Privacy Guide: Fight Surveillance with Encryption and Privacy Tools
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. PrivacyTools.io provides services, tools and privacy guides to counter global mass surveillance. Established in 2015 after Edward Snowden's revelations and is now the most popular guide for Privacy Tools.
Criteria Forum Twitter Privacy Guides GitHub Gems Changelog Donate
Best Privacy Tools and Alternatives
Communication Privacy Tools
Privacy Service Providers
Cryptocurrency Tools and Services
Privacy Service Providers
Cryptocurrency Tools and Services
Improve the privacy of your friends & family by sharing this website
For easy copy & paste on social media platforms, messengers and emails.VPN Privacy Guide: The best and most reliable VPN Services
We have compared 185 different VPN providers, but our strict criteria left only the four best providers. Our recommended providers are operating outside the USA or other Five Eyes countries, use a strong encryption, accept Crypto currencies or cash payments, support OpenVPN, have a no logging policy and have a long history of operating.

NordVPN: 60 USD Yearly
Based in Panama. Operating since 2012. Accepts Bitcoin, ETH and more via Coingate. Native desktop and mobile clients are available for Android and iOS. Money back guarantee for 30 days.
Amount of servers in Aug 2022: 5510 VPN servers, in 59 different countries. Source

ProtonVPN: Limited free version available, otherwise 48 EUR Yearly
Based in Switzerland. Operating since 2016. Accepts Bitcoin, but you need an existing account or contact their support team in advance. Easy to use native desktop and mobile clients are available for Android and iOS.
Amount of servers in Aug 2022: 1700 VPN servers available in 60 different countries. Source
Mullvad: 60 Euro Yearly
Based in Sweden. Operating since 2009. Accepts Bitcoin, BCH and Cash. Native desktop and mobile clients are available for Android and iOS and are easy to use. Money back guarantee for 30 days.
Amount of servers in Aug 2022: 867 VPN servers, in 39 different countries. Source

IVPN: 60 USD Yearly
Based in Gibraltar. Operating since 2009. Accepts Bitcoin, Monero and Cash. Native desktop and mobile clients are available for Android and iOS and are easy to use. Money back guarantee for 30 days.
Amount of servers in Aug 2022: 77 VPN servers available in 32 different countries. Source
VPN Privacy Guides:
- A Complete Guide to Virtual Private Networks (VPNs)
- How is the Five Eyes Intelligence Alliance Related to Your Privacy?
Using a Privacy VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. If you are looking for anonymity, you should use the Tor Browser instead of a VPN. Don't replace good security practices with a VPN service. If you're looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you.
Web Browser Guide for better Privacy
Firefox: Reliable, fast and privacy friendly
It's recommended to install additional browser addons to strengthen Firefox even more. Firefox is able to sync accross all your devices on different platforms. Firefox is not the perfect out of the box solution but It's definetly worth it to take the extra time and setup Firefox properly.
Check for WebRTC & DNS leaks and learn how to fix them with the connection check at mullvad.net.
Hardening & Tweaking: The default settings of Firefox are not the best choice to be a privacy respecting browser. Use Firefox Profilemaker to adjust the settings. An alternative is to download the hardened Arkenfox's user.js - Place this in your Firefox's user.js directory and it will fix everything for you. You can also do it manually.

Firefox Focus: Private Mobile Browsing for Android & iOS
Dedicated privacy browser with automatic tracking protection and ad blocking. With Focus, your pages load faster and your data stays private..
Brave: Fast, cross-platform and block ads & trackers
Not a popular choice within the privacy community but it offers a complete package out of the box on all platforms and is suitable for beginners or if setup time is a factor at the given situation. Wikipedia offers more information about it's controversies.
Tor: Encrypted out of the box for extra privacy and anonymity
Tor Browser is your choice if you need an extra layer of anonymity. It's a modified version of Firefox, which comes with pre-installed privacy add-ons, encryption, and an advanced proxy. It's not recommended to install additional browser addons. Plugins or addons may bypass Tor or compromise your privacy.
Tutorials: Installing, Tor Bridges, Gaining Anonymity and Tracking via anonymized Tor/VPN traffic.

LibreWolf: Focused on privacy, security and freedom for desktop only
A modified version of firefox designed to increase protection against tracking and fingerprinting techniques, while also including security improvements.
DuckDuckGo: Privacy Browser for Android & iOS
Built-in advertising trackers blocking, private search and forces sites to use an encrypted connection if available.
Bromite: Based on Chromium for Android
Chromium browser with privacy and security enhancements, built-in adblocking and DNS over HTTPS support.
Onion Browser: Connection to the Tor Network on iOS
There are certain anonymity-related issues with Onion Browser due to iOS limitations.
Privacy Tools Forum:
Privacy Tools & Browser Checks:
- BrowserLeaks.com: A wide range of security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.
- LocateJS: Predicts your location by analyzing your connection and system data. This scan allows you to understand how your location can be pinpointed even while using a VPN, location spoofer or private mode.
- ipleak.net: Supports checks for WebRTC leaks, DNS leaks, Geolocation, Torrent Address detection and more.
- Cover Your Tracks by EFF.org: Test your browser to see how well you are protected from tracking and fingerprinting. It shows your browser’s most unique and identifying characteristics. Less unique is better.
- PrivacyTests.org: Open-source tests of web browser privacy. A useful resource for comparing browsers.
Privacy Guides for Browsers:
- How does HTTPS / Browser Encryption work?
- Your first choice for better internet privacy: Firefox Browser
Privacy Browser Addon Guide
Keep in mind that browser extensions make your browser footprint more unique. If that is a concern of yours in certain scenarios, consider installing a second browser on your device without any addons.
uBlock Origin: Block Ads and Trackers
It's recommended to use this plugin with Firefox, but it's also available for other browsers. Firefox on Android supports also uBlock Origin plugin.
Decentraleyes: Block Content Delivery Networks
Emulates Content Delivery Networks locally by intercepting requests and injecting it into the environment. Automatically, and no configuration required. Can be installed for Firefox on Android.
ClearURLs: Automatically remove tracking elements from URLs
Removes tracking from URLs automatically in the background. Lightweight and useful.
xBrowserSync: Encrypted bookmarks across devices and browsers
No sign up is required and no personal data is ever collected. To start syncing simply download xBrowserSync for your desktop browser or mobile platform, enter an encryption password and click Create New Sync!

