<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Privacy - PrivacyTools]]></title><description><![CDATA[You are being watched. We’re providing resources to protect your privacy.]]></description><link>https://blog.privacytools.io/</link><image><url>https://blog.privacytools.io/favicon.png</url><title>Privacy - PrivacyTools</title><link>https://blog.privacytools.io/</link></image><generator>Ghost 3.14</generator><lastBuildDate>Thu, 29 Jul 2021 18:05:04 GMT</lastBuildDate><atom:link href="https://blog.privacytools.io/tag/privacy/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[What are security, privacy, and anonymity?]]></title><description><![CDATA[<p>We may think that we know the differences between privacy, security and anonymity, however we often mix them up. People will often criticize a product or service as “not private” when they really mean “not anonymous.” Privacy, security, and anonymity often complement each other but they are not always dependent</p>]]></description><link>https://blog.privacytools.io/privacy-security-anonymity/</link><guid isPermaLink="false">5fc95fe22275c103a845ca84</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Opinion]]></category><dc:creator><![CDATA[Nate Bartram]]></dc:creator><pubDate>Tue, 23 Feb 2021 10:21:42 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1548092372-0d1bd40894a3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXwxMTc3M3wwfDF8c2VhcmNofDF8fHNlY3VyaXR5fGVufDB8fHw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1548092372-0d1bd40894a3?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=MXwxMTc3M3wwfDF8c2VhcmNofDF8fHNlY3VyaXR5fGVufDB8fHw&ixlib=rb-1.2.1&q=80&w=2000" alt="What are security, privacy, and anonymity?"><p>We may think that we know the differences between privacy, security and anonymity, however we often mix them up. People will often criticize a product or service as “not private” when they really mean “not anonymous.” Privacy, security, and anonymity often complement each other but they are not always dependent on each other and they are definitely not the same thing. A service can be private without being anonymous, or even secure without being private. Which one should you prioritize? To some extent, there are no wrong answers. It really comes down to your threat model and what your desired goal is. It is perfectly fine to pick a product that provides privacy even though it doesn't provide anonymity. Futhermore, it's okay to pick a product that doesn't provide security if it does provide one of the other features. The important thing is that you need to be aware what these products and services are and aren’t offering you so that you can use them correctly.</p><p>There’s lots of ways to define privacy, security, and anonymity. Someone showed me <a href="https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298">this</a> definition and I really liked it. It seems to pretty much hit the nail on the head when applying these terms specifically to data privacy and cybersecurity:</p><p><strong>Anonymity: </strong><em>The sender and/or recipient's real ID is unknown</em></p><p>In the real world this could be a secret admirer sending a valentines day card. Online this could be when the ip (or fp/opsec) footprints cannot lead back to the poster: e.g. Tor</p><p><strong>Privacy: </strong><em>The contents of the message can only be seen/heard by the intended recipient(s)</em></p><p>In the real world this could be a whispered conversation between two people in the middle of Siberia. Online this could be a Signal message, which is end-to-end encrypted and only the recipient &amp; sender can read the contents</p><p><strong>Security</strong> (in the context of privacy/anonymity): <em>The parties involved are who they say they are</em></p><p>In the real world this could be something unique and verifiable such as a passport or fingerprints. Online this could be certificates or PGP signatures.</p><p>These topics often overlap: Privacy can help your security because if people don't know information about you, they can't effectively target you. For example, an attacker that doesn't know who you bank with cannot know which bank to target. Security can protect your privacy by forcibly controlling who has access to that information about you. Let’s take a few examples:</p><p><b>Security without Privacy or Anonymity</b></p><p>The most obvious example of this that comes to mind is Google. Google has had almost no major data breaches in all their years of existence, yet they know almost everything about everyone to the point that the former CEO Eric Schmidt remarked "<a href="https://www.zdnet.com/article/google-even-knows-what-youre-thinking/">We can more or less know what you're thinking about.</a>" Google offers world-class security with zero privacy or anonymity.</p><p><b>Security &amp; (some) Privacy without Anonymity</b></p><p>Consider the renowned encrypted messaging app Signal. Because your phone number is required, you can be unmasked by a court order or even a web search depending on the phone number you use. However, Signal is renowned for having some of the best security in the world, and the content of your messages and the information you transfer will be protected and controlled even if your identity is not. Top-notch security and privacy over the content of your messages, but anonymity cannot be guaranteed.</p><p><b>Anonymity without Security</b></p><p>Cash is a great example of this. Paying for a product in cash preserves your anonymity - unless the business requires it, you don't have to give any kind of information at all. Yet, you have no security if the seller doesn't deliver the item (unless you have a receipt). You have no protection from fraud or anything like that.</p><p><b>Security with Privacy &amp; Anonymity</b></p><p>XMPP is arguably the best example of this. XMPP allows you to sign up without any real information, over a VPN or Tor connection for total anonymity. Additionally, the conversations can be protected by OMEMO encryption, meaning the data itself is also private. When used properly, this is as closed to perfect as you can get, if a bit user-unfriendly. (Editor's note: XMPP is not officially endorsed by PrivacyTools for reasons listed <a href="https://github.com/privacytools/privacytools.io/issues/1854">here</a>.)</p><h3 id="closing-thoughts">Closing Thoughts</h3><p>These three concepts are not necessarily dependent on each other. A secure product does not guarantee privacy, a private product does not guarantee security, and anonymity does not guarantee either. Also as I said before, there is nothing wrong with valuing one facet over another.  It's also okay to use Signal even though it doesn't give you total anonymity. Just be sure you understand how a product is meant to be used and where it both shines and falls short. It would be awful to use Google thinking that it will give your communications total privacy and then your financial details get stolen by a <a href="https://nypost.com/2020/09/23/shopify-says-rogue-employees-may-have-stolen-customer-data/">rogue employee</a>. Or if you used a service like Signal to organize protests in a hostile country only to be arrested once your phone number is unmasked. Know the limitations of the services you choose and decide what features are important to you. It’s also important to know that privacy and security are sliding scales. This is could be an entire blog post on its own. Think of passwords. Any password – even “password” - is technically more secure than no password at all. But a 16-character randomly-generated password is <b>even more</b> secure than “password.” Sometimes it’s okay to find a solution that offers a blend – less privacy in one area in exchange for more security in another, or vice versa. Once again, it all comes back to your threat model, your needs, and your resources.</p><p><em>Cover photo by </em><a href="https://unsplash.com/@fantasyflip"><em>Philipp Katzenberger</em></a><em>. Originally published on <a href="https://thenewoil.xyz/privsecanon.html">The New Oil</a>.</em></p>]]></content:encoded></item><item><title><![CDATA[Introducing our PeerTube Instance]]></title><description><![CDATA[<p>Since April 2019, one of the primary goals of PrivacyTools has been to promote the creation and use of decentralized and federated networks to replace the centralized giants like Google and Facebook that have taken control of the internet over the last decade. Already we've launched Mastodon and WriteFreely instances</p>]]></description><link>https://blog.privacytools.io/introducing-our-peertube-instance/</link><guid isPermaLink="false">5f020c85b6f58f03b3d05ffc</guid><category><![CDATA[Press Release]]></category><category><![CDATA[Updates]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[PeerTube]]></category><category><![CDATA[Video]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Sun, 05 Jul 2020 19:32:55 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2020/07/peertube-cover-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2020/07/peertube-cover-1.jpg" alt="Introducing our PeerTube Instance"><p>Since April 2019, one of the primary goals of PrivacyTools has been to promote the creation and use of decentralized and federated networks to replace the centralized giants like Google and Facebook that have taken control of the internet over the last decade. Already we've launched Mastodon and WriteFreely instances with thousands of users, and our <a href="https://chat.privacytools.io">Matrix homeserver</a> is one of the largest in the Matrix fediverse. </p><p>This week, we're happy to announce another instance in <a href="https://www.privacytools.io/services/">our foray into federated platforms</a>, <a href="https://tube.privacytools.io/videos/overview"><strong>tube.privacytools.io</strong></a>, an open and curated PeerTube instance that you can use to view videos on any instance in the interconnected PeerTube network.</p><h2 id="what-is-peertube">What is PeerTube?</h2><p>PeerTube is software you can install on a server that allows you to create your very own video hosting website, a "homemade YouTube" if you will. The difference between PeerTube and YouTube is that PeerTube is not a massive platform centralizing videos from all their users on a single server farm. Instead, PeerTube connects many small and independent video hosting providers, using the same technology as Mastodon and WriteFreely: ActivityPub.</p><p>PeerTube is the only video hosting platform that combines open code, federation, and peer-to-peer broadcasting/viewing into a single service, ensuring that the network is completely free and robust, even if your video goes viral!</p><p>In an ideal world, every content creator would host their own PeerTube instance and upload their videos there, and every viewer would host their own PeerTube and use it to follow others. Federated platforms thrive with as many instances as possible, and if that is something that excites you, you should definitely check out <a href="https://joinpeertube.org">joinpeertube.org</a> for more details on setting up an instance.</p><h2 id="our-instance">Our Instance</h2><p>Of course, there are always users who simply don't have the time, knowledge, or budget to host their own services, and that's fine too! That's why we launched our instance with <a href="https://tube.privacytools.io/about/instance">open registration</a>, so you can join the PeerTube community just by creating an account. An account on our instance will allow you to like, comment on, and subscribe to the numerous videos and video creators on the PeerTube platform.</p><p>Of course, since PeerTube is ActivityPub-based, you can actually subscribe with <em>any</em> ActivityPub platform, including subscribing to creators with a Mastodon account: </p><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2020/07/image-2.png" class="kg-image" alt="Introducing our PeerTube Instance"></figure><p>An account on PeerTube simply gives you a more video-centric viewing experience compared to Mastodon, but you have the option to choose what works best for you!</p><h2 id="for-content-creators">For Content Creators</h2><p>We do realize that for video creators, hosting your own PeerTube platform is a unique challenge. Depending on your size, servers and bandwidth can quickly become costly. And even though PeerTube tries to mitigate this as much as possible with Peer-to-Peer video viewing, that cost may still be significant to you.</p><p>That's why we are offering free, unlimited video hosting to privacy and technology focused content creators. That's no limit to either video storage or bandwidth, and we believe our infrastructure can handle many, many viewers at high performance to get your content out to as many people as possible.</p><p>Uploading to PeerTube is as simple as pasting a link to an existing YouTube video you hold the copyright to, or uploading it manually yourself. If you don't want to upload to PeerTube regularly, please reach out anyways, we can run automated scripts on our side of things that will mirror your YouTube channel for you with very little effort, with your permission.</p><p><a href="https://tube.privacytools.io/video-channels/techlore_channel/videos">Techlore</a> is the first content creator to partner with us to bring his <a href="https://www.youtube.com/channel/UCs6KfncB4OV6Vug4o_bzijg">YouTube content</a> to the PeerTube network! We're very excited to get his videos out to our community. If you want to experience the PeerTube viewing experience for yourself, check out his channel on our instance.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2020/07/image-5.png" class="kg-image" alt="Introducing our PeerTube Instance"><figcaption><a href="https://tube.privacytools.io/video-channels/techlore_channel/videos">https://tube.privacytools.io/video-channels/techlore_channel/videos</a></figcaption></figure><p>But maybe you already host a PeerTube instance already, or the idea of setting one up doesn't scare you. Please, reach out to us anyways! We are happy to follow informative non-spammy instances to boost your content on our discover page, and provide <a href="https://docs.joinpeertube.org/#/admin-following-instances?id=instances-redundancy">instance redundancy</a> to reduce the bandwidth load on your own instance. PeerTube's redundancy controls allow our server to mirror your content, so that viewers will automatically download content from us as well.</p><p>Over the last week we've been working with <a href="https://tube.privacytools.io/accounts/sunknudsen@peertube.sunknudsen.com/video-channels">Sun Knudsen</a>, a privacy content creator who recently launched his own PeerTube instance to mirror his YouTube content. By enabling video redundancy with his server, we're able to share the bandwidth load without harming user viewing experiences. Check out his channel for some more great content!</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2020/07/image-7.png" class="kg-image" alt="Introducing our PeerTube Instance"><figcaption><a href="https://tube.privacytools.io/video-channels/sunknudsen_channel@peertube.sunknudsen.com/videos">https://tube.privacytools.io/video-channels/sunknudsen_channel@peertube.sunknudsen.com/videos</a></figcaption></figure><p>Finally, if you're not a content creator, but you know someone else who would be perfect for the PeerTube platform, please encourage them to reach out!</p><p>Our instance will be highly curated: We are primarily looking for content creators who will help advance the message of online privacy and self-hosted technologies, so unfortunately we can't provide accounts for every creator under the sun. But, even if your content isn't quite compatible with the tone of our local PeerTube community, we are still happy to help you find the perfect instance for your content, or help set up your own node in the fediverse.</p><h2 id="final-thoughts">Final Thoughts</h2><p>We are very happy to support PeerTube and we believe there is tons of fantastic content to watch on the network.</p><p>PeerTube is currently in the middle of a <a href="https://joinpeertube.org/roadmap">crowdsourcing campaign</a> through the end of this year. They have currently surpassed their target of €20,000 for the month of July and are well on their way to raising their final goal of €60,000 by November.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2020/07/image-8.png" class="kg-image" alt="Introducing our PeerTube Instance"><figcaption><a href="https://joinpeertube.org/roadmap">https://joinpeertube.org/roadmap</a></figcaption></figure><p>Contributions will fund the development of many new features coming to PeerTube's future, including additional plugin and playlist functionality, and live-streaming! If you are interested in contributing to the future of federated and Peer-to-Peer online video, please consider sending some support their way.</p><p>And of course, if you like what we're doing here at PrivacyTools, consider a <a href="https://opencollective.com/privacytools">contribution</a> to our project as well. The donations of all our fantastic supporters will allow us to continue hosting and promoting great services for years to come!</p><p>If nothing else, <a href="https://tube.privacytools.io">create a PeerTube account</a> or <a href="https://joinpeertube.org">instance</a>, and get watching :)</p><h3 id="media">Media</h3><p><a href="https://github.com/privacytools/brand">Branding Resources</a></p><p><strong><strong><strong><strong>You are being watched. </strong></strong></strong></strong>Private and state-sponsored organizations are monitoring and recording your online activities. Since 2015, PrivacyTools has been providing services, tools and knowledge to protect your privacy against global mass surveillance.