Privacy-Related Concepts
- Two-Factor Authentication (2FA)
- Advertising
- Anti-Features
- Back Doors
- Browser Extensions
- The Cloud
- Diceware
- Digital Rights Management (DRM)
- Free Software
- Mobile Phones
- Password Managers
- Phishing
- Privacy
- Service as a Software Substitute (SaaSS)
- Security
- Threat Modeling
Technologies and Software
- Discord
- Element
- Firefox
- GNU IceCat
- Google Chrome
- Jitsi Meet
- LibreOffice
- LibreWolf
- Matrix
- Microsoft Edge
- 1Password
- Signal
- Telegram
- Thunderbird
- Tor Browser
- Vivaldi
- Wire
- Zoom
Each program or technology mentioned is assigned a rating according to the following scale:
-
Recommended: The program is privacy-respecting free software.
-
Recommended with caveats: The program is free software but contains anti-features that can be disabled or circumvented by the user or has minor privacy flaws.
-
Not recommended: The program is non-free or has fatal privacy flaws.
While broad recommendation criteria can be useful to guide your research, it’s important to evaluate your use of technologies in the context of your threat model. A “recommended” rating indicates that the software meets basic ethical and privacy-related criteria, not that it is appropriate for every situation.