Cookie AutoDelete: Automatically Delete Cookies
When a tab closes, any cookies not being used are automatically deleted. Keep the ones you trust (forever/until restart) while deleting the rest. Also available for Chrome.

SponsorBlock: Skip sponsor segments in YouTube videos
A crowdsourced extension: Users submit when a sponsor happens from the extension, and the extension automatically skips sponsors it knows about. Almost 9M skip segments in the crowdsourced database.
Secure Password Manager Tools
"If you're having login problems I feel bad for you son. I've got 99 passwords and remember only 1." Jay-Z, 2022

NordPass: Manage passwords hassle-free
Audited by an independent cybersecurity firm Cure53 in Feb 2020 and confirmed the security of NordPass. Offers browser extensions for Chrome, Firefox, Edge, Brave, Opera and Safari.
Bitwarden: Easy to use, modern, cross platform and convenient
Bitwarden is our top choice. You can import your previous passwords from other password managers with ease. Free for personal use. Available for Desktop, all Browsers, Android and iOS.
LessPass: Securely generated passwords with no storage or snyc needs
If you like Bitwarden but don't like syncing or storage of passwords then LessPass is your choice. Browsers, mobile phones and the command line are supported platforms.
KeePassXC: Reliable, old school and cross platform
Securely store passwords using industry standard encryption, quickly auto-type them into desktop applications, and use browser extension to log into websites. KeePassDX for Android: Google Play or F-Droid.

Spectre: Generated passwords, no storage needed
Formerly Master Password. Passwords aren't stored: they are generated on-demand from your name, the site, and your master password. No syncing, backups, or internet access needed. The Windows version requires to install Java. Same principle like LessPass, but LessPass is more convenient to use because of the Browser Addons.
Password Privacy Guides:
- Hashing & Authentication: How are your passwords stored on websites?
- Advanced Password Management and Storage
- Choosing and Using Strong Passwords and Manage them easily
Privacy Two-Factor Authentication (2FA) Tools

Raivo OTP: Easy-to-use and lightweight with sync for iOS
There is also a MacOS app available to automatically and securely copy one-time passwords tapped in Raivo OTP for iOS to the clipboard of your Mac. Works across multiple iCloud accounts.
Privacy Guides Blog:
File Encryption Software Guide
VeraCrypt: On-the-fly Disk Encryption
It can create a virtual encrypted disk that works just like a regular disk but within a file. It can also encrypt a partition or the entire storage device with pre-boot authentication.
GNU Privacy Guard: Email Encryption
GnuPG allows you to encrypt and sign your data and communications. Following are download links for different platforms. Mac: GPG Suite. OpenKeychain for Android: Google Play and F-Droid.
7-Zip: Easy to use with strong AES-256 encryption
File archiver with a high compression ratio and built-in encryption functionality.
Cryptomator: Encrypt Dropbox, Google Drive and other cloud storage
Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to a cloud service.
Picocrypt: Small, simple and secure Desktop Encryption
Uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security, even from three-letter agencies like the NSA. Simply drop your files, enter a password, and hit Start to encrypt.

Hat.sh: Simple, fast, secure client-side file encryption in your browser
A web app that provides secure file encryption in the browser. The app never uploads the files to the server. It uses modern secure cryptographic algorithms with chunked AEAD stream encryption/decryption.
- Fawkes: Image Cloaking to counter facial recognition for personal privacy
Privacy Guides about Encryption:
- GPG/PGP Based Encryption & Authentication for Emails
- Full Disk Encryption: Strongest Counter to Surveillance, Attack and Theft of Your Devices
File Sharing and Synchronizating
Send: Share encrypted files with ease
Continuation of Mozilla's Firefox Send, now a community fork hosted over multiple instances.
OnionShare: Anonymous file transfer via Tor
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Share files, host websites, and chat anonymously via a new tabbed interface for maximum productivity.
Syncthing: Continuous file synchronization
Synchronizes files between two or more computers in real time, safely protected from prying eyes. Your data is your data alone and you deserve to choose where it is stored, whether it is shared with some third party, and how it's transmitted over the internet.
Encrypted Digital Notebooks
Cryptee: Encrypted Documents Editor
Your documents are encrypted before they leave your device, so Cryptee can't see your documents. Use the code "privacytools" at the checkout for a 10% lifetime off.

Logseq: A local-first notebook for organizing and collaboration
Not encrypted, but the server will never store or analyze your private notes. Your data are plain text files.
Encrypted Calendars That Respect Your Privacy by Design

Proton Calendar: Manage your agenda and keep data private
Select the "Mail Plus" or "Proton Unlimited" paid plans for more features.
EteSync: Securely sync your contacts, calendars, tasks and notes
If you decide to self-host EteSync you won't have to pay for the subscription. Tutorial here.
Productivity & Collaboration Privacy Tools for Work
Etherpad: Instant collaborative web text editor
Highly customizable open-source online editor providing collaborative editing in real time.
CryptPad: End-to-end encrypted collaboration suite
Plenty of features: Rich text, code, presentation, sheet, form, kanban, whiteboard and CryptDrive.
ONLYOFFICE: Collaborative online document editors
Features: Online document editors, platform for document management, corporate communication, mail and project management tools.
LibreOffice: Complete desktop office solution
LibreOffice consists of programs for word processing, creating and editing of spreadsheets, slideshows, diagrams and drawings, working with databases, and composing mathematical formulae. It is available in 115 languages.