</p><h3 id="press-contacts">Press Contacts</h3><p><strong><strong><strong><strong>Jonah Aragon</strong></strong></strong></strong><br>PrivacyTools<br><a href="mailto:jonah@privacytools.io">jonah@privacytools.io</a></p>]]></content:encoded></item><item><title><![CDATA[Protecting Your Privacy With a Virtual Machine While Using Zoom]]></title><description><![CDATA[With the COVID-19 outbreak keeping many at home, Zoom has seen a huge increase in use with schools and businesses. But with growing privacy and security concerns, how can you stay safe?]]></description><link>https://blog.privacytools.io/protecting-your-privacy-while-using-zoom-at-home/</link><guid isPermaLink="false">5e868a8402ef133bb433917c</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Guides]]></category><dc:creator><![CDATA[Daniel Gray]]></dc:creator><pubDate>Fri, 03 Apr 2020 18:35:05 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2020/04/zoom-cover.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2020/04/zoom-cover.jpg" alt="Protecting Your Privacy With a Virtual Machine While Using Zoom"><p>With the ongoing COVID-19 pandemic, many of us have had to make rapid lifestyle adjustments to keep up with social distancing and isolation rules. More of us are working and studying from home, and using telecommunication tools for conferences and lectures is becoming a daily habit for people around the world.</p><p>One of these tools in particular, <a href="https://en.wikipedia.org/wiki/Zoom_Video_Communications">Zoom</a>, has seen a huge increase in use since the COVID-19 outbreak. This is due in part to their clever marketing and support materials they've provided to teachers, students, office workers, and employers. Consumer Reports privacy researcher Bill Fitzgerald has suggested Zoom is using the pandemic as a <a href="https://www.insidehighered.com/news/2020/03/25/pivot-online-raises-concerns-ferpa-surveillance">selling opportunity</a>.</p><h2 id="zoom-s-privacy-woes">Zoom's Privacy Woes</h2><p>Of course, everyone is keen to continue work and keep productivity at a steady rate through this crisis, and to many employers Zoom appears to be a great option to do so. And Zoom is happy to take on customers who will likely continue to use their services after the pandemic subsides, where they can continue to <a href="https://www.consumerreports.org/video-conferencing-services/zoom-teleconferencing-privacy-concerns/">mine the personal data of their users</a>.</p><p>Many institutions and workplaces did not have preparations in place for a crisis of this scale, requiring them to adopt technology without taking the time to consider the privacy and security implications of the solutions chosen, — of which <a href="https://en.wikipedia.org/wiki/Zoom_Video_Communications#Privacy">there are a number</a> — prompting bans from organizations like the United Kingdom's <a href="https://metro.co.uk/2020/03/25/concern-zoom-video-conferencing-mod-bans-security-fears-12455327/">Ministry of Defence</a> and <a href="https://www.reuters.com/article/us-spacex-zoom-video-commn/elon-musks-spacex-bans-zoom-over-privacy-concerns-memo-idUSKBN21J71H">SpaceX</a>. Zoom may not be suitable for you or your organization, as privacy breaches continue to pop up. Just days ago it was revealed that Zoom was <a href="https://www.vice.com/en_us/article/k7e95m/zoom-leaking-email-addresses-photos">leaking email addresses and other profile information</a> to other users with an address on the same domain. More bad news for Gmail users!</p><p>Zoom is not the best choice for protecting communications privacy. Zoom <a href="https://protonmail.com/blog/zoom-privacy-issues/">falsely claims</a> to support <a href="https://en.wikipedia.org/wiki/End-to-end_encryption">end-to-end encryption (E2EE)</a>, when in fact Zoom only uses regular <a href="https://en.wikipedia.org/wiki/Transport_Layer_Security">transport layer security (TLS)</a> such as that used when visiting https websites. This means that Zoom can see the contents of your conversations and calls, when this would not be possible with true end-to-end encryption.</p><p>If you do have the ability to choose what platform you use, we recommend considering <a href="https://meet.jit.si/">Jitsi</a> or <a href="https://bigbluebutton.org/">BigBlueButton</a>, two options which can be hosted by your business or institution internally, rather than relying on their cloud offerings. At PrivacyTools, we've also compiled a list of recommendations for <a href="https://www.privacytools.io/software/real-time-communication/">Real-Time Communication</a> you can also check out, especially if you need more than just video.</p><p>But sometimes we don't have the opportunity to choose the platforms we must use to communicate with our coworkers, students, and friends. If you are required to use Zoom or software like this, that you do so using a Virtual Machine (VM). A VM is a program that works like a completely separate computer inside your computer. The "host" operating system, which is your main system, continues to run everything you might need, while a "guest" operating system <em>also</em> runs completely independently. You can run any programs you want — like Zoom! — inside this guest operating system, and they will be completely isolated from your system and files. It won't even know the host exists!</p><p>Using a VM will help with maintaining some security, especially if you need to use a personal device at home to work. Bugs like these recently discovered exploits that allowed <a href="https://medium.com/bugbountywriteup/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5">malicious websites to enable your webcam</a>, the <a href="https://techcrunch.com/2020/04/01/zoom-doom/">use your camera without consent</a> and the discovery of a user's <a href="https://www.bleepingcomputer.com/news/security/zoom-lets-attackers-steal-windows-credentials-run-programs-via-unc-links/">Windows username and ability to steal credentials</a> would not have been possible, as Zoom would be completely isolated on your device and would not be able to run at all when your VM was shut down. It's also worth noting that Zoom has decided on a <a href="https://techcrunch.com/2020/04/02/zoom-freezes-feature-development-to-fix-security-and-privacy-issues/">complete feature freeze</a> in an attempt improve security and privacy.</p><p>When Zoom is confined in the VM, it cannot see what applications are open outside on your host operating system. We recommend users avoid attaching their webcam, (if they can). However, some users have reported that it is encouraged or required by their school or employer. Fortunately in these cases, you can still attach your webcam as-needed to the guest operating system for full functionality.</p><!--kg-card-begin: html-->    <script type="application/ld+json">
    {
      "@context": "http://schema.org",
      "@type": "HowTo",
      "name": "Setting Up Zoom in a VM",
      "description": "Creating a Virtual Machine for applications like Zoom is a relatively easy task for most tech-savvy users. We are going to outline the basic steps you need here, but if you need more guidance I've created a separate guide with detailed instructions and screenshots to help you through the process.",
      "tool": [
        {
          "@type": "HowToTool",
          "name": "computer"
        }, {
          "@type": "HowToTool",
          "name": "VirtualBox"
        }
      ],
      "supply": [
        {
          "@type": "HowToSupply",
          "name": "Debian ISO"
        }
      ],
      "step": [
        {
          "@type": "HowToStep",
          "text": "Verify your Debian ISO is legitimate"
        }, {
          "@type": "HowToStep",
          "text": "Install VirtualBox and the VirtualBox Extension Pack"
        }, {
          "@type": "HowToStep",
          "text": "Create a new VM in VirtualBox. Set the type to Linux / Debian, give it a good amount of RAM, and create a virtual hard disk."
        }, {
          "@type": "HowToStep",
          "text": "Adjust the VM's settings and attach the Debian ISO you've downloaded"
        }, {
          "@type": "HowToStep",
          "text": "Start your new Debian VM and complete the Debian installer"
        }, {
          "@type": "HowToStep",
          "text": "Install VirtualBox Guest Additions"
        }, {
          "@type": "HowToStep",
          "text": "Attach any devices (like webcams) you need"
        }
      ],
      "totalTime": "PT1H"
    }
    </script><!--kg-card-end: html--><h2 id="setting-up-zoom-in-a-vm">Setting Up Zoom in a VM</h2><p>Creating a Virtual Machine for applications like Zoom is a relatively easy task for most tech-savvy users. We are going to outline the basic steps you need here, but if you need more guidance I've created a <a href="https://assets.privacytools.io/aragon-drop/zoom_tutorial.pdf">separate guide with detailed instructions</a> and screenshots to help you through the process.</p><h3 id="what-you-ll-need">What You'll Need</h3><ul><li>A computer capable of running a Virtual Machine. Most modern machines should be, but it is worth <a href="https://www.technorms.com/8208/check-if-processor-supports-virtualization">double-checking</a>.</li><li>A Virtual Machine "hypervisor": This is what actually runs the VM. For most people the free <a href="https://www.virtualbox.org/wiki/Downloads">VirtualBox</a> program works well, and it is what we use in our guide. Advanced users may wish to use a solution like Parallels, VMWare Workstation, Hyper-V, or Gnome Boxes, all of which will support this functionality as well.</li><li>VirtualBox users who need webcam support should also download the <a href="https://www.virtualbox.org/wiki/Downloads">VirtualBox Extension Pack</a> from their download page.</li><li>A Debian ISO (Linux installer <a href="https://cdimage.debian.org/debian-cd/current/amd64/iso-cd/">download</a>, <a href="https://cdimage.debian.org/debian-cd/current/amd64/bt-cd/">torrent</a>)</li></ul><h3 id="overview">Overview</h3><ol><li><a href="https://www.debian.org/CD/verify">Verify your Debian ISO is legitimate</a>. If it's compromised now it might not boot, or you might be inadvertently installing malware!</li><li>Install VirtualBox and the VirtualBox Extension Pack if you haven't already.</li><li>Create a new VM in VirtualBox. Set the type to Linux / Debian, give it a good amount of RAM (30-40% of your total RAM is good for most users), and create a virtual hard disk.</li><li>Open the VM's settings and attach the Debian ISO you've downloaded. You can also adjust the video memory (typically setting this to 128MB or higher is best).</li><li>Start your new Debian VM and complete the Debian installer that should automatically start.</li><li>Install <a href="https://www.virtualbox.org/manual/ch04.html">VirtualBox Guest Additions</a> in Debian.</li><li>Attach any devices (like webcams) you might need to use to the VM, and reboot the VM.</li></ol><p>Now you can install pretty much any software you'd like in your new Linux VM, and it will be completely isolated from your main machine. Remember if any of this is confusing, I've created a more <a href="https://assets.privacytools.io/aragon-drop/zoom_tutorial.pdf">complete walkthrough</a> you can download that explains these steps in detail. Once you're in, you can use the web browser built into Debian to download Zoom, and you're good to go!</p>]]></content:encoded></item><item><title><![CDATA[US Government Wages War on Encryption]]></title><description><![CDATA[As the world finds itself preoccupied with COVID-19, the United States government is trying to pass a law to ban encryption. It's called the EARN IT act, and it has potentially devastating repercussions for encryption and companies that use it.]]></description><link>https://blog.privacytools.io/us-government-wages-war-on-encryption/</link><guid isPermaLink="false">5e7635bc3a7daf0182255b1f</guid><category><![CDATA[Opinion]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Security]]></category><category><![CDATA[Encryption]]></category><category><![CDATA[Government]]></category><category><![CDATA[Coronavirus]]></category><category><![CDATA[United States]]></category><dc:creator><![CDATA[Freddy ]]></dc:creator><pubDate>Sun, 29 Mar 2020 12:00:00 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2020/03/lindsey-graham-encryption-1.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2020/03/lindsey-graham-encryption-1.png" alt="US Government Wages War on Encryption"><p>As the world finds itself preoccupied with COVID-19, the United States government is trying to pass a law to ban encryption.</p><p>It's called the <a href="https://www.schneier.com/blog/archives/2020/03/the_earn-it_act.html">EARN IT act</a>, and while it claims to combat the sexual exploitation of children online, it has potentially devastating repercussions for encryption and companies that use it.</p><blockquote>EARN IT focuses specifically on Section 230, which has historically given tech companies freedom to expand with minimal liability for how people use their platforms. Under EARN IT, those companies wouldn't automatically have a liability exemption for activity and content related to child sexual exploitation. Instead, companies would have to "earn" the protection by showing that they are following recommendations for combatting child sexual exploitation laid out by a 16-person commission.</blockquote><p><em>(Source: WIRED "<a href="https://www.wired.com/story/earn-it-act-sneak-attack-on-encryption/">The EARN IT Act Is a Sneak Attack on Encryption</a>")</em></p><p>The <a href="https://www.privacytools.io/providers/#usa">US government</a> has never been a fan of cryptography even though they make extensive use of it themselves. The "<a href="https://en.wikipedia.org/wiki/Crypto_Wars">Crypto Wars</a>" provide more than enough evidence to suggest that this might not be the only reason they wish to ban the use of encryption by the public. A suspicion only further realized when you understand the breadth of the National Security Agency's <a href="https://en.wikipedia.org/wiki/Edward_Snowden#Global_surveillance_disclosures">spying capabilities</a> as demonstrated by Edward Snowden.</p><p>The logic behind the EARN IT act does not seem to add up.  If we ban things because unsavory people use them then why does the US allow guns, for example? The problem is that strong lobbies who have the power to influence both politicians and the voting public exist to ensure that things like guns are never banned. Meanwhile, privacy advocates have such a small voice in comparison.</p><p>It is also important to note that encryption is available to everyone, yet only a few use it for the wrong reasons. I am not responsible for the actions of anyone except myself. Group punishment is rarely the best option. PGP and similar encryption software were created to improve the privacy of communications and online file storage. The idea of secrecy or privacy is bound to attract some of the wrong people, and yet encryption is also a force for great good. It is used by governments to keep their secrets safe and privacy-seekers to take control of their information. It is used by activists, victims, and thousands of others who rely on it for their personal safety. And it is used by millions of regular people who use encryption — perhaps not even realizing it — on a daily basis to keep their identity, finances, medical information, and more out of the hands of criminals and ne'er-do-wells.</p><p>People with the wrong intent will always find ways to get around anti-encryption laws, and there are many forms of communication that would be impossible to police. <a href="https://www.obsessivefacts.com/memespeech">Memespeech</a> for example, is a supposedly censor-proof method of encryption which hides messages inside normal passages of free speech by adjusting the letter formatting. While Memespeech was built as a counter to the EARN IT act, it demonstrates that any encryption technology — including itself — could be easily built and utilized by the wrong people. Banning encryption unfortunately won't prevent pedophiles from communicating, it will only harm law-abiding citizens.</p><p>If you live in the United States, the best thing you can do right now is to call your representatives and tell them not to pass the bill. The EFF has built a <a href="https://act.eff.org/action/protect-our-speech-and-security-online-reject-the-graham-blumenthal-bill">helpful tool</a> if you are struggling with this.</p><p>In this time of struggle, we must continue to pay a close eye on all aspects of our governments and their actions. The US government is already taking advantage of the situation, as they are currently also in talks with phone companies to <a href="https://www.nbcnews.com/tech/tech-news/u-s-wants-smartphone-location-data-fight-coronavirus-privacy-advocates-n1162821">use phone location data to help track the spread of the virus</a>. Even if this power could be used responsibly to help prevent the spread of disease, historically we have seen that when power is handed to governments in the midst of a crisis, it is incredibly difficult to take it away in the aftermath.</p><p>And if you find these ideas alarming, it is also important to realize <strong>your</strong> privacy is being abused on a daily basis. If you aren't already aware of this and actively doing something against it, this is a great time to get started and find out more. There are lots of great <a href="https://www.privacytools.io/">websites</a>, <a href="https://www.reddit.com/r/privacytoolsIO/">communities</a>, and <a href="https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q">video channels</a> to help you learn.</p><p><em>Cover photo by <a href="https://www.flickr.com/photos/gageskidmore/17830267732/">Gage Skidmore</a></em></p>]]></content:encoded></item><item><title><![CDATA[Choosing the Right Messenger]]></title><description><![CDATA[<p>One of the most common questions users have when it comes to privacy is about messaging services. It seems almost all of them mention some level of privacy or encryption to entice the user to sign up for their service, but how can you be sure you’re using the</p>]]></description><link>https://blog.privacytools.io/choosing-the-right-messenger/</link><guid isPermaLink="false">5dddab74da9ce25a59257455</guid><category><![CDATA[Instant Messengers]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Security]]></category><category><![CDATA[Opinion]]></category><dc:creator><![CDATA[Dan Arel]]></dc:creator><pubDate>Thu, 28 Nov 2019 01:51:46 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/11/message-4.