Privacy Freeware: Difference between revisions
m Changed Windows 10 to Windows 11 reference |
|||
(45 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
This page contains external links to free programs that will help you protect your privacy, some of the listed tools might show you advertisements or a nagging screen inviting the user to upgrade to a paid for version, they might also make it difficult for you to find the free version on their website. | This page contains external links to free programs that will help you protect your privacy, some of the listed tools might show you advertisements or a nagging screen inviting the user to upgrade to a paid for version, they might also make it difficult for you to find the free version on their website. | ||
=== | === Secure Email === | ||
Most privacy email services charge for their services, the free privacy email services that exist, are provided with the hope that some of their free customers will upgrade to paid accounts and with that money they finance the free service for other users. Usually free accounts are given with limited resources to encourage them to upgrade to a paid account, but it might still be enough for light email users. | |||
One way to obtain an anonymous email account is to hide your computer IP using [[Tor]] to register with any free email provider but many free webmail providers ban Tor proxy IPs and they ask for a backup email account, the method will fail many times. | |||
'''Warning:''' If you use the Tor Browser any website requiring you to enable Javascript presents a serious security risk. Javascript code has been used by law enforcement agencies (or LEO="Law Enforcement Officers") to defeat the security of Tor -- LEO may even have the capability to ''inject'' Javascript into websites without the knowledge of the website administrator if they control the server. | |||
* [https://tuta.com Tuta] - Free German based encrypted email service that reportedly keeps no logs. | |||
* [https://proton.me/mail ProtonMail] - Encrypted email service in Switzerland that does not keep logs. | |||
'''Note:''' ProtonMail recovery email account has been used in the past by law enforcement to track down users and it could be used by malicious actors too. You should not enter any traceable recovery email address in extreme privacy situations.<ref>{{cite web|title=Proton Mail recovery email leads to arrest of Catalan activist|url=https://www.techradar.com/computing/cyber-security/proton-mail-hands-data-to-police-again-is-it-still-safe-for-activists}}</ref> | |||
=== VPN Providers === | === VPN Providers === | ||
Line 23: | Line 22: | ||
* [https://protonvpn.com/ ProtonVPN] - Company in Switzerland, no bandwidth limit, company claims they do not keep logs, not even for free users. | * [https://protonvpn.com/ ProtonVPN] - Company in Switzerland, no bandwidth limit, company claims they do not keep logs, not even for free users. | ||
* [https:// | * [https://windscribe.com/ WindScribe] - Company is based in Canada, free version has a bandwidth limit. They claim they do not keep logs. | ||
* [https://www.expressvpn.com ExpressVPN] - Company that is based in British Virgin Islands. They claim not to keep logs. | |||
* [https://nordvpn.com/about-us/ NordVPN] - Company that has bases in UK, Netherlands, Poland, Germany, Lithuania, Switzerland, and Panama. The parent company is based in Netherlands. Use this VPN with caution due to the 14 eyes security alliance and other friendly countries towards this alliance. | |||
=== Encryption Software === | |||
To quickly send encrypted email files or messages you can use Winrar or 7-Zip, the protection they offer is strong enough to stop even corrupt law enforcement agents, but to be sure that if your computer is ever lost or stolen no data will be recovered, you will need to use full disk encryption, file [[encryption]] alone can not protect you from temporary files and Internet browsing history leaking into your hard drive, the only way to protect is by fully encrypting your operating system. | |||
* [https://www.veracrypt.jp/ Veracrypt] - Free open source encryption software to fully encrypt your hard drive. Available for Windows, Linux and Mac computers, but the full disk encryption option only works in Windows. In Linux and Mac Veracrypt can only be used to create encrypted virtual disks. | |||
=== | === Data Wiping === | ||
Documents, images and videos you delete can be easily recovered with specialist software. The only sure way to get rid of a file for ever is to overwrite it with other data on top, the following programs will do that for you. | |||
* [https://www.bleachbit.org/ BleachBit] - Internet browsing and temporary files data wiping software | |||
* [http://sourceforge.net/projects/eraser/ Eraser] - File and hard drive empty sectors wiper | |||
* [http://privazer.com/ Privazer] - It securely wipes temporary files and hard drive free space | |||
* [https://www.ccleaner.com/ CCleaner] - Program to securely erase history browsing, cookies, temporary files and other personal data stored in your hard drive. | |||
