target for a month-long DDoS attack, and while it didn't take us offline thanks to our host's security networks, we did experience some intermittent networking issues across some services that people definitely noticed. Mirroring our site and distributing our services across continents would help further mitigate these issues in the future.</p><p>For those of you wondering what we wish to do with our funding, I hope this makes things more clear. If you have any questions feel free to reach out on Matrix at <a href="https://chat.privacytools.io/">#lounge:privacytools.io</a>!</p><hr><p><em>We take the recommendations and content on PrivacyTools's sites and services very seriously, and we do not allow our sponsors or other financial contributors to make any decisions regarding the editorial content of our site. All financial transactions are published on <a href="https://opencollective.com/privacytools/">OpenCollective</a>, and all editorial changes are published on <a href="http://github.com/privacytools/">GitHub</a> for community audit. PrivacyTools is a non-profit collective. Learn more about our sponsorship program and requirements at <a href="https://www.privacytools.io/sponsors/">privacytools.io/sponsors</a>.</em></p>]]></content:encoded></item><item><title><![CDATA[The New PrivacyTools Logo]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>A few days ago we launched our new logo for the PrivacyTools sites and services.</p>
<p>But, we are not changing it without a good reason. The previous logo we have been using since 2015 wasn't created by us, and was released to public domain, which meant that anyone could use</p>]]></description><link>https://blog.privacytools.io/new-privacytools-logo/</link><guid isPermaLink="false">5de8adceda9ce25a592574c3</guid><category><![CDATA[Updates]]></category><dc:creator><![CDATA[Dawid Potocki]]></dc:creator><pubDate>Mon, 09 Dec 2019 23:43:40 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/12/goodcover-4.svg" medium="image"/><content:encoded><![CDATA[<!--kg-card-begin: markdown--><img src="https://blog.privacytools.io/content/images/2019/12/goodcover-4.svg" alt="The New PrivacyTools Logo"><p>A few days ago we launched our new logo for the PrivacyTools sites and services.</p>
<p>But, we are not changing it without a good reason. The previous logo we have been using since 2015 wasn't created by us, and was released to public domain, which meant that anyone could use it in their own projects. Because of that, some of you may have seen it being used on different unrelated websites. This by itself, was a sufficient reason for a new logo. Another issue we had was that it felt too <em>generic</em>, it's just a shield with a white/blue squares and there are a lot of similar logos used by different projects.</p>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/12/old-logo-2.png" class="kg-image" alt="The New PrivacyTools Logo"></figure><!--kg-card-begin: markdown--><p>So, it was clear we needed a refresh. At first, I started thinking about what people imagine when thinking about privacy. One of the most obvious one is some kind of shady looking person with glasses and a hat, but that wouldn't give our brand a trustworthy look. Otherwise, we have a lock and a shield, which calls to mind both security and privacy, so that's the base I chose to design first.</p>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/12/shield_and_lock-2.png" class="kg-image" alt="The New PrivacyTools Logo"></figure><!--kg-card-begin: markdown--><p>Our first draft logo was very similar to old shield with white and blue sections, which would present a more familiar look, but it still would feel generic, just like the old logo.</p>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/12/ptio-draft-2.svg" class="kg-image" alt="The New PrivacyTools Logo"></figure><p>In my second draft, I wanted to show the "Tools" part of <em>PrivacyTools</em> in our logo. There were a lot of tool icons considered, perhaps a hammer, screwdriver, or wrench. I realized either a screwdriver or a hammer would have too many details to incorporate, and we wanted the new logo to be simple. We went with the wrench because it was a simple design that would be visible at all sizes, while being distinct, making it an ideal choice.</p><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/12/ptio-draft-1-2.svg" class="kg-image" alt="The New PrivacyTools Logo"></figure><!--kg-card-begin: markdown--><p>The second draft I created incorporating a lock and wrench was met with some mixed feedback in the private team chat. The lock iconography has been used in many other privacy-sites in the past, and it didn't really <em>feel</em> like &quot;PrivacyTools&quot;. I got few suggestions, including trying to use shield instead of a lock. Which is how we ended up with our final design:</p>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/12/ptio-final.svg" class="kg-image" alt="The New PrivacyTools Logo"></figure><p>The logo was made using the free and open-source vector graphics editor <a href="https://inkscape.org/">Inkscape</a>, and vector copies and different layouts can be found on <a href="https://github.com/privacytools/brand">GitHub</a>. We hope that our logo will create a more consistent branding system across our sites and services!