Compare commits

...

9 Commits

Author SHA1 Message Date
PrivOci 245c6dad9b
Merge 0168746df9 into 578ec6e679 2024-04-26 13:29:25 +02:00
pluja 578ec6e679
Merge pull request #435 from lamtrinhdev/main
Update wording.
2024-04-24 06:49:58 +02:00
LamTrinh.Dev e986589c2d
Update README.md
Update link section after update wording.
2024-04-19 14:38:18 +07:00
LamTrinh.Dev 1ac1a5ef2e
Update README.md
Update wording.
2024-04-19 14:36:59 +07:00
LamTrinh.Dev a7e567a1d1
Update README.md
Update wording.
2024-04-19 14:34:06 +07:00
LamTrinh.Dev 836e7eb06d
Update README.md
Update wording.
2024-04-18 07:37:13 +07:00
pluja bf2b69ee1b
Merge pull request #433 from lamtrinhdev/main
Update new name for Tutanota that changed to Tuta
2024-04-15 12:04:16 +02:00
LamTrinh.Dev cac66a4a63
Update README.md
Update new name for Tutanota that changed to Tuta
2024-04-15 16:10:04 +07:00
PrivOci 0168746df9
avoid Microsoft Authenticator 2023-07-27 21:21:54 +04:00
1 changed files with 7 additions and 6 deletions

View File

@ -12,9 +12,9 @@
<a href="https://github.com/pluja/awesome-privacy/discussions"> Discussions </a>
</p>
### ⚠️ [Important note](#privacy-vs-security-vs-anonimity)
### ⚠️ [Important note](#privacy-vs-security-vs-anonymity)
Anonymity, Privacy, and Security are often used interchangeably, but they actually represent distinct concepts. It is important to understand the differences between them. [Read more in this section below](#privacy-vs-security-vs-anonimity).
Anonymity, Privacy, and Security are often used interchangeably, but they actually represent distinct concepts. It is important to understand the differences between them. [Read more in this section below](#privacy-vs-security-vs-anonymity).
The primary focus of this list is to provide alternatives that prioritize privacy. These alternatives give you control over your data and do not collect or sell it.
@ -120,6 +120,7 @@ The primary focus of this list is to provide alternatives that prioritize privac
<img width="16" src="misc/forbidden.png"> </img> Avoid using apps that won't let you export your keys **easily**.
- Authy
- Google Authenticator [![](https://shields.tosdr.org/en_217.svg)](https://tosdr.org/en/service/217)
- Microsoft Authenticator
<img width="16" src="misc/check.png"> </img> Instead use
- <img width="16" src="misc/android.png"> [Aegis](https://getaegis.app/) - A free, secure and open source app for Android to manage your 2-step verification tokens. Supports variety of imports from other apps (Google Authenticator, Authy etc.), vault encryption and exporting keys (plaintext or encrypted).
@ -646,7 +647,7 @@ No servers involved. Everything goes directly from one peer to the other peer. N
### Third-Party owned
- [Forward Email](https://forwardemail.net) - the 100% open-source and privacy-focused email service.
- [ProtonMail](https://protonmail.com/) - Secure Email. Based in Switzerland. [Read this article over Climate activist arrest](https://protonmail.com/blog/climate-activist-arrest/).
- [Tutanota](https://tutanota.com/) - Secure email for everybody. Open Source.
- [Tuta](https://tuta.com/) - Secure email for everybody. Open Source.
- [Riseup](https://riseup.net/en/about-us) - Online communication tools for people and groups working on liberatory social change.
- [Mailfence](https://mailfence.com) - Secure and private email.
@ -1064,7 +1065,7 @@ This section is dedicated to some tools that may help users analyze the privacy
> **NOTE: About alternative frontends and clients**
>
> Alternative frontends are good to protect your individual privacy. You can still consume the contents of privative and privacy-harmful services with protection over your privacy and some anonimity. Even using most these alternative frontends, still, the privative services will receive requests about the content you are consuming (even not knowing it is you). This sitll harms the collective privacy and adds data to their algorithms in some ways. Only the alternative frontends (or clients) that act as a proxy will hide your real IP from the content provider.
> Alternative frontends are good to protect your individual privacy. You can still consume the contents of privative and privacy-harmful services with protection over your privacy and some anonymity. Even using most these alternative frontends, still, the privative services will receive requests about the content you are consuming (even not knowing it is you). This sitll harms the collective privacy and adds data to their algorithms in some ways. Only the alternative frontends (or clients) that act as a proxy will hide your real IP from the content provider.
>
> You can use these browser extensions and apps to automatically redirect any links to privacy-respecting alternative frontends:
> - [Farside](https://github.com/benbusby/farside) - A smart redirecting gateway for various frontend services.
@ -1409,7 +1410,7 @@ Please read about what the addon does before installing. If you don't understand
- [WebView Switcher](https://github.com/Magisk-Modules-Repo/bromitewebview) - A tool for installing Bromite WebView on android 10
## Privacy vs Security vs Anonimity
## Privacy vs Security vs Anonymity
Anonymity, Privacy, and Security are often used interchangeably, but they actually represent distinct concepts. It is important to understand the differences between them.
@ -1421,7 +1422,7 @@ Anonymity, Privacy, and Security are often used interchangeably, but they actual
It is important to note that privacy and security are not necessarily interdependent. For instance, Google systems are secure and unlikely to be hacked, but Google still has access to your personal data and makes use of it.
Privacy and anonimity are also not necessarily linked, services like Signal offer high levels of privacy since they do not collect any data about what you say, who you talk to or how you use the app, but they may not be anonymous since you still need to register using your phone number (which is in many cases linked to your identity).
Privacy and anonymity are also not necessarily linked, services like Signal offer high levels of privacy since they do not collect any data about what you say, who you talk to or how you use the app, but they may not be anonymous since you still need to register using your phone number (which is in many cases linked to your identity).
Finally, there are services that may offer all three: anonymity, privacy, and security. The primary focus of this list is to provide alternatives that prioritize privacy. These alternatives give you control over your data and do not collect or sell it.