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/11/message-4.png" alt="Choosing the Right Messenger"><p>One of the most common questions users have when it comes to privacy is about messaging services. It seems almost all of them mention some level of privacy or encryption to entice the user to sign up for their service, but how can you be sure you’re using the most secure, privacy respecting platform?</p><p>The answer actually lies in one’s <a href="https://ssd.eff.org/en/glossary/threat-model">threat model</a>, which is often an ignored step in choosing all privacy related apps and services, meaning a lot of users limit their internet and communication experience because they believe they need Edward Snowden level privacy settings.</p><p>The truth is, each user needs to decide what their privacy goals are. Is your goal to stop corporations from tracking you, targeting you, and profiting from your data? Or, are you are trying to hide communications from the government or law enforcement, which is common for journalists and activists who want to protect their sources or communications from government eyes?</p><p>Once you understand your goals you can start to look at messengers and their upsides and downsides, and it’s important to remember, there is no perfect solution. Each service, no matter how secure can be compromised, because at the end of the day, you’re dealing with other humans who can screenshot, copy, or forward your messages to parties you did not intend to see them. So, it’s also important to know who you are messaging, verifying their keys, and ensuring that you place the utmost trust in them with the content you are sending.</p><p>If your goal is to simply avoid corporate tracking and the harvesting of your data from your communications, you can eliminate apps such as Facebook Messenger and WhatsApp, both services owned by Facebook and while offering encrypted messaging (optional in Messenger), Facebook <a href="https://www.digitaltrends.com/social-media/facebook-reads-messenger-messages/">reads your non-encrypted messages</a>, and WhatsApp <a href="https://www.forbes.com/sites/zakdoffman/2019/05/14/whatsapps-cybersecurity-breach-phones-hit-with-israeli-spyware-over-voice-calls/#734cec155549">has fallen victim to security breaches</a>.</p><p>For this type of user, your options are much more wide as you may be more willing to share your email address or phone number at signup and can be less concerned with metadata (we will get to that shortly), and you want to look for a messenger that simply isn’t scanning your content or behavior to sell it.</p><p>If your goal is to evade more massive state-sponsored surveillance programs, the aforementioned apps are out of the question, but so are many others.</p><p>This is because when it comes to these apps, and other like it, you don’t own the <a href="https://ssd.eff.org/en/glossary/encryption-key">encryption keys</a>, the service does, so they are able to decrypt your messages, for their own use, or for the use of government officials who request it. This is something important you’ll want to remember as you choose the messenger that is right for you.</p><p>Even Apple’s iMessage, which is encrypted, while more secure than Facebook’s offerings, still control the keys and can access your messages if necessary. Apple does also collect data based on your behavior, so while using iMessage isn’t the same as handing your data over to Facebook, you’re still messaging with a variety of privacy vulnerabilities. On Android, you’re using SMS messages which are even less secure and can <a href="https://www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin">be easily hijacked</a> by someone with just enough know-how.</p><h2 id="metadata">Metadata</h2><p>One important aspect of messaging apps you need to be sure of is what kind of <a href="https://ssd.eff.org/en/glossary/metadata">metadata</a> it exposes, what is encrypted and what isn’t.</p><p>Wire, a popular encrypted messenger app has always been criticized for its decision not to encrypt user metadata, such as the date and time of registration, IP geographical coordinates, and the date and time of creation, creator, name, and list of participants in a conversation.</p><p>Metadata can be used to place you in a certain location, speaking to a certain person and can be used against you by law enforcement, even if they have no idea and no access to what the conversation was about.</p><p>Apps such as Signal, or Wickr encrypt metadata, making the conversations between two or more parties more secure and harder to track individual users with.</p><p>When it comes to avoiding corporate data mining, your metadata won’t be as useful, especially if you’re using a service that is not profiting from your data to begin with. For those avoiding state-sponsored surveillance, <a href="https://theintercept.com/2019/08/04/whistleblowers-surveillance-fbi-trump/">metadata can be a killer</a>.</p><h2 id="encryption">Encryption</h2><p>This article will not get into the complexities of the best kinds of <a href="https://ssd.eff.org/en/glossary/end-end-encryption">end-to-end encryption</a> (E2EE), but ensuring your messenger has it, that must be discussed.</p><p>The popular messaging app Telegram has come under fire the most for this. Telegram says on their homepage that, “Telegram messages are heavily encrypted and can self-destruct.” Yet, this statement is only partially true. Yes, you can set your messages to self-destruct, a great privacy feature for some, and yes, they do offer encryption, but what they don’t tell users is that encryption isn’t turned on by default.</p><p>In an interview with <a href="https://gizmodo.com/why-you-should-stop-using-telegram-right-now-1782557415">Gizmodo</a>, Christopher Soghoian, Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union said that, "There are many Telegram users who think they are communicating in an [end-to-end] encrypted way, when they’re not because they don’t realize that they have to turn on an additional setting,” he continued to say that while he’s happy they offer the encryption, it’s not useful if it’s turned off.</p><p>Apps such as Signal, Keybase, and Wickr offer E2EE by default. Less popular but quickly growing apps such as Element, offer E2EE but like Telegram, have not made it a default setting, though the Matrix.org team has said that <a href="https://github.com/vector-im/element-web/issues/6779">default encryption is on their road map</a>.</p><p>Ensuring your conversations and metadata are E2EE is one of the best practices you can have when choosing a messenger.</p><h2 id="sign-up-process">Sign Up Process</h2><p>When it comes to your goals and threat model, you will need to decide how much, if any, information you’re willing to give this company on signup. Do they require a phone number and or SIM card? Do they require an email address, or do they allow completely anonymous signups, and how anonymous is anonymous? Are they storing that info (remember the metadata) unencrypted?</p><p>Giving up your phone number or email won’t be a big deal for many, as any good privacy policy will state they won’t use it for any purpose other than those you’ve granted permission for. Yet, for those avoiding state-sponsored surveillance, you may have a regularly changing number, no number, or would rather not risk giving that information up. Same goes for email.</p><p>So, you will want to find a service that fits this need. While Signal is currently testing signup without a phone number, currently you’re unable to do so. Element, Wickr, many <a href="https://ssd.eff.org/en/glossary/xmpp">XMPP</a> services, don’t require anything but choosing a username.</p><h2 id="source-code">Source Code</h2><p>Open source may be the most used phrase in all of privacy and security, and for good reason. It’s really helpful to be able to review the source code of the product you’re trusting. Experts can look for backdoors, leaks, and other bugs. Organizations that opt to open source their code are showing good faith effort to increase trust between them and the user.</p><p>Yet, open source can also limit your options, again, depending on your threat model and goals. Signal, Wire, and Keybase all offer open source repositories of their applications, and sometimes even the server software itself.</p><p>Open source also doesn’t mean secure. This is often misunderstood, and people hear open source and assume it must be good. Look at the apps code you want to use, you don’t need to be able to check it, but are others? An open source app that no one follows, or contributes to is no more or less secure than a closed source app.</p><p>Wickr, Threema, and others are closed source. They don’t offer the ability to check the source, but that doesn’t immediately rule them out either. When the Electronic Frontier Foundation (EFF) had a comparison chart for messenger apps, it gave Wickr 5-stars. This doesn’t mean it’s perfect for someone like Snowden, but for those avoiding Facebook and Google, it could be a usable option.</p><p>It’s also important to remember there’s no way to check that someone is always using the source code in their repository in the app or server you’re downloading from the Apple Store or Google Play. When it comes to this, reputation becomes a key player in your decision, as does trust, which we will get to next.</p><p>If you’re unsure what to do here, it’s always a safe bet to stick with open source that has a large contributor base and strong reputation. It’s always best to use open source options when they are available and only recommend closed source when there isn’t a usable open source option. This is generally a good way to pick a messenger app as well.</p><h2 id="ownership-trust">Ownership &amp; Trust</h2><p>An often overlooked, but increasingly important part of choosing a secure messenger is, who owns the company that’s providing your service? What would the gain or lose from selling your data and who does the company answer to?</p><p>Wire <a href="https://blog.privacytools.io/delisting-wire/">recently lost a great deal of trust and standing</a> in the privacy world because they quietly sold their company and moved it to the US. They also changed parts of their privacy policy making it harder for users to tell when Wire would share customer data. They did all of this while never updating their current users of such changes, either to the change of the privacy policy, or the move to the US.</p><p>Wire also took in more than $8 million in venture capital funding. So now, users wanted to know more about who owned their data and what jurisdictional rights were changing with the move from Europe to the United States?</p><p>These are questions we must ask of all services. Wire now has investors to answer to who will want a return on their millions of dollars.</p><p>Signal on the other hand <a href="https://signal.org/blog/signal-foundation/">is a non-profit</a> which does not rely on investors and instead relies on donations, sponsorships, and grants. Because of their non-profit status in the US, they must also be highly transparent about not only where the money comes from, but how they spend it. So, users can see where this money goes, and who it’s going to.</p><p>Matrix.org (the service Element uses) runs a similar business model as Signal, located in the UK instead of the US, they reply on donations, partnerships, and grants. Matrix.org is heavily supported by New Vector, a venture capital backed company, however, Matrix.org as a non-profit is transparent about its spending, income, and influences. </p><p>Not all services are non-profit, and that should not rule them out immediately. You can also follow their funding goals. Wire lost credibility because instead of simply relying on user signups, they wanted to be the next Skype for Business and wanted to build a larger enough user base to get the attention of investors. Meanwhile apps such as Wickr, while for-profit, is transparent about taking limited investors to become sustainable on subscriptions.</p><p>This can take some time, because it’s important to know who the investors are, and what the organizational goals are. Will they eventually need to resort to data harvesting to sustain itself, if they do, and you decide to leave the platform, will you leave behind data you don’t want them to get their hands on?</p><h2 id="making-your-choice">Making your choice</h2><p>Now it’s time to choose a messenger and no one can do that for you. Popularity will need to play a role here, there’s no point in joining the new up and coming messenger service if you don’t have a single contact using it as well. One reason Telegram has been so popular is they have managed to convince more than 100 million people to sign up. If you sign in today, you’ll likely see a group of your friends in there. Signal isn’t as far behind, and others are catching up.</p><p>You’ll need to decide who you trust, and who your other contacts trust, and then compare all of that with your goals and your threat model. How much information are you willing to give on signup, does metadata matter to your threat model, and is the service you’re choosing likely to sell itself to the highest bidder once enough people sign up?</p><p>The important thing to remember is there is no one size fits all for messengers, and that each user must decide what is best for them. If someone is an avid WhatsApp or Facebook Messenger user, even Telegram is a step in the right direction. Yet, if that user is concerned with more than just giving data over to Facebook, they may need to look at more secure options.</p><p>Ensure you keep your messenger apps up to date. You don’t want to discover you’ve been compromised because a bug found in version 1 was fixed in version 2 but you didn’t bother upgrading your apps.</p><p>One last piece of advice is that users need to be diligent and never become complacent in their decision. You must be willing to change services if the goals and values of your messenger of choice change in a way that no longer match yours. Look for news of sales, mergers, or acquisitions that could compromise the organization.</p><p><em>Dan Arel is a journalist, author, and privacy advocate. He's also the editor of <a href="https://thinkprivacy.io/">ThinkPrivacy.io</a>. This article was originally published to <a href="https://hackernoon.com/choosing-the-right-messenger-mm3x2z47">Hacker Noon</a> on November 27th, 2019.</em></p>]]></content:encoded></item><item><title><![CDATA[The Trouble with VPN and Privacy Review Sites]]></title><description><![CDATA[<p>There's a massive problem in the privacy world. Websites, social media accounts, and other platforms are constantly popping up out of nowhere, telling you to buy <em>The Greatest Service Ever</em> in order to solve all your privacy woes, whatever that may be. These websites often employ marketing teams to make</p>]]></description><link>https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/</link><guid isPermaLink="false">5dced3c337ad263e10131ccb</guid><category><![CDATA[Privacy]]></category><category><![CDATA[VPN]]></category><category><![CDATA[Trust]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Wed, 20 Nov 2019 21:25:22 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/11/choosingavpn.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/11/choosingavpn.png" alt="The Trouble with VPN and Privacy Review Sites"><p>There's a massive problem in the privacy world. Websites, social media accounts, and other platforms are constantly popping up out of nowhere, telling you to buy <em>The Greatest Service Ever</em> in order to solve all your privacy woes, whatever that may be. These websites often employ marketing teams to make sure their "reviews" are what you see first when you begin your research. Some of them are even operated by VPN providers themselves, operating under anonymous business entities to hide their bias, or doing it right out in the open, hoping you'll mistake their advertising-filled press releases and blogs as insider knowledge of the VPN space.</p><p>When a seemingly "unbiased review" on a site is merely a paid advertisement in disguise, that website is breaking their reader's trust. From a consumer's point of view, affiliate marketing and other paid promotional techniques like this make it near impossible to know when a review is genuine or not. </p><p>This isn't going to be a lengthy blog post on advertising being bad, far from it. In fact, many of the <a href="https://www.privacytools.io/providers/vpn/">VPN providers we recommend</a> engage in responsible advertising across various platforms. The key is transparency: Their advertisements should <em>look like advertisements</em>, and nothing else.</p><h2 id="the-bad">The Bad</h2><p>I'm really looking to take the time here and identify "the bad" sites and resources that use these techniques to profit off a community just looking for reliable answers. Lots of sites like these will claim they're acting in your best interest, but they're just here to make money.</p><p>One common thing I'll see on these sites is a ranked list of providers that are ostensibly the best ones to choose from. These sites have supposedly done all the work for you, so you can just click and go, assured you're making the right choices.