</p>]]></content:encoded></item><item><title><![CDATA[Choosing the Right Messenger]]></title><description><![CDATA[<p>One of the most common questions users have when it comes to privacy is about messaging services. It seems almost all of them mention some level of privacy or encryption to entice the user to sign up for their service, but how can you be sure you’re using the</p>]]></description><link>https://blog.privacytools.io/choosing-the-right-messenger/</link><guid isPermaLink="false">5dddab74da9ce25a59257455</guid><category><![CDATA[Instant Messengers]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Security]]></category><category><![CDATA[Opinion]]></category><dc:creator><![CDATA[Dan Arel]]></dc:creator><pubDate>Thu, 28 Nov 2019 01:51:46 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/11/message-4.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/11/message-4.png" alt="Choosing the Right Messenger"><p>One of the most common questions users have when it comes to privacy is about messaging services. It seems almost all of them mention some level of privacy or encryption to entice the user to sign up for their service, but how can you be sure you’re using the most secure, privacy respecting platform?</p><p>The answer actually lies in one’s <a href="https://ssd.eff.org/en/glossary/threat-model">threat model</a>, which is often an ignored step in choosing all privacy related apps and services, meaning a lot of users limit their internet and communication experience because they believe they need Edward Snowden level privacy settings.</p><p>The truth is, each user needs to decide what their privacy goals are. Is your goal to stop corporations from tracking you, targeting you, and profiting from your data? Or, are you are trying to hide communications from the government or law enforcement, which is common for journalists and activists who want to protect their sources or communications from government eyes?</p><p>Once you understand your goals you can start to look at messengers and their upsides and downsides, and it’s important to remember, there is no perfect solution. Each service, no matter how secure can be compromised, because at the end of the day, you’re dealing with other humans who can screenshot, copy, or forward your messages to parties you did not intend to see them. So, it’s also important to know who you are messaging, verifying their keys, and ensuring that you place the utmost trust in them with the content you are sending.</p><p>If your goal is to simply avoid corporate tracking and the harvesting of your data from your communications, you can eliminate apps such as Facebook Messenger and WhatsApp, both services owned by Facebook and while offering encrypted messaging (optional in Messenger), Facebook <a href="https://www.digitaltrends.com/social-media/facebook-reads-messenger-messages/">reads your non-encrypted messages</a>, and WhatsApp <a href="https://www.forbes.com/sites/zakdoffman/2019/05/14/whatsapps-cybersecurity-breach-phones-hit-with-israeli-spyware-over-voice-calls/#734cec155549">has fallen victim to security breaches</a>.</p><p>For this type of user, your options are much more wide as you may be more willing to share your email address or phone number at signup and can be less concerned with metadata (we will get to that shortly), and you want to look for a messenger that simply isn’t scanning your content or behavior to sell it.</p><p>If your goal is to evade more massive state-sponsored surveillance programs, the aforementioned apps are out of the question, but so are many others.</p><p>This is because when it comes to these apps, and other like it, you don’t own the <a href="https://ssd.eff.org/en/glossary/encryption-key">encryption keys</a>, the service does, so they are able to decrypt your messages, for their own use, or for the use of government officials who request it. This is something important you’ll want to remember as you choose the messenger that is right for you.</p><p>Even Apple’s iMessage, which is encrypted, while more secure than Facebook’s offerings, still control the keys and can access your messages if necessary. Apple does also collect data based on your behavior, so while using iMessage isn’t the same as handing your data over to Facebook, you’re still messaging with a variety of privacy vulnerabilities. On Android, you’re using SMS messages which are even less secure and can <a href="https://www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin">be easily hijacked</a> by someone with just enough know-how.</p><h2 id="metadata">Metadata</h2><p>One important aspect of messaging apps you need to be sure of is what kind of <a href="https://ssd.eff.org/en/glossary/metadata">metadata</a> it exposes, what is encrypted and what isn’t.</p><p>Wire, a popular encrypted messenger app has always been criticized for its decision not to encrypt user metadata, such as the date and time of registration, IP geographical coordinates, and the date and time of creation, creator, name, and list of participants in a conversation.</p><p>Metadata can be used to place you in a certain location, speaking to a certain person and can be used against you by law enforcement, even if they have no idea and no access to what the conversation was about.