EtherCalc: Instant collaborative web spreadsheet
Your data is saved on the web, and people can edit the same document at the same time. Everybody's changes are instantly reflected on all screens.
Skiff Pages: Encrypted & Decentralized Notes on IPFS
Company is based in USA but files are stored decentralized on the InterPlanetary File System (IPFS). The free plan offers 10 GB storage and unlimited bandwith. No Windows or Linux clients released yet, but everything is accessible via Web.

Vikunja: Self-hosted team task manager with modern features
The project is still under development and the native apps are not final yet, but the web version works great. Offers an import feature from Todoist, Trello and Microsoft To-Do.
Privacy Friendly Operating Systems
Privacy and Security Tools for Windows 10 and 11
Security & Privacy Guides:Privacy Friendly Mobile Operating Systems
CalyxOS: Secure features for your Google Pixel Phone
Only Google Pixel devices and Xiaomi Mi A2 are supported. Source.
GrapheneOS: Improved privacy and security for your Google Pixel device
Only Google Pixel devices are supported, new models are recommended. Source.
Android Keyboard Alternatives That Respect Your Privacy

AnySoftKeyboard: One of the most customizable keyboards available
Get it on F-Droid. Supports lots of languages via external packages.

OpenBoard: Look and feel of Gboard without the tracking
Get it on F-Droid. No dependency on Google binaries.

FlorisBoard: Modern, user-friendly, customizable and privacy respecting
Get it on F-Droid. Currently in early-beta state.

Simple Keyboard: Super lightweight (<1MB) and minimal features
Get it on F-Droid. For people who like it minimalistic. No emojis, gifs, spell checker or swipe typing.
Open Source Router Firmware
Encrypted DNS Clients for Improved Internet Privacy
dnscrypt-proxy: Flexible DNS proxy, supports modern encrypted protocols
(Desktop) A flexible DNS proxy, with support for modern encrypted DNS protocols including DNSCrypt V2, DNS-over-HTTPS and Anonymized DNSCrypt. Also allows for advanced monitoring, filtering, caching and client IP protection through Tor, SOCKS proxies or Anonymized DNS relays.
Unbound: Validating, recursive, caching DNS resolve
(Desktop) Validating, recursive, caching DNS resolve with support for DNS-over-TLS. Designed to be fast, lean, and secure Unbound incorporates modern features based on open standards. Unbound was recently audited.

Nebulo: Light-weight, customizable and battery efficient
(Android) Non-root, small-sized DNS changer utilizing DNS-over-HTTPS and DNS-over-TLS.

DNSCloak: iOS GUI and Wrapper for dnscrypt-proxy
(iOS) Allows for the use for dnscrypt-proxy on an iPhone or iPad, which gives users the ability to encrypt their DNS requests through the use of an on-device VPN profile.
Firefox: Built-in DNS-over-HTTPS resolver
(Desktop) If you're using Firefox you don't need additional tools. DNS-over-HTTPS (DoH) FAQ.
Self-Contained Anonymizing Networks
Tor: Most popular, biggest and cross-platform network available
Tor, short for The Onion Router, is for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than six thousand relays, for concealing a user's location and usage from anyone conducting network surveillance or traffic analysis.

Lokinet: Anonymous and censorship-resistant internet access
Uses Oxen Service Nodes (also used by Session) as routers to safeguard user privacy and anonymity.

I2P: Censorship-resistant peer-to-peer network
The Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by end-to-end encrypting the user's traffic, and sending it through a volunteer-run network of roughly 55,000 computers distributed around the world.
Freenet: Decentralized, anonymous communication without fear of censorship
Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship.
Retroshare: P2P communication and file sharing built on GNU Privacy Guard
Peer-to-peer communication and file sharing app based on a friend-to-friend network built on GNU Privacy Guard (GPG). Optionally, peers may communicate certificates and IP addresses to and from their friends.

IPFS: Protocol and P2P network for storing and sharing data
The InterPlanetary File System (IPFS) is a protocol and peer-to-peer network for storing and sharing data in a distributed file system. IPFS uses content-addressing to uniquely identify each file in a global namespace connecting all computing devices
GNUnet: Software framework in support of a free and open society
For decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery, resource allocation, communication over many transports (such as TCP, UDP, HTTP, HTTPS, WLAN and Bluetooth) and various basic peer-to-peer algorithms for routing, multicast and network size estimation.
Open Source Torrent Clients without Ads and Tracking
Your IP address is exposed while using any Torrent Client. Consider using a VPN provider to hide your IP. If you are using µTorrent that includes ads and tracking, select your alternative here.
Disk & File Cleaners with Privacy Features
BleachBit: Disk space cleaner, privacy manager and system optimizer
Shredding files and wiping unallocated disk space to minimize data remanence.
ExifCleaner: Privacy metadata removal tool
Removes metadata for the most popular image and video formats. It also supports PDF files and comes with batch-processing to process multiple files at once. Drag and Drop interface, easy to use.

Metapho: Image metadata remover for iOS
Strips out metadata or remove location data only. Share without metadata just before sharing.

Czkawka: Simple, fast and free app to remove duplicated files
No privacy features but a neat little tool to declutter your computer and free disk space.
Privacy Guides about Disks and Files:
- Manufacturer Tools for Wiping HDD and SSD Drives
- File-Change Detection or Integrity Monitoring Systems
- Deleting and Decluttering Data to Improve Privacy
RSS Feed Readers
Secure Whistleblower Tools
SecureDrop: Whistleblower submission system for news organizations
Software that news websites install to offer whistleblowers a plattform for secure communication and file transfers. Requires Tor Browser for anonymity in order to access. List of organizations using SecureDrop.

