- Back Doors
- The Cloud
- Digital Rights Management (DRM)
- Free Software
- Mobile Phones
- Service as a Software Substitute (SaaSS)
- Threat Modeling
Technologies and Software
- Browser Extensions
- GNU IceCat
- Password Managers
- Tor Browser
Each program or technology mentioned is assigned a rating according to the following scale:
Recommended with caveats: The program is free software but contains anti-features that can be disabled or circumvented by the user or has minor privacy flaws.
Not recommended: The program is non-free or has fatal privacy flaws.
While broad recommendation criteria can be useful to guide your research, keep in mind that it’s important to evaluate your use of technologies in the context of your threat model.