</p><p>Apps such as Signal, or Wickr encrypt metadata, making the conversations between two or more parties more secure and harder to track individual users with.</p><p>When it comes to avoiding corporate data mining, your metadata won’t be as useful, especially if you’re using a service that is not profiting from your data to begin with. For those avoiding state-sponsored surveillance, <a href="https://theintercept.com/2019/08/04/whistleblowers-surveillance-fbi-trump/">metadata can be a killer</a>.</p><h2 id="encryption">Encryption</h2><p>This article will not get into the complexities of the best kinds of <a href="https://ssd.eff.org/en/glossary/end-end-encryption">end-to-end encryption</a> (E2EE), but ensuring your messenger has it, that must be discussed.</p><p>The popular messaging app Telegram has come under fire the most for this. Telegram says on their homepage that, “Telegram messages are heavily encrypted and can self-destruct.” Yet, this statement is only partially true. Yes, you can set your messages to self-destruct, a great privacy feature for some, and yes, they do offer encryption, but what they don’t tell users is that encryption isn’t turned on by default.</p><p>In an interview with <a href="https://gizmodo.com/why-you-should-stop-using-telegram-right-now-1782557415">Gizmodo</a>, Christopher Soghoian, Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union said that, "There are many Telegram users who think they are communicating in an [end-to-end] encrypted way, when they’re not because they don’t realize that they have to turn on an additional setting,” he continued to say that while he’s happy they offer the encryption, it’s not useful if it’s turned off.</p><p>Apps such as Signal, Keybase, and Wickr offer E2EE by default. Less popular but quickly growing apps such as Element, offer E2EE but like Telegram, have not made it a default setting, though the Matrix.org team has said that <a href="https://github.com/vector-im/element-web/issues/6779">default encryption is on their road map</a>.</p><p>Ensuring your conversations and metadata are E2EE is one of the best practices you can have when choosing a messenger.</p><h2 id="sign-up-process">Sign Up Process</h2><p>When it comes to your goals and threat model, you will need to decide how much, if any, information you’re willing to give this company on signup. Do they require a phone number and or SIM card? Do they require an email address, or do they allow completely anonymous signups, and how anonymous is anonymous? Are they storing that info (remember the metadata) unencrypted?</p><p>Giving up your phone number or email won’t be a big deal for many, as any good privacy policy will state they won’t use it for any purpose other than those you’ve granted permission for. Yet, for those avoiding state-sponsored surveillance, you may have a regularly changing number, no number, or would rather not risk giving that information up. Same goes for email.</p><p>So, you will want to find a service that fits this need. While Signal is currently testing signup without a phone number, currently you’re unable to do so. Element, Wickr, many <a href="https://ssd.eff.org/en/glossary/xmpp">XMPP</a> services, don’t require anything but choosing a username.</p><h2 id="source-code">Source Code</h2><p>Open source may be the most used phrase in all of privacy and security, and for good reason. It’s really helpful to be able to review the source code of the product you’re trusting. Experts can look for backdoors, leaks, and other bugs. Organizations that opt to open source their code are showing good faith effort to increase trust between them and the user.</p><p>Yet, open source can also limit your options, again, depending on your threat model and goals. Signal, Wire, and Keybase all offer open source repositories of their applications, and sometimes even the server software itself.</p><p>Open source also doesn’t mean secure. This is often misunderstood, and people hear open source and assume it must be good. Look at the apps code you want to use, you don’t need to be able to check it, but are others? An open source app that no one follows, or contributes to is no more or less secure than a closed source app.</p><p>Wickr, Threema, and others are closed source. They don’t offer the ability to check the source, but that doesn’t immediately rule them out either. When the Electronic Frontier Foundation (EFF) had a comparison chart for messenger apps, it gave Wickr 5-stars. This doesn’t mean it’s perfect for someone like Snowden, but for those avoiding Facebook and Google, it could be a usable option.</p><p>It’s also important to remember there’s no way to check that someone is always using the source code in their repository in the app or server you’re downloading from the Apple Store or Google Play. When it comes to this, reputation becomes a key player in your decision, as does trust, which we will get to next.</p><p>If you’re unsure what to do here, it’s always a safe bet to stick with open source that has a large contributor base and strong reputation. It’s always best to use open source options when they are available and only recommend closed source when there isn’t a usable open source option. This is generally a good way to pick a messenger app as well.