Haven: Monitoring of intrusions into home, office and hotel rooms
An Android application that leverages on-device sensors to provide monitoring and protection of physical areas. Turns Android phones into a motion, sound, vibration and light detector, watching for unwanted intruders.
Briar: P2P encrypted messaging for activists and journalists
Briar doesn't rely on a central server - messages are synchronized directly between the users' devices via Bluetooth or Wi-Fi. Online sync via the Tor network is possible, too. Protecting users from surveillance.
GlobaLeaks: Easily set up and maintain a secure whistleblowing platform
Alternative to SecureDrop. Easily set up a secure and anonymous whistleblowing initiative. Designed to be user-friendly, the software is customisable and protects the whistleblower's privacy and submissions by default.
OnionShare: Anonymous file transfer via Tor
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. Share files, host websites, and chat anonymously via a new tabbed interface for maximum productivity.

EFF: Surveillance Self-Defense Guides
Electronic Frontier Foundation offers tips, tools and how-tos for safer online communications.
- Whistleblower Guide: How Privacy Tools Can Protect You From Retaliation
- How to Counteract Forensic Linguistics
- Freedom of the Press Foundation: Protects, defends, and empowers public-interest journalism.
- The Hitchhiker’s Guide to Online Anonymity: How I learned to start worrying and love privacy anonymity.
Email Clients for better Internet Privacy
Desktop - Thunderbird: Reliable, fast and privacy friendly
Mozilla Thunderbird is a email client, personal information manager, news client, RSS and chat client.
Browser - Mailvelope: end-to-end encryption for your existing email address
Bring email encryption straight into your Browser. We recommend using Firefox for this. It can be used to encrypt and sign electronic messages, including attached files, without the use of a separate, native email client (like Thunderbird) using the OpenPGP standard. List of supported email providers.
Android and iOS - Canary Mail: Intuitive Design & Impeccable Security
Canary's security suite is second to none with Seamless End-To-End Encryption, Full PGP Support, Biometric App Lock, On-Device Fetch, No Ads, No Data Mining & Open Source Mail Sync Engine. Also available for Mac.
Android - K-9 Mail: Advanced Email for your phone
K-9 Mail is an open source email client focused on making it easy to chew through large volumes of email. Designed for both novice and power users and offers lots of features for everyone.
Encrypted and Secure Instant Messaging

Session: Cross-platform, end-to-end encrypted
No phone number or email address is required to signup. Similar functionality like Element, but still in an earlier stage of development. Decentralized servers routed through Lokinet.

Status: Cross-platform, end-to-end encrypted
No phone number or email address is required to signup. Uses the peer-to-peer (p2p) messaging protocol Waku that removes centralized third parties from messages.
Signal: Cross-platform and encrypted messaging
Similar look and feel of WhatsApp and other commonly used messaging apps, makes switching easy. Signal requires your phone number as an personal identifier.

Threema: Encrypted messaging for mobile
No native desktop apps available yet, but there is a web version for your browser. No phone number is required to signup but there is a payment involved to get the app. Fortunately the Threema shop accepts Bitcoin.
Delta Chat: Cross-platform, end-to-end encrypted via Email
Delta Chat doesn't have their own servers but uses the most massive and diverse open messaging system ever: the existing e-mail server network. Chat with anyone if you know their e-mail address, no need for them to install DeltaChat. All you need is a standard e-mail account. How does Delta Chat protect my Metadata?
Sounds slow? It's using Push-IMAP to make it fast. List of recommended Email providers.
Open Source Team Chats
Element: Cross-platform, end-to-end encrypted and federated Chat
A modern alternative to IRC or Discord. Good for team chats and groups.
Rocket.Chat: Cross-platform, end-to-end encrypted
Professional approach for real-time conversations with your colleagues, other companies or customers.

Revolt Chat: Open Source Discord Alternative
Ideal for gamers who prefer open source solutions over Discord. Early stage development and experimental.
Anonymous Instant Messaging via Tor

Cwtch: End-to-end encrypted and takes place over Tor
User friendly, lightweight, for desktop and Android. End-to-end encrypted and takes place over Tor v3 onion services. Privacy-preserving, multi-party messaging protocol. Built to be metadata resistant.
Speek! Easy to use, file transfer and metadata resistant
Based on Ricochet with an improved user interface to make onboarding easy and achieve mass adoption.
Forum: Interesting discussion between the Speek! and Ricochet Refresh developer.
Briar: Encrypted messaging for activists and journalists
Briar doesn't rely on a central server - messages are synchronized directly between the users' devices via Bluetooth or Wi-Fi. Online sync via the Tor network is possible, too. Protecting users from surveillance.

Ricochet Refresh: Easy to use, file transfer and metadata resistant
Based on Ricochet but improved security and compatibility with Tor Onion Services v3 instead of older v2.
Tox: Encrypted messaging, voice, video, screen and file sharing
Wide range of features but a highly experimental protocol, use with caution.
Encrypted Video & Voice Messengers
Brave Talk: Browser based for unlimited private video calls
The person creating the call requires to use Brave Browser, but the participants can join from any browser.
Privacy Friendly Translation, Spell & Grammar Checker Tools
DeepL Translate: The world's most accurate translator
Warning: The free version of DeepL does not respect your privacy, only the paid pro version. Source: Privacy Policy. The texts of free users are used to train and improve the neural networks and translation algorithms.
An Unofficial Android App for DeepL Translator is available on F-Droid.
Lingva Translate: Alternative front-end for Google Translate without tracking
Retrieves translations without using any Google-related service, preventing them from tracking.
LanguageTool: Grammar, style, and spell checker
Great alternative to Grammarly. Plugins and apps available for: Firefox, Chrome, Edge, Safari, Opera, iOS, macOS, Windows, Google Docs, Microsoft Office, LibreOffice, OpenOffice, Gmail, Apple Mail and Thunderbird.