</p><p>So here's my issue with ranking VPN providers: Let's face it, VPN providers are all offering the same service, and they will either protect your information or they won't. Ranking providers like this only serves as an easy way to guide users to a certain choice (in this case, the choice that will make the reviewers the most money). </p><p>Let's look at one of these "review" sites for example, which will go unnamed for the purposes of this article. On their homepage they prominently list 10 providers as the "best" VPN services, in this order:</p><ol><li>NordVPN</li><li>Surfshark</li><li>ExpressVPN</li><li>PerfectPrivacy</li><li>IPVanish</li><li>Mullvad</li><li>CyberGhost</li><li>Trust.Zone</li><li>ibVPN</li><li>Private Internet Access</li></ol><p>To their credit, this review site also helpfully included an advertising disclosure in their footer. On this fairly well hidden away page, they note that they participate in affiliate programs from 8 providers, as follows:</p><ul><li>NordVPN</li><li>SurfShark</li><li>ExpressVPN</li><li>Perfect-Privacy</li><li>IPVanish</li><li>CyberGhost</li><li>Trust.Zone</li><li>Private Internet Access</li></ul><p><em>Hmm</em>. Look familiar? Of the 73 providers this site had reviewed at the time of writing this article, <strong>all eight</strong> of the VPN providers paying this review site happened to make their top 10 recommendations. In fact, you'd have to scroll down to #6 before you found a provider that wouldn't pay them, practically buried. </p><p>Furthermore, their list includes NordVPN, a company <a href="https://www.reddit.com/r/privacytoolsIO/comments/dl2m7b/nordvpn_confirms_one_of_their_finland_data_center/">notable for not disclosing security breaches</a> in a timely fashion, and ExpressVPN, a provider <a href="https://www.goldenfrog.com/blog/some-providers-use-weak-1024-bit-keys-vyprvpn-explains-why-its-strong-keys-matter">notable for once using weak 1024-bit encryption keys</a> to protect their users. By any objective standard, these providers do not deserve to be included in a top 10 recommendations list for securing anybody's information. This review site in particular claims to have set criteria for their recommendations, but this just demonstrates that any criteria can be adjusted to fit any goal you may have.</p><p>If these sites truly wanted to be helpful, they would consolidate all the relevant information and present it to their users without making the choice for them. A provider is going to be better or worse for every user depending on their particular situation, and encouraging making an informed choice between options presented equally is far more beneficial to putting one over the other in a largely arbitrary fashion.</p><p>But that isn't to say they should just throw all the providers in a big table and call it a day. Almost worse than the ranking scheme above is when sites provide out of context lists of providers, often just with pricing and a link. Sometimes they will link you to a full review (more on that in a bit), but for the most part these sites just expect you to follow their recommendations blindly.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/vpn-table-example-1.png" class="kg-image" alt="The Trouble with VPN and Privacy Review Sites"><figcaption>Affiliate links and discounts galore! This is a different site than before, but look at the familiar faces we're seeing...</figcaption></figure><p>These read like advertisements, because they usually are. Once again we see the usual suspects — NordVPN, ExpressVPN... — paraded as the gold standard in the VPN space, not out of any inherent value, but based on the value of their affiliate programs. To further this point, let's take a look at how much each of the five providers above will pay you for a referral (on a one month plan).</p><ol><li>ExpressVPN: $13 for first month</li><li>NordVPN: $11.95 for first month</li><li>VPNArea: $4.95 for first month</li><li>VPN.ac: $2.90 for first month</li></ol><p><em>Unfortunately, Perfect Privacy would not share their commission rates publicly, but if anyone has any information on that I'd be happy to receive it. What I will say is that based on the information above, I would not be surprised if it fell right between ExpressVPN and NordVPN's rates. Their one month plan costs $12.99, so assuming a 100% match on the first month (the standard from NordVPN and ExpressVPN) that would add up quite nicely.</em></p><p>Once again, we see a lineup of providers ordered in a way that appears to <em>conveniently</em> pay the most to the website owner. And therein lies the issue with affiliate programs. Once you begin receiving financial compensation <em>on a per-signup basis</em>, you are now motivated to push the most users to the sites that pay more on a monthly basis, rather than the sites that will actually help the user.</p><p>Occasionally, these recommendations are coupled with a "review" that is supposedly independent and unbiased, but in reality are simply more marketing tools to persuade you towards their opinions. In most cases, these reviewers will simply copy the VPN provider's own press releases and even media, presenting their advertising as fact to their readers. These reviews are always hidden away as well, with main navigation links directing users towards the more affiliate-link-laden lists and tables that they'd much rather you browse. The true value of these review articles is the <a href="https://www.pcmag.com/news/367640/how-a-vpn-review-site-dominated-google-search-with-a-scam">Search Engine Optimization (SEO) advantage they bring</a> in the rankings on Google, and not much more. More traffic = More clicks, at the expense of good, independent content and integrity.</p><h2 id="the-good">The Good</h2><p>This isn't to say all tables or lists are bad, it's how they're presented rather that makes or breaks a site. <a href="https://thatoneprivacysite.net/">ThatOnePrivacySite.net</a> for example sets what is perhaps the gold standard of VPN comparisons:</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/image-11.png" class="kg-image" alt="The Trouble with VPN and Privacy Review Sites"><figcaption>VPN providers listed as equals with their benefits and flaws covered? <em>What?</em></figcaption></figure><p>Here's the difference. They include virtually every provider — the good and the bad — and present them at equal value to sort through. Instead of providing their readers with answers, they provide them with information that can be used to deduce their own recommendations, based on their values as an individual. </p><p>But some users just want <em>the answers,</em> and that's fine too. I think there is still definitely a way to provide recommendations without introducing financials or bias into the equation. At <a href="https://www.privacytools.io">PrivacyTools</a>, we've developed a set list of criteria, and we make that abundantly clear when you read our list of <a href="https://www.privacytools.io/providers/vpn/">recommended VPN providers</a>.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/image-12.png" class="kg-image" alt="The Trouble with VPN and Privacy Review Sites"><figcaption>Our currently recommended VPN provider Mullvad meets and exceeds our transparent expectations, and does not pay reviewers to tip the scales in their favor.</figcaption></figure><p>We also refrain from using affiliate links. As we've discussed, they are fundamentally flawed ways to market a service, and using them would break the trust our community has in our recommendations. </p><p>We do have a newly-introduced <a href="https://www.privacytools.io/sponsors/">sponsorship program</a>, but all of our finances are handled in an incredibly transparent fashion. As a non-profit organization, the funding we receive cannot be used for private profit, and our community can see both where we receive money from and how it is being spent thanks to <a href="https://opencollective.com/privacytoolsio/">Open Collective</a>. Additionally, the recommendations on <a href="https://www.privacytools.io">www.privacytools.io</a> are handled by an entirely separate team of editors and contributors than the administrative team such as myself that handles the sponsorships and finances. The editors have sole control over our recommendations and operate entirely independently and on a volunteer-basis to ensure the choices we make are for the benefit of the privacy community over one individual.</p><p>Ultimately, as a matter of policy our sponsors have no say over our recommendations, or whether they are recommended or a competitor is removed. We have given our community vast access to our website and internal workings to keep us in check and ensure we're staying true to our word. This separation of management and editors is a strategy that has served the media industry well for decades, and makes all of our team and organization a more credible and trustworthy source of information.</p><h2 id="in-summary">In Summary</h2><p>We have a lot of points we want to get across. The current landscape of privacy reviewers and "experts" weighing in on topics regarding the very companies that pay for their reviews is morally reprehensible, and just another way for big tech companies to collect all of our data more easily.</p><p>Review sites should make it abundantly clear when their reviews are paid for by the VPN companies in any fashion, whether that be via affiliate programs or good old-fashioned sponsorships. This can't be via a hidden-away disclosure in the footer or not published at all, but <em>clear </em>and<em> close in proximity</em> to the claims published on their site. <strong>Customers are not expecting or seeking out these disclosures</strong> when they visit review sites, and can't be expected to immediately discern whether you're speaking from a place of unbiased fact, or from a place with the greatest financial incentive. Better yet, they should reconsider their entire business model. We built PrivacyTools from the ground up in 2015 based solely on a community donation model that still keeps us sustained. It's the more difficult way to build a site to be sure, actually working to gain the trust of a huge community, but the difference in quality and integrity is remarkable.</p><p>VPN providers should consider spending less money on paid reviews, and more money on securing and validating their infrastructure. Regular security audits are one fantastic way for companies to demonstrate their dedication to keeping their users secure. We strongly believe VPN services should consider the <a href="https://www.privacytools.io/providers/vpn/#criteria">PrivacyTools VPN Criteria</a>, especially in regard to the ownership of their organization. Your VPN provider should not be hiding away in Panama controlled by anonymous leadership. While you <em>as a user</em> deserve privacy, transparency should be <em>required</em> of providers if you are expected to trust them. I would not give my money to some anonymous overseas investor, why would I give all of my internet traffic to some anonymous overseas administrator?</p><p>Finally, when you're choosing a VPN provider, do your own research. <a href="https://blog.privacytools.io/understanding-vpns/">Understand what a VPN actually does for you</a>. <a href="https://www.pcmag.com/article/371839/what-does-a-vpn-security-audit-really-prove">Understand what it is a security audit proves</a>, find out who owns and operates the VPN service you want to use, and make sure their policies and technologies reflect your values. Again, we'll recommend <a href="https://thatoneprivacysite.net/">ThatOnePrivacySite</a> and <a href="https://www.privacytools.io/providers/vpn/">PrivacyTools</a> as great resources to get you started, but <a href="https://blog.privacytools.io/choosing-a-vpn/">ultimately gathering the information yourself</a> and making an informed decision is the only way to make sure your privacy is being respected.</p><p><strong>Update 11/21:</strong> I've clarified this article to make it clear that I cannot objectively prove how much a "review site" is profiting off any particular provider, without having access to their private financial statements. The findings in this article were based on public information from affiliate programs and opinions were drawn accordingly.</p>]]></content:encoded></item><item><title><![CDATA[Cutting the Wire]]></title><description><![CDATA[<p>It has recently come to the attention of the PrivacyTools team that Wire, the popular end-to-end encryption messaging platform <a href="https://forum.privacytools.io/t/wire-swiss-gmbh-is-now-owned-by-a-usa-holding-company/1932">had been sold or moved to a US company</a>. After a week of questioning, Wire finally confirmed they had changed holding companies and would now be a US based company in</p>]]></description><link>https://blog.privacytools.io/delisting-wire/</link><guid isPermaLink="false">5dd31fb637ad263e10132024</guid><category><![CDATA[Delisting]]></category><category><![CDATA[Updates]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Instant Messengers]]></category><dc:creator><![CDATA[Dan Arel]]></dc:creator><pubDate>Tue, 19 Nov 2019 16:56:26 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/11/delist-wire.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/11/delist-wire.png" alt="Cutting the Wire"><p>It has recently come to the attention of the PrivacyTools team that Wire, the popular end-to-end encryption messaging platform <a href="https://forum.privacytools.io/t/wire-swiss-gmbh-is-now-owned-by-a-usa-holding-company/1932">had been sold or moved to a US company</a>. After a week of questioning, Wire finally confirmed they had changed holding companies and would now be a US based company in a move they called “simple and pragmatic,” as they worked to expand their foothold in the enterprise market. This also came alongside the news that Wire had accepted more than $8 million in Venture Capital (VC) funding from Morpheus Ventures, as well as other investors.</p><p>Morpheus Ventures holds a <a href="https://morpheus.com/portfolio/">portfolio</a> including companies in healthcare, voice AI, life insurance, and retail customer data analytics: All sectors that have historically used invasive data collection methods to survive. Why would a VC with a portfolio centered on consumer data want to invest in a company whose mission claims to protect that very same information?</p><p>Earlier this year, Wire announced they had entered a partnership with <a href="https://www.globenewswire.com/news-release/2019/07/10/1880912/0/en/Wire-and-FedResults-Partner-to-Offer-End-to-End-Encrypted-Collaboration-Platform-to-Government-Agencies.html">FedResults</a>, in a move that would bring Wire's secure messaging platform to US federal agencies. This raised a few eyebrows, but did not alarm the privacy community as Wire remained Swiss based and beholden to Switzerland's strict privacy laws. Today however, while much of Wire's business will continue to be run out of their Swiss offices, with new US-based ownership it is not entirely clear how much jurisdiction the United States will have over Wire data.</p><p>This is alarming because it is well known that <a href="https://www.vice.com/en_us/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text">Wire stores unencrypted metadata</a> for every user.</p><p>In an interview with <a href="https://techcrunch.com/2019/11/13/messaging-app-wire-confirms-8-2m-raise-responds-to-privacy-concerns-after-moving-holding-company-to-the-us/">TechCrunch</a>, Wire CEO Morten Brøgger said of privacy laws: “We are in Switzerland, which has the best privacy laws in the world” — it’s subject to Europe’s General Data Protection Regulation framework (GDPR) on top of its own local laws — “and Wire now belongs to a new group holding, but there no change in control.”</p><p>Even if he is correct, the move and statement do bring up further questions. With Wire now being a US company with contracts partnering it with US federal authorities, will those authorities now have leverage to compel Wire to give up metadata on users? Wire has investors to answer to and will not be able to risk losing large deals with clients like the US federal government. This is of course a hypothetical situation, but one to be considered nonetheless as we decide which services to recommend on PrivacyTools.</p><p>Wire also quietly made an adjustment to its own privacy policy. A <a href="https://web.archive.org/web/20180324221043/https://wire.com/en/legal/#privacy-7">previous version of the policy</a> (July 18, 2017) stated it would only share user data when required by law. Now (Updated September 1, 2018), it reads they will share user data when "necessary." What does necessary mean, and necessary to whom? Necessary to law enforcement, shareholders, or advertisers? The word "necessary" is an alarming change because "necessary" is purposefully vague terminology that could conceivably be used as a tool to justify any action. This change doesn't leave the user with much confidence as to when the company may share your data.</p><p>Yet another red flag, and one of the more important ones to us, was is that Wire decided not to disclose this policy change to its users, and when asked why, Brøgger was flippant in his response, stating: “Our evaluation was that this was not necessary. Was it right or wrong? I don’t know.”</p><p>We feel we do know, and the answer was that it was wrong. Privacy and security are not built solely on strong technology, but on trust. Yes, we can review Wire's open source code on GitHub, but we can't ever be sure that code is the same exact code that runs on their servers in practice. Yet, we have trusted them in the past because Wire had built a trustworthy reputation for themselves. We now feel that Wire has lost this reputation. By deciding to withhold information regarding its ownership and policies from its users, Wire has broken the trust our community has placed in it, and worse yet sounds almost dismissive of the worries voiced by the privacy community that had long held them in high regard.