</p><h2 id="ownership-trust">Ownership &amp; Trust</h2><p>An often overlooked, but increasingly important part of choosing a secure messenger is, who owns the company that’s providing your service? What would the gain or lose from selling your data and who does the company answer to?</p><p>Wire <a href="https://blog.privacytools.io/delisting-wire/">recently lost a great deal of trust and standing</a> in the privacy world because they quietly sold their company and moved it to the US. They also changed parts of their privacy policy making it harder for users to tell when Wire would share customer data. They did all of this while never updating their current users of such changes, either to the change of the privacy policy, or the move to the US.</p><p>Wire also took in more than $8 million in venture capital funding. So now, users wanted to know more about who owned their data and what jurisdictional rights were changing with the move from Europe to the United States?</p><p>These are questions we must ask of all services. Wire now has investors to answer to who will want a return on their millions of dollars.</p><p>Signal on the other hand <a href="https://signal.org/blog/signal-foundation/">is a non-profit</a> which does not rely on investors and instead relies on donations, sponsorships, and grants. Because of their non-profit status in the US, they must also be highly transparent about not only where the money comes from, but how they spend it. So, users can see where this money goes, and who it’s going to.</p><p>Matrix.org (the service Element uses) runs a similar business model as Signal, located in the UK instead of the US, they reply on donations, partnerships, and grants. Matrix.org is heavily supported by New Vector, a venture capital backed company, however, Matrix.org as a non-profit is transparent about its spending, income, and influences. </p><p>Not all services are non-profit, and that should not rule them out immediately. You can also follow their funding goals. Wire lost credibility because instead of simply relying on user signups, they wanted to be the next Skype for Business and wanted to build a larger enough user base to get the attention of investors. Meanwhile apps such as Wickr, while for-profit, is transparent about taking limited investors to become sustainable on subscriptions.</p><p>This can take some time, because it’s important to know who the investors are, and what the organizational goals are. Will they eventually need to resort to data harvesting to sustain itself, if they do, and you decide to leave the platform, will you leave behind data you don’t want them to get their hands on?</p><h2 id="making-your-choice">Making your choice</h2><p>Now it’s time to choose a messenger and no one can do that for you. Popularity will need to play a role here, there’s no point in joining the new up and coming messenger service if you don’t have a single contact using it as well. One reason Telegram has been so popular is they have managed to convince more than 100 million people to sign up. If you sign in today, you’ll likely see a group of your friends in there. Signal isn’t as far behind, and others are catching up.</p><p>You’ll need to decide who you trust, and who your other contacts trust, and then compare all of that with your goals and your threat model. How much information are you willing to give on signup, does metadata matter to your threat model, and is the service you’re choosing likely to sell itself to the highest bidder once enough people sign up?</p><p>The important thing to remember is there is no one size fits all for messengers, and that each user must decide what is best for them. If someone is an avid WhatsApp or Facebook Messenger user, even Telegram is a step in the right direction. Yet, if that user is concerned with more than just giving data over to Facebook, they may need to look at more secure options.</p><p>Ensure you keep your messenger apps up to date. You don’t want to discover you’ve been compromised because a bug found in version 1 was fixed in version 2 but you didn’t bother upgrading your apps.</p><p>One last piece of advice is that users need to be diligent and never become complacent in their decision. You must be willing to change services if the goals and values of your messenger of choice change in a way that no longer match yours. Look for news of sales, mergers, or acquisitions that could compromise the organization.</p><p><em>Dan Arel is a journalist, author, and privacy advocate. He's also the editor of <a href="https://thinkprivacy.io/">ThinkPrivacy.io</a>. This article was originally published to <a href="https://hackernoon.com/choosing-the-right-messenger-mm3x2z47">Hacker Noon</a> on November 27th, 2019.</em></p>]]></content:encoded></item><item><title><![CDATA[The Trouble with VPN and Privacy Review Sites]]></title><description><![CDATA[<p>There's a massive problem in the privacy world. Websites, social media accounts, and other platforms are constantly popping up out of nowhere, telling you to buy <em>The Greatest Service Ever</em> in order to solve all your privacy woes, whatever that may be. These websites often employ marketing teams to make</p>]]></description><link>https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/</link><guid isPermaLink="false">5dced3c337ad263e10131ccb</guid><category><![CDATA[Privacy]]></category><category><![CDATA[VPN]]></category><category><![CDATA[Trust]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Wed, 20 Nov 2019 21:25:22 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/11/choosingavpn.