SimplyTranslate Mobile: Alternative front-end for Google Translate for Android
Clearweb, Onion, I2P and Lokinet instances are also available for SimplyTranslate.
LibreTranslate: No ties to proprietary services and can be self-hosted
100% Self-Hosted. No Limits. No Ties to Proprietary Services.
- Translate Shell:: Command-line translator for your terminal. Windows, Android, Mac and Linux.
Decentralized Social Networks

Redact: Delete your digital footprint
Allows you to automatically clean up your old posts from services like Twitter, Reddit, Facebook, Discord and more all in one place. Delete by key word, sentiment and content type.
Tip of the day: Delete your Facebook Account.
Social Networking Privacy Guide:
Blog Software for Self and Managed Hosting
Related Privacy Guides:
A Guide to Privacy Email Providers

ProtonMail: Secure email for the independent professional
Free and paid plans include all security features, including end-to-end encryption, zero-access encryption, anti-phishing, anti-spam and 2FA. Own Android, iOS Apps and web interface. Paid plans enable custom domains. Accessible via Tor Network. Based in Switzerland, founded in 2013.

Tutanota: Easy to use and private by design
Native cross platform apps available. Paid plans enable custom domains. No third-party email clients are supported, users need to use the wide range of native apps. Based in Germany, founded in 2011.

SimpleLogin: Hide your existing email address
Emails are forwarded to your real email address. If you reply to a sender it will use your alias, too. It is designed to be user friendly and available on many platforms. Based in France.

Disroot: Secure email for your desktop client or via a web interface
Free plans support custom domains. Users can choose between their web client or third party desktop clients like Thunderbird. Disroot allows for encrypted emails to be sent from their webmail application using OpenPGP. Based in The Netherlands, founded in 2015.

mailbox.org: Secure e-mail inbox 100% powered by eco-friendly energy
Paid plans enable custom domains. Users can choose between their web client or third party desktop clients like Thunderbird. Based in Germany, founded in 2014.

StartMail: Trusted and reliable encrypted email provider
Paid plans enable custom domains. Users can choose between their web client or third party desktop clients like Thunderbird. Based in The Netherlands, founded in 2014.
Email Privacy Guides:
- How is the Five Eyes Intelligence Alliance Related to Your Privacy?
- Lavabit: Suspension and gag order and the connection to Edward Snowden
Encrypted DNS Resolvers for Improved Internet Privacy

NextDNS: Blocks security threats, ads and trackers
The major advantage of NextDNS over AdGuard DNS is to be able to configure the service to your needs via parental controls, website restrictions or block whole categories of websites and apps. Easy to setup within minutes. Comes with setup guides for all systems. 300,000 queries/month for free, after that it will just work like a classic non-blocking DNS service.
Based in United States. Supports: DNS-over-TLS (DoT), DNS-over-HTTPS (DoH) and DNSCrypt.

AdGuard DNS: Blocking of Ads, Trackers and Malicious Domains
Easy to setup within minutes. Comes with setup guides for all systems. You only need to enter two IP adresses. 300,000 queries/month for free, after that it will just work like a classic non-blocking DNS service. Limited to five devices on the free plan.
Based in Cyprus. Supports: DNS-over-TLS (DoT), DNS-over-HTTPS (DoH) and DNSCrypt.
Cloudflare: High Performance DNS Resolver
Based in United States. Supports: DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH).

Quad9: Open DNS Recursive Service for Free Security and Privacy
Based in Switzerland. Supports: DNS-over-TLS (DoT), DNS-over-HTTPS (DoH) and DNSCrypt.

Pi-hole: Self-hosted solution for experts
You can run Pi-hole in a container, or deploy it directly to a supported operating system via installer.
Definitions Explained
DNS-over-TLS (DoT): A security protocol for encrypted DNS on a dedicated port 853. Some providers support port 443 which generally works everywhere while port 853 is often blocked by restrictive firewalls.
DNS-over-HTTPS (DoH): Similar to DoT, but uses HTTPS instead, being indistinguishable from "normal" HTTPS traffic on port 443 and more difficult to block. DoH contains metadata such as user-agent (which may include system information) that is sent to the DNS server.
DNSCrypt: With an open specification, DNSCrypt is an older, yet robust method for encrypting DNS.
The Best Privacy Respecting Search Engines
Startpage: Dutch search engine company that highlights privacy
Obtains Google search results while protecting users' privacy. Based in the Netherlands. Launched in 1998.

MetaGer: Metasearch engine run by a non profit organization
Link: MetaGer on GitLab. Based in Germany. Launched in 1996.
Brave Search: A completely independent index without tracking
Blog post about the new Brave Search beta. Based in the US. Launched in June 2021.
DuckDuckGo: Privacy and avoiding the filter bubble of personalized results
Some of DuckDuckGo's code is free software, but the core is proprietary. Launched in 2008. Based in US.
Searx: Privacy-respecting metasearch engine
Hosted in multiple locations around the world. Self-hostable, open source metasearch engine. Users can access existing public instances.
Mojeek: Independent search engine which does not track you
A crawler-based search engine that provides independent search results using its own index of web pages, rather than using results from other search engines. Based in the UK. Launched in 2004.

