www.privacyguides.org Open in urlscan Pro
2400:52e0:1e00::1079:1  Public Scan

Submitted URL: http://www.privacyguides.org/
Effective URL: https://www.privacyguides.org/en/
Submission: On July 08 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

Name: search

<form class="md-search__form" name="search">
  <input type="text" class="md-search__input" name="query" aria-label="Search" placeholder="Search" autocapitalize="off" autocorrect="off" autocomplete="off" spellcheck="false" data-md-component="search-query" required="">
  <label class="md-search__icon md-icon" for="__search">
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
      <path d="M9.5 3A6.5 6.5 0 0 1 16 9.5c0 1.61-.59 3.09-1.56 4.23l.27.27h.79l5 5-1.5 1.5-5-5v-.79l-.27-.27A6.516 6.516 0 0 1 9.5 16 6.5 6.5 0 0 1 3 9.5 6.5 6.5 0 0 1 9.5 3m0 2C7 5 5 7 5 9.5S7 14 9.5 14 14 12 14 9.5 12 5 9.5 5Z"></path>
    </svg>
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
      <path d="M20 11v2H8l5.5 5.5-1.42 1.42L4.16 12l7.92-7.92L13.5 5.5 8 11h12Z"></path>
    </svg>
  </label>
  <nav class="md-search__options" aria-label="Search">
    <button type="reset" class="md-search__icon md-icon" title="Clear" aria-label="Clear" tabindex="-1">
      <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
        <path d="M19 6.41 17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12 19 6.41Z"></path>
      </svg>
    </button>
  </nav>
</form>

<form class="md-header__option" data-md-component="palette">
  <input class="md-option" data-md-color-media="(prefers-color-scheme)" data-md-color-scheme="default" data-md-color-primary="indigo" data-md-color-accent="deep-purple" aria-label="Switch to dark mode" type="radio" name="__palette" id="__palette_0">
  <label class="md-header__button md-icon" title="Switch to dark mode" for="__palette_1">
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
      <path d="m14.3 16-.7-2h-3.2l-.7 2H7.8L11 7h2l3.2 9h-1.9M20 8.69V4h-4.69L12 .69 8.69 4H4v4.69L.69 12 4 15.31V20h4.69L12 23.31 15.31 20H20v-4.69L23.31 12 20 8.69m-9.15 3.96h2.3L12 9l-1.15 3.65Z"></path>
    </svg>
  </label>
  <input class="md-option" data-md-color-media="(prefers-color-scheme: dark)" data-md-color-scheme="slate" data-md-color-primary="indigo" data-md-color-accent="amber" aria-label="Switch to light mode" type="radio" name="__palette" id="__palette_1">
  <label class="md-header__button md-icon" title="Switch to light mode" for="__palette_2" hidden="">
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
      <path d="M10 2c-1.82 0-3.53.5-5 1.35C8 5.08 10 8.3 10 12s-2 6.92-5 8.65C6.47 21.5 8.18 22 10 22a10 10 0 0 0 10-10A10 10 0 0 0 10 2Z"></path>
    </svg>
  </label>
  <input class="md-option" data-md-color-media="(prefers-color-scheme: light)" data-md-color-scheme="default" data-md-color-primary="indigo" data-md-color-accent="deep-purple" aria-label="Switch to system theme" type="radio" name="__palette"
    id="__palette_2">
  <label class="md-header__button md-icon" title="Switch to system theme" for="__palette_0" hidden="">
    <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
      <path d="M12 18a6 6 0 0 1-6-6 6 6 0 0 1 6-6 6 6 0 0 1 6 6 6 6 0 0 1-6 6m8-2.69L23.31 12 20 8.69V4h-4.69L12 .69 8.69 4H4v4.69L.69 12 4 15.31V20h4.69L12 23.31 15.31 20H20v-4.69Z"></path>
    </svg>
  </label>
</form>

Text Content

Skip to content

Privacy Guides
Home
 * 2024.06.01
 * 2.6k
 * 200

Type to start searching
 * English
 * Español
 * Français
 * עִברִית
 * Italiano
 * Nederlands
 * 正體中文
 * русский


 * Home
 * Knowledge Base
 * Recommendations
 * About
 * Donate
 * Changelog
 * Forum
 * Blog


THE GUIDE TO RESTORING YOUR ONLINE PRIVACY.

