Each program or technology mentioned is assigned a rating according to the following scale:

While broad recommendation criteria can be useful to guide your research, it’s important to evaluate your use of technologies in the context of your threat model. A “recommended” rating indicates that the software meets basic ethical and privacy-related criteria, not that it is appropriate for every situation.

Back to top