Swisscows: Privacy and family friendly Bing search results
Completly "family-friendly" with explicit results entirely removed. Based in Switzerland. Launched in 2014.
- searchengine.party: Compare popular search engines across security and privacy related data points.
- Whoogle Search: Get Google search results, but without any ads, javascript, AMP links, cookies, or IP tracking.
The Best Privacy-Friendly World Maps
OpenStreetMap: Free, collaborative world wide map
OpenStreetMap is a map of the world, created by people like you and free to use under an open licence.
OsmAnd: Map and navigation app that uses OpenStreetMap data
Global mobile map viewing and navigation for online and offline OpenStreetMap.
Organic Maps: Offline hike, bike, trails and navigation
Organic Maps is an Android & iOS offline maps app for travelers, tourists, hikers, and cyclists based on top of crowd-sourced OpenStreetMap data and curated with love by MapsWithMe (Maps.Me) founders.
Secure Web Hosting & Domain Provider

OrangeWebsite: Icelandic Web Hosting with Free Speech
Based in Iceland, founded in 2009. Accepts Bitcoin and cash by mail. 100% Green energy.
Privex: Secure Private VPS and Dedicated Server hosting
Based in Belize, founded in 2017. Server locations: Finland, Germany, USA, Sweden, Netherlands, Canada and Japan. Accepted cryptocurrencies: Bitcoin, Litecoin, HIVE / HBD, Monero (XMR), EOS and Dogecoin.

1984 Web Hosting: Safeguarding privacy and civil rights
Based in Iceland, founded in 2006. Accepts Bitcoin. 100% Green energy.
Njalla: A privacy-aware domain registration service
Based in Sweden, founded in 2017 by Peter Sunde the Co-founder of The Pirate Bay.
Bahnhof Cloud: Covered by strong free speech and data protection laws
Based in Sweden, founded in 1994. Payments only with Credit Card or PayPal.
Encrypted Cloud Storage Services
NordLocker: Encrypted, secure and easy-to-use cloud for your files
Premium plans to get 500 GB ($3.19 USD/mo) or 2 TB ($7.99 USD/mo) storage space. 30-day money-back guarantee. Company is based in Panama.

Proton Drive: End-to-end encrypted Swiss vault for your files
15 GB storage for 3.99€/mo or 500 GB for 9.99€/mo. Discount for yearly payments. Based in Switzerland.
Nextcloud: Self-hosting or choose a provider for your data
Nextcloud is functionally similar to Dropbox, Office 365 or Google Drive. It can be hosted in the cloud or on-premises. It is scalable from home office solutions based on the low cost Raspberry Pi all the way through to full sized data centre solutions that support millions of users.
MEGA: Files are transmitted and stored securely with end-to-end encryption
The free plan offers 20 GB storage and a daily 5GB transfer limit. Company is based in New Zealand.
Filen: Zero knowledge end-to-end encrypted cloud storage
The free plan offers 10 GB storage and unlimited bandwith. Hosted in Germany.
Skiff Drive: Encrypted & Decentralized on IPFS
The free plan offers 10 GB storage and unlimited bandwith. No Windows or Linux clients released yet, but everything is accessible via Web. Company is based in USA but files are stored decentralized on the InterPlanetary File System (IPFS).
If you're not able to switch your cloud service immediatly, consider encrypting with Cryptomator.
Privacy Cloud Storage Guide:
Photo Gallery Managers

ente: simple, encrypted photo storage
Your photos are encrypted and hosted in datacenters in The Netherlands and France (Source). Migration options available: Local HDD, Google, Apple and Amazon Photos. Free trial of 1 GB for 365 days available. Use coupon code "PRIVACYTOOLS" to get 10% off in the first year.
Cryptee: Encrypted Secure Photo Storage
Your photos are encrypted before they leave your device, so Cryptee can't see your photos, and no one else. Use the code "privacytools" at the checkout for a 10% lifetime off.
PhotoPrism: AI-powered app for browsing, organizing & sharing your photos
No hosted solution available yet, but coming soon. Tag and find pictures automatically. Try the demo.
Piwigo: Photo management software for the web
Cloud-hosted and self-hosted versions available. Comes with user management. Demo.
- Fawkes: Image Cloaking to counter facial recognition for personal privacy
- reddit.com/r/selfhosted: Google Photos - The Megathread
- github.com/awesome-selfhosted: More self-hosted options
Alternative & Privacy Friendly Frontends for Social Media
LibRedirect: Browser addon that redirects popular websites to alternatives
Automatically redirects requests from popular websites to alternative and privacy friendly frontends. Uses random instances by default. You can modify this and add custom instances too.
Supports: YouTube, YouTube Music, Twitter, Instagram, TikTok, reddit, imgur, Wikipedia, Medium, Quora, IMDb, PeerTube, LBRY/Odysee, Search, Translate, Maps and Send Files.
Invidious: Alternative frontend without ads and tracking for YouTube
Desktop: FreeTube. For Windows, Mac and Linux.
Android: LibreTube, NewPipe or NewPipe x SponsorBlock x Return YouTube Dislike (Fork).
Apple: Yattee. For iPhone, iPad, macOS and Apple TV (tvOS).
YouTube Music: Beatbump or Hyperpipe both are web versions.
Worth mentioning: Piped and CloudTube are both good alternatives to Invidious.
Nitter: Ad free, focused on privacy and performance for Twitter
Android: Fritter - A privacy-friendly Twitter frontend for Android devices.
All requests go through the backend, client never talks to Twitter. List of Instances.

Bibliogram: Loads faster, download images, eliminates ads for Instagram
Generates RSS feeds and doesn't urge you to sign up. List of Instances.

ProxiTok: Privacy respecting frontend for TikTok
RSS Feed for user, trending and tag. Just add /rss to the URL. List of instances.

teddit and libreddit privacy focused frontends for reddit
Our teddit instance is securely hosted by Privex.io for PrivacyTools.io. List of instances: Official teddit instance, teddit and libreddit.
rimgo: Lightweight, no ads or tracking and bandwith efficient for imgur
No sign up or app install prompts. List of Instances.