</p><p>Because of these ongoing concerns, and this break in trust in Wire's organization, PrivacyTools has made the decision to remove Wire from its recommendations. It is worth noting that does not necessarily mean Wire is unsafe, but we believe it is our duty to recommend products that we as a team feel comfortable standing behind. We need to believe in the security, privacy, and integrity of our recommendations, and we no longer feel we can do that with Wire at this time.</p>]]></content:encoded></item><item><title><![CDATA[Delisting Startpage.com]]></title><description><![CDATA[<p><strong>May 3rd, 2020 Update:</strong> Startpage has answered all of our questions for them and has clarified their policies. We have decided to relist them on PrivacyTools, and you can read <a href="https://blog.privacytools.io/relisting-startpage/">our latest announcement</a> for more details.</p><p>Dear PrivacyTools community,</p><p>On the 15th of October, it was brought to our attention</p>]]></description><link>https://blog.privacytools.io/delisting-startpage/</link><guid isPermaLink="false">5dcb069137ad263e10131c40</guid><category><![CDATA[Updates]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Search Engines]]></category><category><![CDATA[Startpage]]></category><category><![CDATA[Delisting]]></category><dc:creator><![CDATA[Niek de Wilde]]></dc:creator><pubDate>Tue, 12 Nov 2019 22:20:33 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/11/delist-startpage.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/11/delist-startpage.png" alt="Delisting Startpage.com"><p><strong>May 3rd, 2020 Update:</strong> Startpage has answered all of our questions for them and has clarified their policies. We have decided to relist them on PrivacyTools, and you can read <a href="https://blog.privacytools.io/relisting-startpage/">our latest announcement</a> for more details.</p><p>Dear PrivacyTools community,</p><p>On the 15th of October, it was brought to our attention that <a href="https://www.reddit.com/r/privacy/comments/di5rn3/startpage_is_now_owned_by_an_advertising_company/">Startpage.com was reportedly (partially?) taken over</a> by a company called the Privacy One Group, which is in turn owned by a company called System1. We found this quite remarkable as the two companies seem to have conflicting business models. Startpage has been known for basing their advertisements on what their users enter in their search bar. System1 on the other hand, is a pay-per-click advertising company that "<a href="https://www.bizjournals.com/losangeles/news/2017/09/20/system1-raises-270-million-for-consumer-intent.html">has developed a pre-targeting platform that identifies and unlocks  consumer intent across channels including social, native, email, search,  market research and lead generation rather than relying solely on what  consumers enter into search boxes.</a>"</p><p>We reached out to System1 CEO <a href="https://finance.yahoo.com/news/system1-appoints-ian-weingarten-ceo-185700741.html">Ian Weingarten</a> for an explanation. We received a very general response that did not address key questions.</p><p>Seemingly prompted by our ongoing concerns, Startpage released a public letter addressed to us from their CEO, and hosted <a href="https://www.reddit.com/r/StartpageSearch/comments/djshn3/hello_reddit_startpage_mod_team/">a Q&amp;A</a> on their Subreddit to try and explain the situation. While some of our questions were answered, we noted that the company seemed to be evasive, essentially restating information from <a href="https://www.startpage.com/blog/company-updates/startpage-and-privacy-one-group/">a previously published blog post</a> or posting the same response to different questions. People had to really dig to get answers and puzzle all information together, instead of getting a clearly explained and comprehensive answer from the start. Requests for clarification to some important questions went ignored.</p><p>Because of the conflicting business model and the unusual way the company reacted, claiming to be fully transparent but being evasive at the same time, we have no choice but to de-list Startpage from our recommendations until it is fully transparent about its new ownership and data processing. Remaining questions include:</p><ul><li>The % of Startpage and Surfboard Holding B.V. (the Startpage holding company) System1 acquired in December 2018.</li><li>The current % ownership by System1 at the time of the audit (and any other major owners).</li><li>Information about Privacy One Group Ltd. Where is it registered and in what city, state and country does it operate? (We have not been able to verify registration information.)	</li><li>A diagram of data flows, including flows to outside organizations, like System1, Privacy One etc.</li></ul><p>This de-listing does not necessarily mean Startpage is violating its privacy policy. We have no evidence of that. But because there are still so many unanswered questions, we can no longer recommend the service with good confidence. If Startpage aims to be re-considered, they will have to answer the questions above, preferably along with an explanation of why it took them so long to get proper answers out to the public.</p><p>Sincerely,<br>Blacklight447<br>Editor-in-Chief, PrivacyTools</p>]]></content:encoded></item><item><title><![CDATA[Firefox Privacy: Tips and Tricks for Better Browsing]]></title><description><![CDATA[Firefox is one of the most popular browsers around, and for good reason. We've written this Firefox privacy guide to help keep your browsing data safe.]]></description><link>https://blog.privacytools.io/firefox-privacy-an-introduction-to-safe/</link><guid isPermaLink="false">5dc65f3537ad263e10131992</guid><category><![CDATA[Guides]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Firefox]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Sat, 09 Nov 2019 19:18:02 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/11/firefox-privacy-no-logo.png" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/11/firefox-privacy-no-logo.png" alt="Firefox Privacy: Tips and Tricks for Better Browsing"><p>Mozilla Firefox is one of the most popular web browsers around, and for good reason. It's fast, secure, open-source, and it's backed by an organization that actually respects your privacy. Unlike many other Chrome alternatives and forks, it has a massive development team behind it that publishes new updates on a constant, regular basis. Regular updates doesn't only mean shiny new features, it means you'll also receive security updates that will keep you protected as you browse the web.</p><p>Because of all of this, <a href="https://www.privacytools.io/browsers/#browser">we recommend Firefox</a> as our general-purpose browser for most users. It's the best alternative to Chrome and Edge for privacy conscious individuals.</p><p>Firefox is fantastic out of the box, but where it really shines is customizability. By adjusting Firefox privacy settings and using helpful add-ons, you can increase your privacy and security even further. Making those changes is what we're going to go over in this Firefox privacy guide.</p><p>Before we get started, there's a couple things that should be noted that are not only applicable to this guide, but privacy in general:</p><h2 id="considerations">Considerations</h2><p>Protecting your privacy online is a tricky proposition, there are so many factors to take into consideration on an individual basis for any one guide or site to cover comprehensively. You will need to take into account things like threat modeling and your general preferences before making any changes or following any recommendations.</p><h3 id="threat-modeling">Threat Modeling</h3><p><em>What is threat modeling?</em> Consider who you're trying to keep your data hidden from. Do you need to keep your information hidden from the government, or just the average stranger? Maybe you are just looking to alternatives to Big Tech like Google and Facebook. You'll also want to consider how much time and resources you want to spend hiding your data from those "threats". Some solutions might not be feasible from a financial or time standpoint and you'll have to make compromises. Taking all those questions into account creates a basic <em>threat model</em> for you to work with.</p><p>We want to publish a more complete guide on threat modeling in the future, so stay tuned to this blog for further updates. But for now, just keep those thoughts in the back of your mind as we go through this article. Not every solution might be for you, or conversely you may need to pay more attention to certain areas we aren't able to cover completely.</p><h3 id="browser-fingerprinting">Browser Fingerprinting</h3><p>Another consideration is your <a href="https://www.privacytools.io/browsers/#fingerprint">browser's fingerprint</a>. When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using more common tracking tools, like cookies.</p><p>That's right, add-ons contribute to your fingerprint. Another thing a lot of people miss when they are setting up their browser is that <strong>more</strong> is not always the best solution to their problems. You don't <em>need</em> to use every add-on and tweak we recommend installed, and the more you configure the greater chance there is that your browser will appear more unique to websites. Think about <em>your</em> specific situation and pick and choose the add-ons and tweaks we recommend only if you think they will help <em>you</em>.</p><h2 id="firefox-privacy-settings">Firefox Privacy Settings</h2><p>We'll start off with the easy solutions. Firefox has a number of privacy settings built in, no add-ons necessary! Open your <em>Options</em> page (<em>Preferences</em> on macOS) and we'll go through them one at a time.</p><h3 id="dns-over-https">DNS over HTTPS</h3><p>DNS (or the Domain Name System) is what your browser uses to turn domain names like <code>privacytools.io</code> into IP addresses like <code>145.239.169.56</code>. Because computers can only make connections to IP addresses, it's necessary to use DNS every time you visit a new domain. But DNS is unencrypted by default, that means everyone on your network (including your ISP) can view what domains you're looking up, and in some situations even change the IP answers to redirect you to their own websites! Encrypting your DNS traffic can shield your queries and add some additional protection to your browsing.</p><p>Encrypted DNS takes many forms: DNS over HTTPS (DoH), DNS over TLS, DNSCrypt, etc., but they all accomplish the same thing. They keep your DNS queries private from your ISP, and they make sure they aren't tampered with in transit between your DNS provider. Fortunately, Firefox recently added native DoH support to the browser. On the <strong>General</strong> page of your preferences, scroll down to and open <strong>Network Settings</strong>. At the bottom of the window you will be able to select "Enable DNS over HTTPS" and choose a provider:</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/image.png" class="kg-image" alt="Firefox Privacy: Tips and Tricks for Better Browsing"><figcaption>Options/Preferences &gt; General &gt; Network Settings &gt; Enable DNS over HTTPS</figcaption></figure><p>Keep in mind that by using DoH you're sending all your queries to a single provider, probably Cloudflare unless you choose <a href="https://www.privacytools.io/providers/dns/">another provider</a> that supports DNS over HTTPS. While it may add some privacy protection from your ISP, you're only shifting that trust to the DoH provider. Make sure that's something you want to do.</p><p>It should also be noted that even with DoH, your ISP will still be able to see what domain you're connecting to because of a technology called Server Name Indication (SNI). Until SNI is encrypted as well, there's no getting around it. Encrypted SNI (eSNI) is in the works — and can actually be <a href="https://blog.cloudflare.com/encrypt-that-sni-firefox-edition/">enabled on Firefox</a> today — but it only works with a small number of servers, mainly ones operated by Cloudflare, so its use is limited currently. Therefore, while DoH provides some additional privacy and integrity protections, its use as a privacy tool is limited until other supplemental tools like eSNI and <a href="https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-05-en">DNSSEC</a> are finalized and implemented.</p><h3 id="change-your-search-engine">Change Your Search Engine</h3><p>This is an easy one. In the <strong>Search</strong> tab, change your <strong>Default Search Engine</strong> to something other than Google.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/image-1.png" class="kg-image" alt="Firefox Privacy: Tips and Tricks for Better Browsing"><figcaption>Options/Preferences &gt; Search &gt; Default Search Engine</figcaption></figure><p>Out of the built-in options, DuckDuckGo is the most privacy respecting service, but there's a number of <a href="https://www.privacytools.io/providers/search-engines/">search engines we would recommend</a> that can be easily installed as well.</p><h3 id="enhanced-tracking-protection">Enhanced Tracking Protection</h3><p>Now we'll delve into the biggest set of options for people like us, Firefox's <strong>Privacy &amp; Security</strong> tab. First up is their <strong>Enhanced Tracking Protection</strong>. This set of filters is set to Standard by default, but we'll want to change it to Strict for more comprehensive coverage.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/image-2.png" class="kg-image" alt="Firefox Privacy: Tips and Tricks for Better Browsing"><figcaption>Firefox privacy settings allow you to enable "Strict" browsing protection, keeping you safe from many trackers, cookies, and cryptominers.</figcaption></figure><p>In rare occasions, Strict browsing protections might cause some of the websites you visit to not function properly. But there's no need to worry! If you suspect the Strict browsing protection is breaking a website you visit frequently, you can disable it on a site by site basis with the shield icon in the address bar.</p><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/11/image-3.png" class="kg-image" alt="Firefox Privacy: Tips and Tricks for Better Browsing"></figure><p>Disabling Enhanced Tracking Protection will of course decrease your privacy on that site, so you will have consider whether that's something you are willing to compromise on, on a site-by-site basis.</p><p>Another benefit of Firefox's Enhanced Tracking Protection is that it can actually speed up your browsing! Advertising networks and social media embeds can sometimes make your browser download huge files just to show an ad or a like button, and blocking those out trims the fat, in a sense.</p><h3 id="disabling-telemetrics">Disabling Telemetrics</h3><p>When you use Firefox, Mozilla collects information about what you do, what kind of extensions you have installed, and various other aspects of your browser. While they claim to do this in a privacy-respecting way, sending as little data as possible is always preferred from a privacy standpoint, so we would go ahead and uncheck all the boxes under <strong>Firefox Data Collection and Use</strong> just to be safe.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/image-4.png" class="kg-image" alt="Firefox Privacy: Tips and Tricks for Better Browsing"><figcaption>Options/Preferences &gt; Privacy &amp; Security &gt; Firefox Data Collection and Use</figcaption></figure><h3 id="clearing-cookies-and-site-data">Clearing Cookies and Site Data</h3><p>This one is for more advanced users, so if you don't understand what this is doing you can skip this section. Firefox provides the option to delete all your cookies and site data every time Firefox is closed. Cookies and site data are little pieces of information sites store in your browser, and they have a myriad of uses. They are used for things like keeping you logged in and saving your website preferences, but they also can be used to track you across different websites. By deleting your cookies regularly, your browser will appear clean to websites, making you harder to track.</p><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/11/image-5.png" class="kg-image" alt="Firefox Privacy: Tips and Tricks for Better Browsing"></figure><p>This will likely log you out of websites quite often, so make sure that's an inconvenience you're willing to put up with for enhanced privacy.</p><h2 id="firefox-privacy-add-ons">Firefox Privacy Add-ons</h2><p>Of course, just the browser settings alone won't go quite far enough to protect your privacy. Mozilla has made a lot of compromises in order to provide a more functional browsing experience for the average user, which is completely understandable. But, we can take it even further with some browser add-ons that prevent tracking and make your experience more private and secure.</p><p>We recommend a number of <a href="https://www.privacytools.io/browsers/#addons">fantastic add-ons</a> for Firefox, nine at the time of writing, but they aren't all <em>necessary</em> for <em>everyone</em>. Some of them provide redundant functionality to each other, and some of them accomplish similar tasks to the settings we've enabled above.</p><p>When you are installing add-ons for Firefox, consider whether you actually need them for your personal browsing. Remember that fingerprinting warning from earlier? Adding as many extensions as possible might make you stand out <em>more</em>, which is not the goal.</p><p>Keeping all that in mind, there are three add-ons I would consider necessary for virtually every user:</p><ul><li>uBlock Origin</li><li>HTTPS Everywhere</li><li>Decentraleyes</li></ul><p>Out of the box, these add-ons only complement the settings we've described in this article already, and they have sane defaults that won't break the sites you visit.</p><h3 id="ublock-origin">uBlock Origin</h3><p><strong><a href="https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/">uBlock Origin</a></strong> is an efficient ad- and tracker-blocker that is easy on memory, and yet can load and enforce thousands more filters than competing blockers. We trust it because it is completely open-source. Additionally, unlike its competitors it has no monetization strategy: There's no "Acceptable" ads program or a similar whitelist like many other adblockers feature.