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/11/choosingavpn.png" alt="The Trouble with VPN and Privacy Review Sites"><p>There's a massive problem in the privacy world. Websites, social media accounts, and other platforms are constantly popping up out of nowhere, telling you to buy <em>The Greatest Service Ever</em> in order to solve all your privacy woes, whatever that may be. These websites often employ marketing teams to make sure their "reviews" are what you see first when you begin your research. Some of them are even operated by VPN providers themselves, operating under anonymous business entities to hide their bias, or doing it right out in the open, hoping you'll mistake their advertising-filled press releases and blogs as insider knowledge of the VPN space.</p><p>When a seemingly "unbiased review" on a site is merely a paid advertisement in disguise, that website is breaking their reader's trust. From a consumer's point of view, affiliate marketing and other paid promotional techniques like this make it near impossible to know when a review is genuine or not. </p><p>This isn't going to be a lengthy blog post on advertising being bad, far from it. In fact, many of the <a href="https://www.privacytools.io/providers/vpn/">VPN providers we recommend</a> engage in responsible advertising across various platforms. The key is transparency: Their advertisements should <em>look like advertisements</em>, and nothing else.</p><h2 id="the-bad">The Bad</h2><p>I'm really looking to take the time here and identify "the bad" sites and resources that use these techniques to profit off a community just looking for reliable answers. Lots of sites like these will claim they're acting in your best interest, but they're just here to make money.</p><p>One common thing I'll see on these sites is a ranked list of providers that are ostensibly the best ones to choose from. These sites have supposedly done all the work for you, so you can just click and go, assured you're making the right choices.</p><p>So here's my issue with ranking VPN providers: Let's face it, VPN providers are all offering the same service, and they will either protect your information or they won't. Ranking providers like this only serves as an easy way to guide users to a certain choice (in this case, the choice that will make the reviewers the most money). </p><p>Let's look at one of these "review" sites for example, which will go unnamed for the purposes of this article. On their homepage they prominently list 10 providers as the "best" VPN services, in this order:</p><ol><li>NordVPN</li><li>Surfshark</li><li>ExpressVPN</li><li>PerfectPrivacy</li><li>IPVanish</li><li>Mullvad</li><li>CyberGhost</li><li>Trust.Zone</li><li>ibVPN</li><li>Private Internet Access</li></ol><p>To their credit, this review site also helpfully included an advertising disclosure in their footer. On this fairly well hidden away page, they note that they participate in affiliate programs from 8 providers, as follows:</p><ul><li>NordVPN</li><li>SurfShark</li><li>ExpressVPN</li><li>Perfect-Privacy</li><li>IPVanish</li><li>CyberGhost</li><li>Trust.Zone</li><li>Private Internet Access</li></ul><p><em>Hmm</em>. Look familiar? Of the 73 providers this site had reviewed at the time of writing this article, <strong>all eight</strong> of the VPN providers paying this review site happened to make their top 10 recommendations. In fact, you'd have to scroll down to #6 before you found a provider that wouldn't pay them, practically buried. </p><p>Furthermore, their list includes NordVPN, a company <a href="https://www.reddit.com/r/privacytoolsIO/comments/dl2m7b/nordvpn_confirms_one_of_their_finland_data_center/">notable for not disclosing security breaches</a> in a timely fashion, and ExpressVPN, a provider <a href="https://www.goldenfrog.com/blog/some-providers-use-weak-1024-bit-keys-vyprvpn-explains-why-its-strong-keys-matter">notable for once using weak 1024-bit encryption keys</a> to protect their users. By any objective standard, these providers do not deserve to be included in a top 10 recommendations list for securing anybody's information. This review site in particular claims to have set criteria for their recommendations, but this just demonstrates that any criteria can be adjusted to fit any goal you may have.</p><p>If these sites truly wanted to be helpful, they would consolidate all the relevant information and present it to their users without making the choice for them. A provider is going to be better or worse for every user depending on their particular situation, and encouraging making an informed choice between options presented equally is far more beneficial to putting one over the other in a largely arbitrary fashion.