Wikiless: No JavaScript or ads for Wikipedia
This instance is securely hosted by Privex.io for PrivacyTools.io. All requests go through the backend, client never talks to Wikipedia. Official instance, list of instances and source code on Codeberg.org.

Quetre: A libre front-end for Quora
All requests are proxied. Dark and light themes available. List of Instances.

libremdb: Clean and lightweight interface for IMDb
All requests go through the backend; client never talks to IMDb. List of Instances.
- librarian: Lightweight frontend for LBRY/Odysee. Removes: JavaScript, Ads, Trackign and Crypto.
Related Content:
YouTube Alternatives & Tools

Odysee: Modern blockchain alternative for YouTube and Twitch
A decentralized and blockchain-based video platform powered by the LBRY protocol. Cryptocurrency can be used to tip creators. Allowing publishers and their fans to interact directly without the risk of demonetization.
Buy Cryptocurrency
LocalMonero: Monero (XMR) P2P marketplace
Accessiable via Tor and I2P. The biggest, most trusted and well-established P2P Monero exchange in the XMR community.

Bisq: Decentralized, open source P2P marketplace for desktop
Buy and sell bitcoin for fiat (or other cryptocurrencies) privately and securely using Bisq's peer-to-peer network and open-source desktop software. No registration required. Easy to use.
LocalCryptos: P2P marketplace for multiple currencies
Sign up either with your Ethereum wallet or email address. Fees: 0.75% for buyers and 0.25% for sellers.
Binance: Largest cryptocurrency exchange world-wide with P2P Feature
Founded in 2017 and became quickly the largest exchange in the world in terms of daily trading volume of cryptocurrencies. P2P trading available. Update: Sep 17, 2021: Binance requires all users to get verified.
Worth Mentioning:
Privacy-enhancing Bitcoin Wallets
CoinJoin is a trustless method for combining multiple Bitcoin payments from multiple spenders into a single transaction to make it more difficult for outside parties to determine which spender paid which recipient. Unlike many other privacy solutions, coinjoin transactions do not require a modification to the bitcoin protocol.

Samourai: Android Wallet
Built-in trustless CoinJoin. Full offline mode. Designed to keep miner fees as low as possible.

Sparrow Wallet: Lightweight Desktop Wallet
Built-in trustless CoinJoin. Easy to use and offers users a quick start guide.

BitLox: Hardware Wallet
Fully secured cryptocurrency wallet with the mind of keeping your Bitcoin transactions anonymous. Their Bitcoin Block Explorer is accessible over the Tor and I2P network.

Wasabi: Desktop Wallet
Non-custodial, privacy-focused Bitcoin wallet for Desktop, that implements trustless CoinJoin.

Edge: Android and iOS Wallet with multi-asset support
Touch ID (fingerprint) support, offers in-app buy and sell.

Electrum: Cross-platform with support of Hardware Wallets
Decentralized servers, encrypted, cached blockchain for improved speeds.
- https://en.bitcoin.it/wiki/CoinJoin
- Open Source Portfolio Managers and Trackers for Wealth Management - GitHub Gem
Monero: A privacy-enhanced cryptocurrency for anonymity

Cake Wallet: For Android and iOS with a modern design
Modern wallet design to store, send, receive and exchange XMR.

Monerujo: Android only with multiple wallets support
Multiple wallets, QR code scanning and able to pay BTC addresses.
Donate Monero to PrivacyTools.io
Easy copy & paste. Your donation for Pizza, Coffee and Beer is highly appreciated.Worth Mentioning:
Cryptocurrency Swap
Cryptocurrency exchanges which allow for direct peer-to-peer cryptocurrency transactions to take place securely and without the need for a third party to oversee transfer of assets. DEX are more anonymous than commercial exchanges which implement know your customer (KYC) requirements.

UnstoppableSwap: Send Bitcoin, receive Monero using Atomic Swaps
This is brand new technology and might have unexpected bugs. Be careful and only test with small amounts. Read the Official announcement from August 20, 2021.

SideShift.ai: No Account required on this crypto exchange
Swap between BTC, ETH, BCH, XMR, XAI and 30+ other cryptocurrencies.