Massive organizations are monitoring your online activities. Privacy Guides is
your central privacy and security resource to protect yourself online.

Start Your Privacy Journey Recommended Tools
Privacy Guides
 * 2024.06.01
 * 2.6k
 * 200

 * Home Home
   Table of contents
    * Why should I care?
    * What should I do?

 * Knowledge Base
   Knowledge Base
    * Why Privacy Matters
    * Threat Modeling
    * Common Threats
    * Common Misconceptions
    * Account Creation
    * Account Deletion
    * Technology Essentials
      Technology Essentials
       * Introduction to Passwords
       * Multi-Factor Authentication
       * Email Security
       * VPN Overview
   
    * Advanced Topics
      Advanced Topics
       * DNS Overview
       * Tor Overview
       * Private Payments
       * Types of Communication Networks
   
    * Operating Systems
      Operating Systems
       * Android Overview
       * iOS Overview
       * Linux Overview
       * macOS Overview
       * Qubes Overview
       * Windows
         Windows
          * Group Policy Settings

 * Recommendations
   Recommendations
    * Privacy Tools
    * Internet Browsing
      Internet Browsing
       * Tor Browser
       * Desktop Browsers
       * Mobile Browsers
       * Browser Extensions
   
    * Providers
      Providers
       * Cloud Storage
       * DNS Resolvers
       * Email Aliasing
       * Email Services
       * Financial Services
       * Photo Management
       * Search Engines
       * VPN Services
   
    * Software
      Software
       * Calendar Sync
       * Cryptocurrency
       * Data and Metadata Redaction
       * Email Clients
       * Encryption Software
       * File Sharing and Sync
       * Frontends
       * Multi-Factor Authentication
       * News Aggregators
       * Notebooks
       * Password Managers
       * Productivity Tools
       * Real-Time Communication
   
    * Hardware
      Hardware
       * Security Keys
   
    * Operating Systems
      Operating Systems
       * Android
       * Desktop/PC
       * Router Firmware
   
    * Advanced
      Advanced
       * Alternative Networks
       * Device Integrity

 * About
   About
    * Contributors
    * General Criteria
    * Notices and Disclaimers
    * Privacy Policy
    * Traffic Statistics
    * Community
      Community
       * Supporting Us
       * Online Services
       * Code of Conduct
       * PrivacyTools FAQ
   
    * Contributing
      Contributing
       * Writing Guide
         Writing Guide
          * Writing Style
          * Admonitions
          * Branding Guidelines
          * Translations
      
       * Technical Guides
         Technical Guides
          * Uploading Images
          * Git Recommendations

 * Donate
 * Changelog
 * Forum
 * Blog

Table of contents
 * Why should I care?
 * What should I do?


TOP DISCUSSIONS THIS WEEK

Introducing Docs in Proton Drive – collaborative document editing

 * Last reply 2 hours ago
 * ph00lt0
 * 32 Likes
 * 23 Replies

"I have refused to carry any sort of cellular phone" -rms

 * Last reply 19 hours ago
 * Anonymous201
 * 83 Likes
 * 73 Replies

Apple shows how little they give a fuck about its users and removes leading VPNs
from the Russian App Store

 * Last reply 2 days ago
 * Lukas
 * 20 Likes
 * 16 Replies

Signal stores your decryption key in a plain text file on MacOS

 * Last reply 19 hours ago
 * Lukas
 * 12 Likes
 * 34 Replies

BTRFS or ext4?