</p><p>But that isn't to say they should just throw all the providers in a big table and call it a day. Almost worse than the ranking scheme above is when sites provide out of context lists of providers, often just with pricing and a link. Sometimes they will link you to a full review (more on that in a bit), but for the most part these sites just expect you to follow their recommendations blindly.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/vpn-table-example-1.png" class="kg-image" alt="The Trouble with VPN and Privacy Review Sites"><figcaption>Affiliate links and discounts galore! This is a different site than before, but look at the familiar faces we're seeing...</figcaption></figure><p>These read like advertisements, because they usually are. Once again we see the usual suspects — NordVPN, ExpressVPN... — paraded as the gold standard in the VPN space, not out of any inherent value, but based on the value of their affiliate programs. To further this point, let's take a look at how much each of the five providers above will pay you for a referral (on a one month plan).</p><ol><li>ExpressVPN: $13 for first month</li><li>NordVPN: $11.95 for first month</li><li>VPNArea: $4.95 for first month</li><li>VPN.ac: $2.90 for first month</li></ol><p><em>Unfortunately, Perfect Privacy would not share their commission rates publicly, but if anyone has any information on that I'd be happy to receive it. What I will say is that based on the information above, I would not be surprised if it fell right between ExpressVPN and NordVPN's rates. Their one month plan costs $12.99, so assuming a 100% match on the first month (the standard from NordVPN and ExpressVPN) that would add up quite nicely.</em></p><p>Once again, we see a lineup of providers ordered in a way that appears to <em>conveniently</em> pay the most to the website owner. And therein lies the issue with affiliate programs. Once you begin receiving financial compensation <em>on a per-signup basis</em>, you are now motivated to push the most users to the sites that pay more on a monthly basis, rather than the sites that will actually help the user.</p><p>Occasionally, these recommendations are coupled with a "review" that is supposedly independent and unbiased, but in reality are simply more marketing tools to persuade you towards their opinions. In most cases, these reviewers will simply copy the VPN provider's own press releases and even media, presenting their advertising as fact to their readers. These reviews are always hidden away as well, with main navigation links directing users towards the more affiliate-link-laden lists and tables that they'd much rather you browse. The true value of these review articles is the <a href="https://www.pcmag.com/news/367640/how-a-vpn-review-site-dominated-google-search-with-a-scam">Search Engine Optimization (SEO) advantage they bring</a> in the rankings on Google, and not much more. More traffic = More clicks, at the expense of good, independent content and integrity.</p><h2 id="the-good">The Good</h2><p>This isn't to say all tables or lists are bad, it's how they're presented rather that makes or breaks a site. <a href="https://thatoneprivacysite.net/">ThatOnePrivacySite.net</a> for example sets what is perhaps the gold standard of VPN comparisons:</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/image-11.png" class="kg-image" alt="The Trouble with VPN and Privacy Review Sites"><figcaption>VPN providers listed as equals with their benefits and flaws covered? <em>What?</em></figcaption></figure><p>Here's the difference. They include virtually every provider — the good and the bad — and present them at equal value to sort through. Instead of providing their readers with answers, they provide them with information that can be used to deduce their own recommendations, based on their values as an individual. </p><p>But some users just want <em>the answers,</em> and that's fine too. I think there is still definitely a way to provide recommendations without introducing financials or bias into the equation. At <a href="https://www.privacytools.io">PrivacyTools</a>, we've developed a set list of criteria, and we make that abundantly clear when you read our list of <a href="https://www.privacytools.io/providers/vpn/">recommended VPN providers</a>.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/image-12.png" class="kg-image" alt="The Trouble with VPN and Privacy Review Sites"><figcaption>Our currently recommended VPN provider Mullvad meets and exceeds our transparent expectations, and does not pay reviewers to tip the scales in their favor.</figcaption></figure><p>We also refrain from using affiliate links. As we've discussed, they are fundamentally flawed ways to market a service, and using them would break the trust our community has in our recommendations. </p><p>We do have a newly-introduced <a href="https://www.privacytools.io/sponsors/">sponsorship program</a>, but all of our finances are handled in an incredibly transparent fashion. As a non-profit organization, the funding we receive cannot be used for private profit, and our community can see both where we receive money from and how it is being spent thanks to <a href="https://opencollective.com/privacytoolsio/">Open Collective</a>. Additionally, the recommendations on <a href="https://www.privacytools.io">www.privacytools.io</a> are handled by an entirely separate team of editors and contributors than the administrative team such as myself that handles the sponsorships and finances. The editors have sole control over our recommendations and operate entirely independently and on a volunteer-basis to ensure the choices we make are for the benefit of the privacy community over one individual.