</p><h3 id="https-everywhere">HTTPS Everywhere</h3><p>HTTPS is the secure, encrypted version of HTTP. When you see an address starting with <code>https://</code> along with the padlock in your browser's address bar, you know that your connection to the website is completely secure. This is of course important when you're logging into websites and sending your passwords and emails in a form. But it also prevents people on your network and your ISP from snooping in on what you're reading, or changing the contents of an unencrypted webpage to whatever they want.</p><p>Therefore, <strong><a href="https://addons.mozilla.org/en-US/firefox/addon/https-everywhere">HTTPS Everywhere</a></strong> is a must-have extension, all it does is upgrade your HTTP connections to HTTPS wherever possible. And because it works silently in the background, you probably will never notice it! We trust HTTPS Everywhere because it is completely open-source, and is developed by the <a href="https://www.eff.org/https-everywhere">Electronic Frontier Foundation</a>, a non-profit dedicated to private and secure technologies.</p><p>Of course, it only works with sites that support HTTPS on the server's side, so you'll still need to keep an eye on your address bar to make sure you're securely connected. But fortunately more and more websites have implemented HTTPS thanks to the advent of free certificates from organizations like Let's Encrypt.</p><h3 id="decentraleyes">Decentraleyes</h3><p>When you connect to many websites, your browser is most likely making connections to a myriad of "Content Delivery Networks" like Google Fonts, Akamai, and Cloudflare, to download fonts and Javascript that make the website run. This generally makes websites look and feel better, but it means you're constantly making connections to these servers, allowing them to build a fairly accurate tracking profile of you.</p><p><strong><a href="https://addons.mozilla.org/en-US/firefox/addon/decentraleyes">Decentraleyes</a></strong> works by impersonating those CDNs locally in your browser. When a website wants to download a program like jQuery, instead of connecting to a remote CDN Decentraleyes will serve the file from its own cache of files. This means that you'll won't have to make remote CDN connections for the files that Decentraleyes supports, and therefore the remote CDNs can't track your browser. Because everything is stored locally instead of on a far away server, Decentraleyes has the added benefit of speeding up your browsing as well. Everything happens instantly, and you won't see a difference in the websites you visit.</p><h3 id="additional-firefox-privacy-add-ons">Additional Firefox Privacy Add-ons</h3><p>There is of course more functionality that can be achieved at the expense of more time spent configuring your browser and reduced website functionality. If you're looking for the most privacy options possible however, they may be for you. Check out <a href="https://www.privacytools.io/browsers/#addons">our page on Browser add-ons at privacytools.io</a> for further information and additional resources.</p><h2 id="more-privacy-functionality">More Privacy Functionality</h2><p>Firefox has developed a number of other privacy tools that can be used to enhance your privacy or security. They may be worth looking into, but they have some drawbacks that would prevent me from recommending them outright.</p><h3 id="firefox-private-network">Firefox Private Network</h3><p><strong>Firefox Private Network</strong> is a new extension developed by Mozilla that serves as a <a href="https://blog.privacytools.io/understanding-vpns/">Virtual Private Network</a> (VPN), securing you on public WiFi networks and other situations where you might trust Mozilla more than the ISP or network administrator. It is free in beta, but will likely be available at some subscription pricing once the test pilot ends.</p><p>Firefox Private Network is still just a VPN, and there are a number of drawbacks you would want to consider before using it. We wrote an entire article on <a href="https://blog.privacytools.io/choosing-a-vpn/">choosing a VPN provider</a> that is worth a read, but it boils down to the fact that your VPN provider will be able to see your web traffic. All you are accomplishing is shifting the trust from your network to the VPN provider, in this case <em>Cloudflare</em>, the operators behind this service.</p><p>Additionally, unlike a traditional VPN, only data through the Firefox browser is protected, not every app on your machine. This means that it won't adequately protect you from many of the threats people typically want to protect against when they use a VPN, like IP leaks.</p><p>And finally, Cloudflare and Mozilla are both US companies. There are a number of concerns with entrusting internet traffic to the US and other <a href="https://www.privacytools.io/providers/#ukusa">fourteen eyes</a> countries that should not be overlooked.</p><p>If you require a Virtual Private Network, we would look elsewhere. There are a number of <a href="https://www.privacytools.io/providers/vpn/">recommended providers</a> like Mullvad that will provide a better experience at a low cost.</p><h3 id="multi-account-containers">Multi-Account Containers</h3><p>Mozilla has an in-house add-on called <strong><a href="https://support.mozilla.org/en-US/kb/containers">Multi-Account Containers</a></strong> that allows you to isolate websites from each other. For example, you could have Facebook in a container separate from your other browsing. In this situation, Facebook would only be able to set cookies with your profile on sites within the container, keeping your other browsing protected.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.privacytools.io/content/images/2019/11/image-8.png" class="kg-image" alt="Firefox Privacy: Tips and Tricks for Better Browsing"><figcaption>Firefox Containers Selection</figcaption></figure><p>A containers setup may be a good alternative to techniques like regularly deleting cookies, but requires a lot of manual intervention to setup and maintain. If you want complete control of what websites can do in your browser, it's definitely worth looking into, but we wouldn't call it a necessary addition by any means.</p><h2 id="additional-resources">Additional Resources</h2><p><a href="https://www.privacytools.io/browsers/">Web Browsers at PrivacyTools</a> — Our comprehensive set of recommendations for browsers and tweaks you can make to enhance your privacy is a great next step for more advanced users looking to protect their privacy online.</p><p><a href="https://github.com/arkenfox/user.js">arkenfox user.js</a> — For more advanced users, the arkenfox user.js  is a "configuration file that can control hundreds of Firefox settings [...] which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage".</p><p><a href="https://www.mozilla.org/en-US/privacy/">Mozilla's Privacy Policy</a> — Of course, we always recommend reading through the privacy statement of any organization you deal with, and Mozilla is no exception.</p><h2 id="firefox-privacy-summary">Firefox Privacy Summary</h2><p>In conclusion, we believe that Firefox is the most promising browser for privacy-conscious individuals. The non-profit behind it seems truly dedicated to promoting user control and privacy, and the good defaults coupled with the sheer customizability of the browser allow you to truly protect your information when you browse the web.</p><p>For more Firefox privacy-related information, or for recommendations for non-desktop platforms, give our full page on <a href="https://www.privacytools.io/browsers/">web browsers</a> a read.</p>]]></content:encoded></item><item><title><![CDATA[Choosing a VPN]]></title><description><![CDATA[Once you start looking for VPNs, you'll find there are so many to choose from! We'll show you how to sort through the mess and find a good provider for you.]]></description><link>https://blog.privacytools.io/choosing-a-vpn/</link><guid isPermaLink="false">5db3bdbb37ad263e101316f7</guid><category><![CDATA[VPN]]></category><category><![CDATA[Guides]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Wed, 30 Oct 2019 20:08:48 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/10/choosing-a-vpn-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/10/choosing-a-vpn-2.jpg" alt="Choosing a VPN"><p>So <a href="https://blog.privacytools.io/understanding-vpns/">you know what a VPN is</a>, but there are so many options to choose from! Well before we dive into this, let's get one thing off the bat:</p><h2 id="avoid-free-vpns">Avoid Free VPNs</h2><p>Privacy-respecting VPNs can provide their service because you pay them for it. Free VPNs are <strong>worse</strong> than your ISP when it comes to respecting your privacy, because <strong>selling your data is the only way they can make money</strong>, whereas an ISP is primarily paid for by you.</p><blockquote>If you’re not paying for it, you’re the product.</blockquote><p>This isn't to say all paid VPNs automatically become trustworthy, far from it. In fact many paid VPN providers have been known to or suspected to have sold their users' data or have done some otherwise shady things with it. Always completely evaluate the VPN provider you choose, rather than just take theirs or anyone else's word for it. The main takeaway here is that it is impossible to provide a service like a VPN — which requires servers, bandwidth, time, and energy to maintain — for free for thousands of users, without having some sort of other monetization model.</p><h2 id="choosing-a-vpn">Choosing a VPN</h2><p>Alright, now we can get into it. The first thing we need to decide is <em>why</em> exactly you need a VPN. Most people will fall into the following two camps:</p><h3 id="1-avoiding-geographical-restrictions">1. Avoiding Geographical Restrictions</h3><p>Maybe you want to watch BBC online, possibly avoid creeps at cafés, but don’t really care about your VPN logging your traffic — just like your ISP does.</p><p><strong>Therefore</strong>: You want a VPN with servers in countries like US, UK — basically where services like Netflix work. (Tip: Netflix is continually banning VPNs, so be sure to use one that isn’t blocked. You might want to look into the <a href="https://www.reddit.com/r/NetflixViaVPN">r/NetflixViaVPN</a> Subreddit for help with this one).</p><h3 id="2-maximizing-your-privacy-online">2. Maximizing Your Privacy Online</h3><p>Being <strong>privacy</strong>tools.io, this is the big one for us. If you really care about your privacy, you'll want to look for a provider that at the very least does the following:</p><ul><li>Supports modern technologies like OpenVPN or WireGuard.</li><li>Accepts anonymous payments like cash, gift cards, or cryptocurrencies.</li><li>Provides strong, future-proof encryption for their connections.</li><li>And, is public about their leadership and ownership.</li></ul><p>These 4 points should always be considered when you're evaluating a VPN provider. Additionally, note what jurisdiction the provider is incorporated in, and where their servers are located. This is probably the most important factor to consider, and also the most time-consuming, as privacy laws in various countries vary wildly.</p><p>Let me explain what these points mean exactly in more detail, so you know what to look for.</p><h2 id="modern-technology">Modern Technology</h2><p>You should be able to connect to your VPN with any <strong>OpenVPN</strong> client. L2TP, PPTP, and IPSec are all insecure technologies that should not be used. A new technology called <strong>WireGuard</strong> looks very promising, but is still in active development and not recommended for use.</p><p>While we're looking at technology, take a look at whether your provider has their own client for you to download and connect with. These applications usually make using your VPN a lot simpler, and sometimes safer. If they do, ask the following questions:</p><ul><li><strong>Is this client open-source?</strong> Having an open-source client is important because it allows you or anyone else to audit the code and see exactly what's happening. Closed source clients are essentially a black box you'd be putting all your data into, not the best idea!</li><li><strong>Does the client have a killswitch?</strong> Not many generic OpenVPN clients come with this functionality, but many custom VPN clients will. A killswitch option allows you to completely disable your internet connection when the VPN is disconnected. This will make sure that you don't accidentally connect to the internet with your ISP's connection.</li></ul><h2 id="anonymous-payments">Anonymous Payments</h2><p>This one's an easy one. Take a look at how you're able to pay for your provider's subscription. Some providers will take cash in the mail as payment, a great way to pay without leaving a digital money trail. Others will allow you to pay with gift cards from major retailers like Amazon, Target, and Wal-Mart (which you can hopefully obtain anonymously with cash, replacing the mail middleman from before). Still others will accept various cryptocurrencies.</p><p>If not leaving a money trail is important, you'll want to make sure you aren't paying with something linked to you financially, like a credit or debit card, or PayPal. If your provider doesn't accept the payment forms above, you aren't entirely out of luck however. You can still use a prepaid debit card to pay for things as anonymously as possible. But consider: If your provider isn't dedicated to making easy, anonymous payment alternatives available to you, how focused are they on your privacy?</p><h2 id="strong-security">Strong Security</h2><p>Most providers using OpenVPN will also be using strong encryption methods, but still make sure you double-check before choosing a provider. What you'll want to look for from your provider at a minimum is:</p><ul><li><strong>RSA-2048 encryption.</strong> Ideally, they should support RSA-4096 connections, for maximum security.</li><li><strong>Perfect Forward Secrecy (PFS).</strong> This technology makes each VPN session use a different key every time, so that if an attacker manages to decrypt one of your connections, they won't also be able to see all your other data.</li></ul><p>In addition, look into whether your provider has ever had their security practices audited by an independent third-party. For example, TunnelBear <a href="https://cure53.de/summary-report_tunnelbear_2018.pdf">publishes</a> yearly audits of their entire service, or — the privacytools.io recommended VPN — Mullvad, which has <a href="https://cure53.de/pentest-report_mullvad_v2.pdf">published</a> a comprehensive security audit of their client applications.</p><p>Independent audits are important because, while ultimately the actual security of the service will come down to <em>trusting</em> the providers, a successful security audit demonstrates that the provider at least has the <em>capability</em> to provide you with a secure connection, instead of just taking their claims at face value.</p><h2 id="public-trust">Public Trust</h2><p>You want to remain private, but your provider shouldn't. If your provider is hiding their ownership information and their leadership from you behind some Panamanian shell company, what other business practices might they be hiding?</p><blockquote>You wouldn't trust your finances to someone with a fake identity, so why trust them with your internet data?</blockquote><p>Find out where your choice is incorporated. Who owns it? What other companies have their executives worked for?</p><p>Frequent transparency reports are a huge plus too. They should publish information related to government requests, so you know what their responses look like. All VPN providers will need to respond to legitimate legal requests, but does your choice reject or counter as many as possible?</p><h2 id="so-what-next">So what next?</h2><p>If you're currently using a commercial VPN, use this information to evaluate their business. Do they seem trustworthy?</p><p>At privacytools.io we've <a href="https://www.privacytools.io/providers/vpn/">evaluated</a> a huge number of VPN providers along similar criteria to these. In our opinion, as of October 2019, Mullvad leads the pack with respect to all these criteria, with IVPN and ProtonVPN falling just slightly behind but catching up quickly. There are still a <a href="https://thatoneprivacysite.net/vpn-comparison-chart/">huge number</a> of providers out there however. The way to find the best solution for you, is by researching providers with <em>your</em> criteria in mind.</p><p>Join the discussion on our forum below, and chat with our community about any questions you have or any interesting things you discover.</p><hr><p><em>Please note that we are not affiliated with or receive financial compensation from any commercial VPN providers. A lot of VPN providers engage in questionable affiliate marketing strategies which generates a lot of misinformation on VPNs in general online. At privacytools.io we are trying to make guides and recommendations based on objective research and criteria. Join our <a href="https://forum.privacytools.io/">forum</a> to get involved!</em></p>]]></content:encoded></item><item><title><![CDATA[Understanding VPNs]]></title><description><![CDATA[A VPN—or Virtual Private Network—is a tool that secures your internet connection. Learn more about how they work and what they protect can you against!]]></description><link>https://blog.privacytools.io/understanding-vpns/</link><guid isPermaLink="false">5db26f9e37ad263e10131593</guid><category><![CDATA[VPN]]></category><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Sat, 26 Oct 2019 00:11:00 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/10/understanding-vpns.