 * Last reply 5 days ago
 * Cyber-Typhoon
 * 22 Likes
 * 25 Replies

Join the forum

--------------------------------------------------------------------------------


WHY SHOULD I CARE?¶

“I HAVE NOTHING TO HIDE. WHY SHOULD I CARE ABOUT MY PRIVACY?”¶

Much like the right to interracial marriage, woman's suffrage, freedom of
speech, and many others, our right to privacy hasn't always been upheld. In
several dictatorships, it still isn't. Generations before ours fought for our
right to privacy. Privacy is a human right, inherent to all of us, that we are
entitled to (without discrimination).

You shouldn't confuse privacy with secrecy. We know what happens in the
bathroom, but you still close the door. That's because you want privacy, not
secrecy. Everyone has something to protect. Privacy is something that makes us
human.

Why Privacy Matters


WHAT SHOULD I DO?¶

FIRST, YOU NEED TO MAKE A PLAN¶

Trying to protect all your data from everyone all the time is impractical,
expensive, and exhausting. But don't worry! Security is a process, and, by
thinking ahead, you can put together a plan that's right for you. Security isn't
just about the tools you use or the software you download. Rather, it begins by
understanding the unique threats you face, and how you can mitigate them.

This process of identifying threats and defining countermeasures is called
threat modeling, and it forms the basis of every good security and privacy plan.

Learn More About Threat Modeling

--------------------------------------------------------------------------------


WE NEED YOU! HERE'S HOW TO GET INVOLVED:

If you spot an error, think a provider should not be listed, notice a qualified
provider is missing, believe a browser plugin is no longer the best choice, or
uncover any other issue, please let us know.


JOIN A DISCUSSION

Linux Laptops? System76? Other options?

 * Last reply 25 minutes ago
 * AnonymousIceCoffee
 * 78 Likes
 * 56 Replies

I do not know what to do with social media

 * Last reply 33 minutes ago
 * Khabib
 * 0 Likes
 * 2 Replies

How to make decisions for which Apps to use?

 * Last reply 35 minutes ago
 * Average_Joe
 * 14 Likes
 * 10 Replies

Spyware and Microphone question

 * Last reply 55 minutes ago
 * Zelitu55
 * 0 Likes
 * 0 Replies

Feedback Needed on My Privacy Setup to Avoid Surveillance Capitalism

 * Last reply 1 hour ago
 * rafa
 * 4 Likes
 * 7 Replies

Fedora configuration: Lockscreen bypass, hardening

 * Last reply 1 hour ago
 * camp
 * 0 Likes
 * 0 Replies

Looking for Advice on how to Remove a Canadian Government Website with my
Personal Information from Google Search Results or even entirely

 * Last reply 1 hour ago
 * Septuagint2024
 * 8 Likes
 * 10 Replies

Use-Case for Browser Extensions vs Using Desktop Apps

 * Last reply 2 hours ago
 * seek.veritas
 * 12 Likes
 * 17 Replies

Introducing Docs in Proton Drive – collaborative document editing

 * Last reply 2 hours ago
 * ph00lt0
 * 32 Likes
 * 23 Replies

UP Phone - A new Android-based privacy phone?

 * Last reply 3 hours ago
 * RevealedInWords
 * 33 Likes
 * 15 Replies

The Lockdown - Privacy Podcast

 * Last reply 3 hours ago
 * Golden_Centurion
 * 0 Likes
 * 2 Replies

ELI60 How would you know that Google doesn't have something "odd" in their Pixel
phone?

 * Last reply 4 hours ago
 * Grunge164
 * 11 Likes
 * 8 Replies

Total EU surveillance with state as car passenger

 * Last reply 4 hours ago
 * anonymous165
 * 0 Likes
 * 0 Replies

Proton explains the state of AI and privacy, and their roadmap

 * Last reply 5 hours ago
 * Encounter5729
 * 5 Likes
 * 2 Replies

What do you do in Linux when you run into a Windows exclusive software?

 * Last reply 6 hours ago
 * Balsamic3361
 * 10 Likes
 * 4 Replies

Join the forum

--------------------------------------------------------------------------------

Privacy Guides is a non-profit, socially motivated website that provides
information for protecting your data security and privacy.
We do not make money from recommending certain products, and we do not use
affiliate links.
2019-2024 Privacy Guides and contributors.