</p><p>Ultimately, as a matter of policy our sponsors have no say over our recommendations, or whether they are recommended or a competitor is removed. We have given our community vast access to our website and internal workings to keep us in check and ensure we're staying true to our word. This separation of management and editors is a strategy that has served the media industry well for decades, and makes all of our team and organization a more credible and trustworthy source of information.</p><h2 id="in-summary">In Summary</h2><p>We have a lot of points we want to get across. The current landscape of privacy reviewers and "experts" weighing in on topics regarding the very companies that pay for their reviews is morally reprehensible, and just another way for big tech companies to collect all of our data more easily.</p><p>Review sites should make it abundantly clear when their reviews are paid for by the VPN companies in any fashion, whether that be via affiliate programs or good old-fashioned sponsorships. This can't be via a hidden-away disclosure in the footer or not published at all, but <em>clear </em>and<em> close in proximity</em> to the claims published on their site. <strong>Customers are not expecting or seeking out these disclosures</strong> when they visit review sites, and can't be expected to immediately discern whether you're speaking from a place of unbiased fact, or from a place with the greatest financial incentive. Better yet, they should reconsider their entire business model. We built PrivacyTools from the ground up in 2015 based solely on a community donation model that still keeps us sustained. It's the more difficult way to build a site to be sure, actually working to gain the trust of a huge community, but the difference in quality and integrity is remarkable.</p><p>VPN providers should consider spending less money on paid reviews, and more money on securing and validating their infrastructure. Regular security audits are one fantastic way for companies to demonstrate their dedication to keeping their users secure. We strongly believe VPN services should consider the <a href="https://www.privacytools.io/providers/vpn/#criteria">PrivacyTools VPN Criteria</a>, especially in regard to the ownership of their organization. Your VPN provider should not be hiding away in Panama controlled by anonymous leadership. While you <em>as a user</em> deserve privacy, transparency should be <em>required</em> of providers if you are expected to trust them. I would not give my money to some anonymous overseas investor, why would I give all of my internet traffic to some anonymous overseas administrator?</p><p>Finally, when you're choosing a VPN provider, do your own research. <a href="https://blog.privacytools.io/understanding-vpns/">Understand what a VPN actually does for you</a>. <a href="https://www.pcmag.com/article/371839/what-does-a-vpn-security-audit-really-prove">Understand what it is a security audit proves</a>, find out who owns and operates the VPN service you want to use, and make sure their policies and technologies reflect your values. Again, we'll recommend <a href="https://thatoneprivacysite.net/">ThatOnePrivacySite</a> and <a href="https://www.privacytools.io/providers/vpn/">PrivacyTools</a> as great resources to get you started, but <a href="https://blog.privacytools.io/choosing-a-vpn/">ultimately gathering the information yourself</a> and making an informed decision is the only way to make sure your privacy is being respected.</p><p><strong>Update 11/21:</strong> I've clarified this article to make it clear that I cannot objectively prove how much a "review site" is profiting off any particular provider, without having access to their private financial statements. The findings in this article were based on public information from affiliate programs and opinions were drawn accordingly.</p>]]></content:encoded></item><item><title><![CDATA[Cutting the Wire]]></title><description><![CDATA[<p>It has recently come to the attention of the PrivacyTools team that Wire, the popular end-to-end encryption messaging platform <a href="https://forum.privacytools.io/t/wire-swiss-gmbh-is-now-owned-by-a-usa-holding-company/1932">had been sold or moved to a US company</a>. After a week of questioning, Wire finally confirmed they had changed holding companies and would now be a US based company in</p>]]></description><link>https://blog.privacytools.io/delisting-wire/</link><guid isPermaLink="false">5dd31fb637ad263e10132024</guid><category><![CDATA[Delisting]]></category><category><![CDATA[Updates]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Instant Messengers]]></category><dc:creator><![CDATA[Dan Arel]]></dc:creator><pubDate>Tue, 19 Nov 2019 16:56:26 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/11/delist-wire.