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/10/understanding-vpns.jpg" alt="Understanding VPNs"><p>A <strong>VPN</strong>—or <strong>Virtual Private Network</strong>—is a tool that secures your internet connection from attackers on your network. Before I explain how that all works, let's talk about the internet without them.</p><p>Your Internet Service Provider (ISP) can see everything you do online. Well, nearly everything: When websites use HTTPS (or TLS, or SSL. these terms are often used interchangeably when referring to website encryption), indicated by the padlock in your web browser, your ISP cannot see exactly what you're doing on the website. So, they usually can't see what specific pages you look at or what you type in to forms. However, they can still see what websites you're visiting (domains and IP addresses).</p><p>That sounds bad, right? But that’s not even the worst part! (I know, right?) Not only can your ISP see what you’re doing online, they can (and do) insert ads into websites, sell your browsing history (which is now legal in the US), restrict access to some websites, and do other awful stuff, because <strong>they have complete control over your Internet connection</strong>.</p><p>Furthermore, this doesn't only happen at your home. Every network you connect to—your cellular network, your Wi-Fi at work, the internet at Starbucks—has their own ISP that will be able to read your data.</p><p>Fortunately, more and more websites are beginning to use HTTPS, thanks to free certificates from Let's Encrypt and Cloudflare. But many sites still don't (at least by default), and even HTTPS doesn't solve the problem that your ISP can see the websites you're visiting.</p><h2 id="how-vpns-can-protect-us">How VPNs can protect us</h2><p>Luckily, you can hide all this information from your ISP using a VPN. Instead of letting your ISP see all the websites you visit, VPNs only let them see that you are connected (using an <strong>encrypted</strong> connection) to the VPN provider's servers.</p><blockquote>Basically, instead of connecting directly to the Internet, you connect to one of your VPN providers’ servers, which connects you to the Internet.</blockquote><p>So, <code>you &lt;----&gt; Internet</code> becomes <code>you &lt;----&gt; VPN &lt;----&gt; Internet</code> and your ISP can only see the <code>you &lt;----&gt; VPN</code> part.</p><h2 id="more-ways-vpns-can-protect-us">More ways VPNs can protect us</h2><p>So VPNs are pretty handy, but hiding your traffic from your ISP isn't the only advantage a VPN provides.</p><p>Did you know that if you’re on a public Wi-Fi network, <strong>anyone connected to the same network can see as much as your ISP can? </strong>Obviously, this isn’t an issue at home, unless you have very creepy neighbors and an open Wi-Fi network. However, it is a problem in public places with Wi-Fi, such as cafés.</p><p>Because your connection to the VPN is <strong>encrypted</strong> and <em>it’s the only active connection</em> on your device, that creepy guy with the laptop sitting in the corner is no longer a threat to your Internet connection. Like the ISP, the only thing he'd be able to see is that single connection to your VPN.</p><p>So, is that all? Not yet. There’s still one big advantage. Websites  that you’re connected to can see this (usually) near-unique identifier called an <strong>IP address</strong>. But when you use a VPN the websites don’t see your IP address, they see one of the VPN server's IP addresses.</p><p>This also provides an added side-benefit: Most VPN providers have servers in many countries, thus you can make it appear to websites as if you’re browsing from a completely different country (which apart from privacy is useful due to some content and services being available only to specific regions, like Netflix and Hulu).</p><p>But even if you use a different IP address than your “normal” one,  isn’t it still personally identifiable? Nope. Many people use the same  server, letting the websites you visit see only that you’re using the  same VPN as many other people.</p><h2 id="drawbacks-of-a-vpn">Drawbacks of a VPN</h2><p>But VPNs aren't all powerful tools to protect your privacy. In fact, there are a number of glaring issues that should not be overlooked when making the decision to use one.</p><p>Most importantly, using a VPN only <em>shifts</em> the power to view your traffic from your ISP to the VPN provider itself. That means that all the traffic your ISP used to be able to see, your VPN provider will still be able to. Therefore, choosing a trustworthy VPN is important. Many will be able to find a provider that they can trust more than their ISP, but some may not.</p><p>Using a commercial VPN provider is almost like entrusting your data to a black box. There are no ways to verify claims like "no logging", you just need to take them at their word. Some providers will work harder than others to validate their claims for you—by releasing audits of their policies and code for example—, but at the end of the day it ultimately comes down to trust.</p><p>Finally, using a VPN will not make you anonymous in any way. Your VPN provider or especially dedicated attackers will be able to trace a connection back to you fairly trivially. Your VPN provider will also likely have a money trail leading back to you.</p><h2 id="so-what">So what?</h2><p>If you're looking for perfect anonymity, there are better options. Software like the Tor Browser provides privacy and anonymity <em>by design</em>, whereas VPNs provide privacy based on trust alone. You cannot rely on "no logging" claims to protect you.</p><p>If you just need protection on a public Wi-Fi network, from your ISP, or just from copyright warnings in the mail, a VPN might be the solution for you. </p><p>The VPN Providers page on <a href="https://www.privacytools.io/providers/vpn/">privacytools.io</a> lists recommendations and reasonings for privacy-respecting and trustworthy VPN providers.</p><p>Wondering what exactly makes a VPN choice good or bad? We've <a href="https://blog.privacytools.io/choosing-a-vpn/">published a guide</a> on some of the criteria we use to evaluate VPN providers. Looking into the details of any VPN provider you choose will help you make a more fully informed decision about who you trust your internet traffic to.</p><hr><p><em>Please note that we are not affiliated with or receive financial compensation from any commercial VPN providers. A lot of VPN providers engage in questionable affiliate marketing strategies which generates a lot of misinformation on VPNs in general online. At privacytools.io we are trying to make guides and recommendations based on objective research and criteria. Join our <a href="https://forum.privacytools.io/">forum</a> to get involved!</em></p>]]></content:encoded></item><item><title><![CDATA[Adding Custom DNS over HTTPS Resolvers to DNSCloak]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p><strong><a href="https://apps.apple.com/us/app/dnscloak-secure-dns-client/id1452162351">DNSCloak</a></strong> is an <a href="https://github.com/s-s/dnscloak">open-source</a> DNSCrypt and DNS over HTTPS (DoH) client for iOS, which gives users the ability to encrypt their DNS requests through the use of an on-device VPN profile.</p>
<p>While highly configurable, its user interface can be unintuitive to less tech-savvy users and doesn't easily allow users to</p>]]></description><link>https://blog.privacytools.io/adding-custom-dns-over-https-resolvers-to-dnscloak/</link><guid isPermaLink="false">5db1d3d237ad263e1013151f</guid><category><![CDATA[Privacy]]></category><category><![CDATA[Security]]></category><category><![CDATA[Guides]]></category><category><![CDATA[DNS]]></category><category><![CDATA[iOS]]></category><category><![CDATA[DNSCrypt]]></category><dc:creator><![CDATA[nitrohorse]]></dc:creator><pubDate>Tue, 03 Sep 2019 12:00:00 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/10/cover-3.jpg" medium="image"/><content:encoded><![CDATA[<!--kg-card-begin: markdown--><img src="https://blog.privacytools.io/content/images/2019/10/cover-3.jpg" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"><p><strong><a href="https://apps.apple.com/us/app/dnscloak-secure-dns-client/id1452162351">DNSCloak</a></strong> is an <a href="https://github.com/s-s/dnscloak">open-source</a> DNSCrypt and DNS over HTTPS (DoH) client for iOS, which gives users the ability to encrypt their DNS requests through the use of an on-device VPN profile.</p>
<p>While highly configurable, its user interface can be unintuitive to less tech-savvy users and doesn't easily allow users to add custom DoH resolvers, apart from the default <a href="https://github.com/DNSCrypt/dnscrypt-resolvers/blob/master/v2/public-resolvers.md">&quot;public-resolvers&quot; list</a> that the DNSCrypt project provides.</p>
<p>Before diving in, it's important to understand that while there is a lot of nuance to DNSCrypt and DoH, these two DNS protocols essentially achieve the same goals: They both provide users with the ability to encrypt all DNS traffic to the users' desired <a href="https://www.privacytools.io/providers/dns/#icanndns">upstream provider(s)</a>, while preventing <a href="https://en.wikipedia.org/wiki/DNS_hijacking">DNS hijacking</a>, <a href="https://en.wikipedia.org/wiki/DNS_spoofing">spoofing</a>, and eavesdropping by 3rd parties.</p>
<p>The development of these DNS protocols is exciting. However, unlike Android 9 which has <a href="https://support.google.com/android/answer/9089903">built-in support for DNS over TLS</a> (another protocol with similar goals), iOS unfortunately does not allow users to easily enable any form of encrypted DNS (<a href="https://dnsdisco.com/iOS-dns-proxy-post.html">but may in the future</a>). Thus, DNSCloak fills the gap for iOS users to start benefitting from these protocols today.</p>
<p>This guide will walk you through setting up DNSCloak to connect to any public resolver that supports DoH.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="addingacustomresolver">Adding a Custom Resolver</h3>
<p>DNSCloak provides a &quot;Config Editor&quot; which allows you to &quot;override or add any <a href="https://github.com/jedisct1/dnscrypt-proxy/wiki/Configuration">dnscrypt-proxy option</a>.&quot;</p>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image.png" class="kg-image" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"></figure><!--kg-card-begin: markdown--><p>You can learn more about the various configuration options from the <a href="https://github.com/jedisct1/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml">example configuration file</a> in dnscrypt-proxy's code repository. But, if you scroll all the way to the bottom you'll find a <code>[static.'myserver']</code> section along with a <code>stamp</code> property. This stamp is for adding your resolver's <a href="https://dnscrypt.info/stamps-specifications">DNS stamp</a>, an encoded string that contains all the required information needed to connect to an encrypted DNS resolver. You can think about stamps as QR code, but for DNS.</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="generatingastamp">Generating a Stamp</h3>
<p>Some providers will provide you with a DNS stamp pre-made for you. If your provider does this, great! You can skip ahead to the next section. At the time of writing this post, CZ.NIC is the only provider <a href="https://www.privacytools.io/providers/dns/#icanndns">listed on privacytools.io</a> that doesn't provide their users with a DNS stamp for their DoH resolver on their website, making adoption a bit more difficult. Thankfully however, we can create a DNS stamp ourselves.</p>
<p>To generate a DNS stamp, DNSCrypt hosts a <a href="https://dnscrypt.info/stamps/">DNS stamp calculator</a> (which you can also <a href="https://github.com/jedisct1/vue-dnsstamp">download, compile, and run offline</a>) that we can fill out with the information from our DNS provider. We'll be using CZ.NIC's information as an example to generate our stamp.</p>
<p>We will need to know three things about the DoH resolver you choose:</p>
<ol>
<li>IP address</li>
<li>Host name</li>
<li>Path</li>
</ol>
<p>Browse to <a href="https://www.nic.cz/odvr/">CZ.NIC's webpage</a>—there is an English language option at the top of the page—and scroll down to &quot;How to turn on DNS-over-HTTPS (DoH)&quot; and note the URL (in this case, <code>https://odvr.nic.cz/doh</code>).</p>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-1.png" class="kg-image" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"></figure><p>Next, find the IPv4 addresses of the DoH resolver in any of the Windows, macOS, or Linux setup sections, and copy one of them (in this case, <code>193.17.47.1</code> or <code>185.43.135.1</code>).</p><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-2.png" class="kg-image" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"></figure><p>Now we can paste what we’ve gathered into the stamp calculator:</p><ul><li>IP address: <code>193.17.47.1</code></li><li>Host name: <code>odvr.nic.cz</code></li><li>Path: <code>/doh</code></li></ul><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-3.png" class="kg-image" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"></figure><p>We’ll find that the DNS stamp is <code>sdns://AgMAAAAAAAAACzE5My4xNy40Ny4xAAtvZHZyLm5pYy5jegQvZG9o</code>.</p><h3 id="adding-resolvers-to-dnscloak">Adding Resolvers to DNSCloak</h3><p>Now that we have a DNS stamp generated, we can copy and paste our new configuration into the bottom of DNSCloak’s Config Editor, like so:</p><pre><code>[static.'CZ.NIC-193.17.47.1']
stamp = 'sdns://AgMAAAAAAAAACzE5My4xNy40Ny4xAAtvZHZyLm5pYy5jegQvZG9o'</code></pre><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-4.png" class="kg-image" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"></figure><p>Select the checkmark icon in the top right corner to save your configuration, and it should be good to go!</p><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-5.png" class="kg-image" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"></figure><p>Get connected, and we can finally validate DNSCloak is working as expected by visiting <a href="https://dnsleaktest.com/">DNSLeakTest.com</a>:</p><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-6.png" class="kg-image" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"></figure><h3 id="adding-cloudflare-s-resolver-for-firefox">Adding Cloudflare’s Resolver for Firefox</h3><p>Another public DoH resolver that we may want to use is Cloudflare’s public resolver for <em>Firefox</em><a href="https://forum.privacytools.io/t/logging-differences-between-cloudflares-default-dns-over-https-resolver-and-their-resolver-for-firefox/1451">which has a stricter logging policy than Cloudflare’s default resolver</a>.</p><p>We can <a href="https://dnscrypt.info/stamps/">generate a stamp</a> with this information:</p><ul><li>IP address: <code>1.1.1.1</code></li><li>Host name: <code>mozilla.cloudflare-dns.com</code></li><li>Path: <code>/dns-query</code></li></ul><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-7.png" class="kg-image" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"></figure><p>You can now paste the following stamp we generated into DNSCloak’s Config Editor and start using the resolver.</p><pre><code>[static.'Cloudflare Resolver for Firefox']
stamp = 'sdns://AgUAAAAAAAAABzEuMS4xLjEAGm1vemlsbGEuY2xvdWRmbGFyZS1kbnMuY29tCi9kbnMtcXVlcnk'