WizardSwap: Supports Privacy Cryptocurrencies
Platform charges 0.1% fee but liquidity providers set their margins. Accessible via Tor (.onion).
Telegram Channels are targeted by scammers, don't share your key phrases with anyone. Admins of the official channels are not sending private messages to users. Beware of anyone reaching out via private message.
Worth Mentioning:
Known Privacy Related Incidents & Gag Orders to Date
2021, ProtonMail: ProtonMail logged IP address of French activist after an order by Swiss authorities. Source
2021, WindScribe VPN: Servers were not encrypted as they should have been allowing MITM attacks by authorities. Source
2021, DoubleVPN: Servers, logs, and account info seized by law enforcement. Source
2021, Tutanota Email: Forced to monitor two user accounts for three months implicated in a blackmail case. Source
Transparency Report & Warrant Canary for the secure email service Tutanota
2017, PureVPN: Forced to disclose information of one user to the FBI. Source
2014, EarthVPN: User was arrested based on logs provider to the Dutch Polic because of a bomb hoax. Source
2013, Lavabit Email: Secure E-Mail provider Lavabit shuts down after fighting a secret gag order. Source
2011, HideMyAss VPN: User was de-anonymized, and logs were provided to the FBI in a labeled "LulzSec fiasco". Source
What is a Warrant Canary?
A term for a regularly published statement that a service provider has not received legal process that it would be prohibited from saying it had received, such as a national security letter. Transparency reports and warrant canaries have an important role to play in the fight against illegal and unconstitutional national security process, including National Security Letters and other secret court processes. Wikipedia
Criteria to be listed on PrivacyTools.io
We're going over the requirements and criteria in order for a privacy tool or service to be listed. After reading our criteria carefully you can submit suggestions in our privacy forum.
Open-source: We love the open-source community. Software and services recommended on PrivacyTools.io are open-source unless marked Closed-Source. Since almost all of our entries are open-source we've decided not to point that out every single time. In some cases developers decide to relase the client source code but not the server or backend code. The tag Partially Open-Source is used for these entries.
Usability: Is the app or service user-friendly and easy to use? A modern and well-designed interface makes it easy to understand for users and therefore can be widely adopted. Generally, we don't recommend command-line interface (CLI) tools, but there can be exceptions if there is no other alternative. Affected entries are tagged with For Experts if they require a complicated setup or usage.
Active development: Were there any recent updates? A privacy tool or service that is still under active development is by far preferred over outdated projects. Exceptions: No alternatives are available or the tool is in a stable state with no known issues that could pose a security threat or leaks that could harm your online privacy.
Cross-platform: Tools and services that are available on several devices and operating systems are preferred to be listed here. We believe it's making the life of the end user easier and it helps to convince users to switch to a privacy-respecting alternative.
Publicly available: Invite only services, providers and tools are not getting listed. To convince users to switch to more privacy-respecting alternatives, the onboarding process should be as easy and fast as possible.
Jurisdiction: Ideally providers, their companies, and CEOs listed here are not based in a Five Eyes country: USA, Canada, UK, Australia, and New Zealand. We likely exclude Chinese or Russian services on a case-to-case basis over censorship concerns.
Privacy Guide: How is the Five Eyes Intelligence Alliance Related to Your Privacy? and Wikipedia: Lavabit: Suspension and gag order and the connection to Edward Snowden.
Security audits: Ideally the tool/service received an independent security audit from a reputable cybersecurity firm. This is optional since open-source developers often can't afford the high costs that are involved to hire a security auditor. Picocrypt (Screenshot) is a perfect example of a great privacy tool that struggles to receive funding for an audit.
Entries are marked with a Audited tag in our entries. Examples.
Remark: An audit is not 100% proof that software is safe and secure. Some flaws can be overlooked even by the best auditors. Valid only for a “snapshot” of the code. If new code is added, new vulnerabilities can be introduced.
Business model: Everything became a paid subscription in recent years. To counter this we try to find tools and services that you can use for free or offer a freemium version. We also prefer paid services that offer fair money back guarantee and free trials.
Sponsorships: Entries tagged with Sponsored can be exempted from the criteria. Generally, our sponsors follow the same ideology and fulfill most criteria by nature. More details about our project funding.
Example: NordPass ticks off most boxes of our criteria. It has been audited, is available cross-platform, under active development and it's easy to use. It has been tagged with Closed-Source since the company decided not to release the source code to the public.
About Privacy Tools, Tracking, Surveillance and Encryption
Many of the activities we carry out on the internet leave a trail of data that can be used to track our behaviour and access some personal information. Some of the activities that collect data include credit card transactions, GPS, phone records, browsing history, instant messaging, watching videos, and searching for goods. Unfortunately, there are many companies and individuals on the internet that are looking for ways to collect and exploit your personal data to their own benefit for issues like marketing, research, and customer segmentation. Others have malicious intentions with your data and may use it for phishing, accessing your banking information or hacking into your online accounts. Businesses have similar privacy issues. Malicious entities could be looking for ways to access customer information, steal trade secrets, stop networks and platforms such as e-commerce sites from operating and disrupt your operations.
Using Open-Source Software for Your Security
Open-source software is an application whose source code is available to modify. Therefore, businesses can use these tools to create security solutions that are tailored to their specific security needs. Some of the benefits of using open-source software include reliability as it is created by expert developers and sometimes volunteers. This creates an opportunity for other experts to check for flaws and correct them. In the end, you get software that is very resilient and highly reliable for crafting security solutions.
Such privacy tools are also flexible. Unlike proprietary software where the vendor sets limits and lock-ins that prevent some functions, these tools are highly flexible for use in various applications. Besides, users do not have to follow a rigid set of requirements when using the software.
If you have been browsing online, making transactions, and interacting with others online without any form of security, the chances are someone is collecting your data, tracking you, or looking for ways to manipulate your data. It is time to take control of your data by choosing the right privacy tools for your activities. There are various tools for your security, each offering specific qualities to deal with online challenges. Read on to determine the best privacy tools for individual use and for your business below.
Software recommended on PrivacyTools.io are all Open Source unless marked otherwise.
Differences between Privacy, Anonymity, and Security
"Privacy is the ability to seclude any information about themselves from access or scrutiny by other parties. This way, they are able to express themselves selectively and prevent others from accessing their information. Unfortunately, governments and marketing companies are always surveying the general population for various reasons, among which are security, marketing research, or even malicious intentions. Privacy tools help us to use internet resources without being surveyed or having our personal space intruded by other parties.
Anonymity is the situation where the identity of the person conducting the activity is unknown. It is part of privacy in that other parties cannot pin a name on the doer of the activities in question. For example, when you are browsing anonymously, the tracking companies cannot tell who is visiting their website. Therefore, they cannot follow up with marketing or any offers on account of your online behaviour.
Encryption is the technique of translating data from one form to another so that only people with the right decryption key can access and understand the data. Encryption prevents criminals from tapping and hacking data on transit for malicious reasons. Encryption is usually part of privacy. On the other hand, online security involves the use of tools to prevent issues such as intrusion of privacy, access and theft of personal and company data, phishing, and attacks on the online tools. These privacy tools help you enhance your anonymity when conducting activities online.
Many social media platforms have been using their proprietary encryption methods (called 'Standard Encryption') that they can decrypt to understand and read the messages you send out through them. This only leaves them with the ability to filter and customise the information sent out through their service. It, in turn, causes privacy issues as they are not only trying to protect themselves but also some of their customers' privacy.