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/11/delist-wire.png" alt="Cutting the Wire"><p>It has recently come to the attention of the PrivacyTools team that Wire, the popular end-to-end encryption messaging platform <a href="https://forum.privacytools.io/t/wire-swiss-gmbh-is-now-owned-by-a-usa-holding-company/1932">had been sold or moved to a US company</a>. After a week of questioning, Wire finally confirmed they had changed holding companies and would now be a US based company in a move they called “simple and pragmatic,” as they worked to expand their foothold in the enterprise market. This also came alongside the news that Wire had accepted more than $8 million in Venture Capital (VC) funding from Morpheus Ventures, as well as other investors.</p><p>Morpheus Ventures holds a <a href="https://morpheus.com/portfolio/">portfolio</a> including companies in healthcare, voice AI, life insurance, and retail customer data analytics: All sectors that have historically used invasive data collection methods to survive. Why would a VC with a portfolio centered on consumer data want to invest in a company whose mission claims to protect that very same information?</p><p>Earlier this year, Wire announced they had entered a partnership with <a href="https://www.globenewswire.com/news-release/2019/07/10/1880912/0/en/Wire-and-FedResults-Partner-to-Offer-End-to-End-Encrypted-Collaboration-Platform-to-Government-Agencies.html">FedResults</a>, in a move that would bring Wire's secure messaging platform to US federal agencies. This raised a few eyebrows, but did not alarm the privacy community as Wire remained Swiss based and beholden to Switzerland's strict privacy laws. Today however, while much of Wire's business will continue to be run out of their Swiss offices, with new US-based ownership it is not entirely clear how much jurisdiction the United States will have over Wire data.</p><p>This is alarming because it is well known that <a href="https://www.vice.com/en_us/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text">Wire stores unencrypted metadata</a> for every user.</p><p>In an interview with <a href="https://techcrunch.com/2019/11/13/messaging-app-wire-confirms-8-2m-raise-responds-to-privacy-concerns-after-moving-holding-company-to-the-us/">TechCrunch</a>, Wire CEO Morten Brøgger said of privacy laws: “We are in Switzerland, which has the best privacy laws in the world” — it’s subject to Europe’s General Data Protection Regulation framework (GDPR) on top of its own local laws — “and Wire now belongs to a new group holding, but there no change in control.”</p><p>Even if he is correct, the move and statement do bring up further questions. With Wire now being a US company with contracts partnering it with US federal authorities, will those authorities now have leverage to compel Wire to give up metadata on users? Wire has investors to answer to and will not be able to risk losing large deals with clients like the US federal government. This is of course a hypothetical situation, but one to be considered nonetheless as we decide which services to recommend on PrivacyTools.</p><p>Wire also quietly made an adjustment to its own privacy policy. A <a href="https://web.archive.org/web/20180324221043/https://wire.com/en/legal/#privacy-7">previous version of the policy</a> (July 18, 2017) stated it would only share user data when required by law. Now (Updated September 1, 2018), it reads they will share user data when "necessary." What does necessary mean, and necessary to whom? Necessary to law enforcement, shareholders, or advertisers? The word "necessary" is an alarming change because "necessary" is purposefully vague terminology that could conceivably be used as a tool to justify any action. This change doesn't leave the user with much confidence as to when the company may share your data.</p><p>Yet another red flag, and one of the more important ones to us, was is that Wire decided not to disclose this policy change to its users, and when asked why, Brøgger was flippant in his response, stating: “Our evaluation was that this was not necessary. Was it right or wrong? I don’t know.”</p><p>We feel we do know, and the answer was that it was wrong. Privacy and security are not built solely on strong technology, but on trust. Yes, we can review Wire's open source code on GitHub, but we can't ever be sure that code is the same exact code that runs on their servers in practice. Yet, we have trusted them in the past because Wire had built a trustworthy reputation for themselves. We now feel that Wire has lost this reputation. By deciding to withhold information regarding its ownership and policies from its users, Wire has broken the trust our community has placed in it, and worse yet sounds almost dismissive of the worries voiced by the privacy community that had long held them in high regard.</p><p>Because of these ongoing concerns, and this break in trust in Wire's organization, PrivacyTools has made the decision to remove Wire from its recommendations. It is worth noting that does not necessarily mean Wire is unsafe, but we believe it is our duty to recommend products that we as a team feel comfortable standing behind. We need to believe in the security, privacy, and integrity of our recommendations, and we no longer feel we can do that with Wire at this time.</p>]]></content:encoded></item></channel></rss>