</code></pre><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-8.png" class="kg-image" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"></figure><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-9.png" class="kg-image" alt="Adding Custom DNS over HTTPS Resolvers to DNSCloak"></figure><h3 id="summary">Summary</h3><p>Keep in mind that encrypted DNS <em>won’t hide the host name</em> (for example, <code>blog.privacytools.io</code>) of the sites you visit from your ISP due to <a href="https://en.wikipedia.org/wiki/Server_Name_Indication#Security_implications">SNI</a>*.</p><p>If you’re looking for anonymity, you should use <a href="https://www.torproject.org/">Tor Project’s</a> <a href="https://onionbrowser.com/">Onion Browser</a> (but be aware of its <a href="https://github.com/OnionBrowser/OnionBrowser/wiki/Traffic-that-leaks-outside-of-Tor-due-to-iOS-limitations">limitations</a>). On the other hand, if you simply want to hide your browsing history from your ISP, you should look into <a href="https://blog.privacytools.io/posts/self-hosting-a-shadowsocks-vpn-with-outline/">self-hosting a VPN with Outline</a> or using <a href="https://apps.apple.com/us/app/wireguard/id1441195209?ls=1">WireGuard</a> (if supported) or <a href="https://passepartoutvpn.app/">Passepartout</a>with a <a href="https://www.privacytools.io/providers/vpn/">VPN provider</a> you are willing to trust with your browsing history instead.</p><p>But for additional security and increased privacy from 3rd parties, encrypted DNS is a great place to start.</p><p>* At the time of this post, <em>encrypted</em> SNI is <a href="https://blog.mozilla.org/security/2018/10/18/encrypted-sni-comes-to-firefox-nightly/">available for testing</a> only in Firefox Nightly, and will hopefully become integrated with other browsers and platforms in the near future.</p>]]></content:encoded></item><item><title><![CDATA[Self-hosting a Shadowsocks VPN with Outline]]></title><description><![CDATA[<p><strong>Outline</strong> is a suite of open-source software developed for journalists to safely access their network and the internet while traveling in countries where their activities may be monitored or censored. Despite this, the Outline platform is ideal for a wide range of users, especially less technical users, and users in</p>]]></description><link>https://blog.privacytools.io/self-hosting-a-shadowsocks-vpn-with-outline/</link><guid isPermaLink="false">5db1db5637ad263e1013154e</guid><category><![CDATA[Guides]]></category><category><![CDATA[VPN]]></category><category><![CDATA[Shadowsocks]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Thu, 22 Aug 2019 12:00:00 GMT</pubDate><media:content url="https://blog.privacytools.io/content/images/2019/10/cover-2.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.privacytools.io/content/images/2019/10/cover-2.jpg" alt="Self-hosting a Shadowsocks VPN with Outline"><p><strong>Outline</strong> is a suite of open-source software developed for journalists to safely access their network and the internet while traveling in countries where their activities may be monitored or censored. Despite this, the Outline platform is ideal for a wide range of users, especially less technical users, and users in censored countries like China who may have little to no knowledge about how VPNs or proxies work. Outline consists of two parts, the <strong>Outline Manager</strong> and <strong>Outline Clients</strong>. The Outline Manager is a tool you can use to easily setup remote Outline Servers on your own machines with very little technical skills. The Outline Clients in turn can connect to Outline Servers you configure, to keep your traffic secured.</p><p>Technically, Outline is not a true VPN. Rather it uses an open-source SOCKS5 proxy called Shadowsocks which is “<a href="https://shadowsocks.org/en/index.html">designed to protect your Internet traffic</a>”. The Outline client applications however make use of the VPN capabilities of your operating system to send all your traffic through your Outline Server, with no need to configure each application to use the proxy. Thus for most users and most use-cases, there’s no difference in functionality between using a normal VPN and an Outline server.</p><p>Shadowsocks has the benefit of being far more lightweight than OpenVPN, and it is much more optimized for mobile devices, as it does not require any keep-alive connections. It has existed since 2012 and it is widely used in China due to its censorship-resistant functionality: It is very difficult or impossible to detect and block Shadowsocks traffic automatically.</p><p>Please note that <strong>like any VPN</strong>, Outline/Shadowsocks cannot provide nearly the same degree of anonymity as projects like Tor. The primary use-case of Outline and VPNs in general is to keep your traffic hidden from malicious Internet Service Providers and nation-wide mass surveillance. It’s a great solution for protecting your data on public wifi networks, but if you want to stay hidden from attackers targeting <em>you</em>, there’s better tools for the job elsewhere.</p><p>Outline is developed by Jigsaw, which is a subsidiary of Alphabet Inc (Google). It is important to note that neither Jigsaw nor Google can see your internet traffic when using Outline, because you will be installing the actual Outline Server on your own machine, not Google’s. Outline is completely open source and was audited in <a href="https://s3.amazonaws.com/outline-vpn/static_downloads/ros-report.pdf">2017</a> by Radically Open Security and in <a href="https://s3.amazonaws.com/outline-vpn/static_downloads/cure53-report.pdf">2018</a> by Cure53, and both security firms supported Jigsaw’s security claims. For more information on the data Jigsaw is able to collect when using Outline, see their <a href="https://support.getoutline.org/s/article/Data-collection">article on data collection</a>.</p><h3 id="prerequisites">Prerequisites</h3><p>All you will need to complete this guide is a computer running Windows, macOS, or Linux. You will also need to know some basic commands: <a href="https://www.howtogeek.com/311287/how-to-connect-to-an-ssh-server-from-windows-macos-or-linux/">How to SSH</a> in to a server you purchase. We will also assume you know how to purchase and set up a Linux server with SSH access, more info in Step 2.</p><h3 id="step-1-download-install-outline-manager">Step 1 — Download &amp; Install Outline Manager</h3><p>Outline allows you to setup and configure your servers from an easy-to-use management console called Outline Manager, which can be downloaded from <a href="https://getoutline.org/en/home">getoutline.org</a>. It has binaries available for Windows, macOS, and Linux.</p><p>Simply download and install the Outline Manager application to your computer.</p><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-10.png" class="kg-image" alt="Self-hosting a Shadowsocks VPN with Outline"></figure><p>Note: getoutline.org is blocked in China and likely other countries, however you can download the releases directly from <a href="https://github.com/Jigsaw-Code/outline-server/releases">their GitHub page</a> as well.</p><h3 id="step-2-choose-a-server-provider">Step 2 — Choose a Server Provider</h3><p>Outline has the ability to create servers on three different providers automatically: DigitalOcean, Google Cloud, and Amazon Web Services. In some situations, Google Cloud or AWS may be preferable, because they are less likely to be blocked by hostile ISPs/governments and will therefore allow you to more likely circumvent internet censorship. However, keep in mind that the server provider you choose—like any VPN provider—will have the technical ability to read your internet traffic. This is much less likely to happen when using a cloud provider versus a commercial VPN, which is why we recommend self-hosting, but it is still possible. Choose a provider you trust.</p><p>Additionally, keep in mind that many US-based cloud providers block all network traffic to and from <a href="https://en.wikipedia.org/wiki/United_States_sanctions#Countries">countries sanctioned by the United States</a>, including AWS and Google Cloud. Users in or visiting those countries may wish to find a Europe-based <a href="https://www.privacytools.io/providers/hosting/">hosting provider</a> to run their Outline Server on.</p><p>Another factor to consider is your provider’s network and latency. Choosing a server closer to you (geographically speaking) will give you better latency, and choosing a server with good bandwidth (&gt;1 Gbps) will minimize the performance hit when using the VPN. Both factors are important to keeping a good browsing experience, but keep in mind using <em>any</em> VPN will always be slower than just your plain old internet connection.</p><p>Finally, if you want to go with DigitalOcean you can use my affiliate link to receive a $50 credit: <a href="https://m.do.co/c/fb6730f5bb99">https://m.do.co/c/fb6730f5bb99</a>. That’s 10 months of free VPN hosting, at $5/month/server. Don’t feel obligated to use this link, but you’ll receive free credit, and if you spend $25 with DigitalOcean after using it I will get credited, which will enable me to continue writing guides like this! DigitalOcean has a great performing network in my personal experience, and in the experience of the Outline team it works well in regard to circumventing censorship: Not many IP addresses of theirs are blocked.</p><p>For this guide we are not going to use an automatic provider in Outline Manager, rather we will manually configure a Linux server. We are using Debian 10. Other distros may work as well, but you may need to install Docker manually.</p><h3 id="step-3-configure-your-server">Step 3 — Configure Your Server</h3><p>First, we need to update our system and install <code>curl</code>. Connect to your server via SSH and enter the following commands:</p><pre><code>sudo apt update
sudo apt upgrade
sudo apt install curl
</code></pre><p>Next open Outline Manager on your local machine and you should be given 4 options to configure a server. Select the “Set Up” button under the “Advanced, Set up Outline anywhere” option.</p><figure class="kg-card kg-image-card"><img src="https://blog.privacytools.io/content/images/2019/10/image-11.png" class="kg-image" alt="Self-hosting a Shadowsocks VPN with Outline"></figure><p>Outline will give you a string to paste. More technical users can <a href="https://raw.githubusercontent.com/Jigsaw-Code/outline-server/master/src/server_manager/install_scripts/install_server.sh">view the script</a> that line runs in a browser to validate exactly what is being run and installed on your server, but we have examined the script and have seen no alarming commands.</p><p>Connect to your server over SSH and paste the code from above in the Outline Manager box into the Terminal. The process will take a minute or two and will ask you a couple questions. You can just press enter to accept the default configuration whenever it asks.</p><p>After it completes, it will give you a long line starting with <code>{"apiUrl"</code> (depending on your Terminal’s color support it will appear as green). Copy that line, and paste it in the second box back in Outline Manager. Then, click “Done”.</p><h3 id="step-4-connect-your-devices">Step 4 — Connect Your Devices</h3><p>Download the Outline app on the device you want to connect. Outline has applications for the following operating systems:</p><ul><li><a href="https://play.google.com/store/apps/details?id=org.outline.android.client">Android</a></li><li><a href="https://itunes.apple.com/us/app/outline-app/id1356177741">iOS</a></li><li><a href="https://raw.githubusercontent.com/Jigsaw-Code/outline-releases/master/client/stable/Outline-Client.exe">Windows</a></li><li><a href="https://itunes.apple.com/us/app/outline-app/id1356178125">macOS</a></li><li><a href="https://play.google.com/store/apps/details?id=org.outline.android.client">Chrome OS</a></li><li><a href="https://raw.githubusercontent.com/Jigsaw-Code/outline-releases/master/client/stable/Outline-Client.AppImage">Linux</a></li></ul><p>You should also be able to use any <a href="https://shadowsocks.org/en/download/clients.html">Shadowsocks client</a>, including alternative clients for each operating system and a client for OpenWRT routers. And like with the Manager, you can download Outline releases from <a href="https://github.com/Jigsaw-Code/outline-client/releases">their GitHub page</a> as well.</p><p>Back in Outline Manager, select your server in the sidebar. On the far right side of “My access key” there is an icon of a laptop and phone. Click that icon, and select “Connect This Device” in the popup window. It will give you a string to copy, starting with <code>ss://</code>. Simply paste that string into the configuration of any Shadowsocks client to add your server!</p><p>Once you add your server, that’s it! In the Outline clients it’s just a matter of pressing “Connect”, and all your traffic will be proxied through your server! You can use this connection to keep your traffic safe when you’re on public WiFi networks, or just to keep your browsing hidden from your ISP.</p><h3 id="conclusion">Conclusion</h3><p>That should be all you need to get your very own VPN up and running! <strong>Do not share your access key with anyone</strong>, this is the key starting with <code>ss://</code>. If you want to grant other users access to your server, click “Add a new key” in Outline Manager and give them a new, unique key. If you share a key, anyone with knowledge of that key will be able to see all the traffic of anyone else using the key. It should go without saying, but don’t send people keys over unencrypted channels: No Facebook Messenger, no emails. Stick with <a href="https://www.privacytools.io/software/real-time-communication/">Signal, Wire, or Briar</a> if you don’t have a secure app already.</p><p>With Outline, there is no need to worry about the security of your server. Everything is set to automatically update with no intervention required! Another thing to note: The port on your Outline server is randomly generated. This is so the port can’t be easily blocked by nation/ISP level censors, however, this VPN may not function on some networks that only allow access to port 80/443, or on servers that only allow traffic on certain ports. These are edge-cases, but something to keep in mind, and if they apply you may need to look for more technical options.</p>]]></content:encoded></item><item><title><![CDATA[Tor on privacytools.io]]></title><description><![CDATA[We're excited to announce the launch of Tor connectivity to the  PrivacyTools.io homepage, and we hope to get Tor working on the rest of  our services as soon as possible.]]></description><link>https://blog.privacytools.io/tor-on-privacytools-io/</link><guid isPermaLink="false">5db50f4937ad263e1013183b</guid><category><![CDATA[Updates]]></category><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><category><![CDATA[Tor]]></category><dc:creator><![CDATA[Jonah Aragon]]></dc:creator><pubDate>Wed, 01 May 2019 17:00:00 GMT</pubDate><content:encoded><![CDATA[<p>We're excited to announce the launch of Tor connectivity to the privacytools.io homepage, and we hope to get Tor working on the rest of our services as soon as possible.</p><p><strong>Update 5/6:</strong> Some people asked me for a more detailed post and guide on how to set this kind of thing up on their own servers, so <a href="https://write.privacytools.io/jonah/securing-services-with-tor-and-alt-svc" rel="nofollow">I went ahead and did that</a>. Hopefully if you're a service operator or you just like that kind of stuff it'll be helpful to you!</p><h2 id="the-homepage">The Homepage</h2><p>The homepage is now accessible via our new Tor hidden service: <code>privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion</code>! This setup in particular is a pretty standard Tor setup, so I won't go into too many details. We're using a v3 hidden service (as you can tell by the enormous domain) with the following options:</p><pre><code>HiddenServiceNonAnonymousMode 1
HiddenServiceSingleHopMode 1
</code></pre><p>Why are we using non-anonymous mode and single-hop mode, you ask? It's mainly to optimize latency: By enabling single-hop mode, we're able to cut two hops out of the connection. This is not in any way detrimental to the anonymity or security of our users, it merely reduces the anonymity of <em>our</em> own server. This is of course fine, because we operate our servers over clearnet domains anyways with public IP addresses.</p><p>The main thing we are now accomplishing is not anonymity for ourselves, but increased security for our users. Your connection to the privacytools.io homepage is now completely secured end-to-end, no relying on exit nodes that could meddle with your traffic. It'll also be a bit faster, since we're reducing the load on the Tor exit nodes.</p><h2 id="other-services">Other Services</h2><p>With the rest of our services, we're going to be taking a different approach to the traditional .onion domain. Remember <a href="https://blog.cloudflare.com/cloudflare-onion-service/" rel="nofollow">Cloudflare's Onion Service</a>? We're basically recreating their setup on our own servers to create secure Tor connections <em>without using .onion domains</em>, at least visibly. That means that if you go to <code>write.privacytools.io</code> in the Tor Browser, for example, you'll see <code>https://write.privacytools.io/</code> in your browser, but the connection will actually be over the Tor network without the use of any exit nodes!</p><h3 id="alt-svc">alt-svc</h3><p>How can we do this exactly? We're using an HTTP header called <a href="https://tools.ietf.org/html/rfc7838" rel="nofollow"><code>alt-svc</code></a>. Originally designed to facilitate HTTP/2 and SPDY connections, and now commonly used for QUIC, alt-svc allows us to tell your browser that the website you're visiting is also accessible via Tor. The Tor Browser in response, makes a connection to our servers using the information within that header rather than connecting the normal way with DNS lookups and exit nodes.</p><p>The drawback to this is you need to actually connect to our websites once, so your browser has a chance to download the header and recognize that it should be using an onion connection. Because we use HTTPS with HSTS preloading this shouldn't be a security issue, since your initial connection will be made over HTTPS. That does mean that the initial connection will still take place over an exit node. After it receives that header, the information is cached, and the browser will continue to make any future connections solely over the Tor network.</p><h3 id="when-will-this-happen">When will this happen?</h3><p>We've already enabled <code>alt-svc</code> support for this WriteFreely instance, for Searx (search.privacytools.io), for our Matomo analytics platform, and for the homepage. (Yes, that means that connections to our homepage will be made over Tor regardless of whether you use the new .onion domain or the standard clearnet domain).</p><p>In the future we'll enable <code>alt-svc</code> on all our services, after we finish initial testing on the ones we enabled today.</p><h3 id="is-it-working">Is it working?</h3><p>The issue with <code>alt-svc</code> at the time of writing is how new it is to the Tor network. The Tor Browser has supported connections to hidden services in this manner since Tor Browser 8.0, but doesn't make it obvious whether or not the connection actually works. So at this time, the circuit UI doesn't show the current route correctly. This is currently an open issue in the Tor bug tracker, <a href="https://trac.torproject.org/projects/tor/ticket/27590" rel="nofollow">#27590</a>, that I hope will be resolved in the coming weeks.</p><p>Tor for Android also supports <code>alt-svc</code>, but I have not been able to test whether or not it displays the circuit graph correctly. I assume it also does not, until #27590 is resolved.</p><p>We will most likely not roll out Tor using <code>alt-svc</code> among the rest of our services until it's better implemented in the Tor Browser.</p><h3 id="discuss">Discuss</h3><p>You are welcome to <a href="https://forum.privacytools.io/t/the-privacytools-io-homepage-is-now-tor-accessible/172" rel="nofollow">discuss our new Tor integration on our forum</a>!</p><hr><p><em>This article was originally published to <a href="https://write.privacytools.io/jonah/tor-on-privacytools-io">https://write.privacytools.io</a> on May 1st, 2019.</em></p>]]></content:encoded></item></channel></rss>