Privacy-Related Concepts

Technologies and Software

Each program or technology mentioned is assigned a rating according to the following scale:

While broad recommendation criteria can be useful to guide your research, keep in mind that it’s important to evaluate your use of technologies in the context of your threat model.

Back to top