=== Password Manager === | |||
You should never reuse usernames and passwords if you care about online security and privacy. If you reuse in a real life self-help or entertainment discussion board the same username or email address being used for boylover activism, somebody could make the connection. A search engine query can locate all places on the Internet where that username is being employed. Another factor is that if you reuse the same password in multiple online accounts and one of those accounts is hacked, the attacker will have access to all accounts you own on the Internet. Bots can automatically attempt multiple usernames and passwords taken from a hacked database, by choosing a unique username and password for each online account you have, you will limit the damage in case of a hacking incident. | |||
Passwords managers are needed to be able to remember dozens or hundreds of unique usernames and passwords for online accounts. There are two types of password managers: | |||
An offline password manager database is not accessible from the Internet and you don´t have to trust third parties with your data, hence security is higher. The disadvantage is that it will be harder to access the password manager from other devices without physically moving the file and you might have compatibility issues on mobile devices. | |||
* [https://keepassxc.org/ KeePassXC Password Manager] - Offline light weight free open source password manager that works in Windows, Mac and Linux. | |||
Cloud based password managers are less secure than offline password managers, if the service is on the cloud you have to trust that the company holding those passwords is really as secure as they say they are and they normally charge a fee for their services. The advantage is that being on the cloud has the convenience of not having to store anything on your hard drive and it is accessible across multiple devices like smartphones and tablets. | |||
* [https:// | * [https://bitwarden.com/ BitWarden] - Online password manager that can be sync across multiple devices. | ||
=== | === Windows Privacy Software === | ||
Windows is an extremely privacy invasive operating system, if you are serious about privacy move to Linux, if for whatever reason you can´t here are some privacy tips for Windows to make Microsoft spying on you harder but be aware that Windows can not be made totally private, with each new release and update Microsoft keeps moving the base to spy more and log users. | |||
The most important thing you should do in Windows 11 is to never use a Microsoft account to log into your operating system because this will send and link your private data to Microsoft cloud servers, there are a few work arounds to be able to use Windows 11 without an account but unfortunately Microsoft keeps changing the rules with each new update, because a work around might be out of date by the time you read this, it is best that you use a search engine with fresh information to locate the latest tricks to install Windows 11 without an account. Even when you are logged in Windows without any Microsoft account there are features like OneDrive, Microsoft cloud storage services, that are enabled by default, you could easily upload a personal picture or document to Onedrive by accident without being warned that Microsoft scans all files you upload to OneDrive to detect illegal content, something that invades personal privacy, you should disable OneDrive straight away, privacy conscious people should avoid Microsoft and Google products as much as possible. | |||
* [https://www.oo-software.com/en/shutup10 O&O ShutUp10] - Free antispy tool for Windows 10 and 11 to quickly disable advertising IDs, OneDrive and automatic sending of crash reports to Microsoft, using a slider you can choose what services you are ok with and which ones must be disabled. | |||
=== Free Antivirus === | |||
Windows 11 comes with Windows Defender, a fully featured security solution that scans your computer for malware and viruses, it is enabled by default but if you install new antivirus software, Windows will disable Windows Defender and use your preferred antivirus solution instead. Most online reviews point out at the high quality of Windows Defender, the main reason why somebody might want to use a different product it is lack of trust in Microsoft products, or somebody looking for advanced control over their antivirus software. Windows Defender has few customisation options. | |||
* [https:// | * [https://www.avast.com/en-eu/free-antivirus-download Avast Free Antivirus] - During installation you might be asked if you want additional software, look out and uncheck boxes. | ||
* [https://www.avira.com/en/free-antivirus-windows Avira Antivirus] - Free version will display nagging to try to get you to upgrade to their paid version. | |||
=== | === Operating System === | ||
Macintosh operating systems and specially Windows, have all kind of tracking mechanisms that can be misused and besides being closed source, they are not focused in privacy. If you are really serious about security you will be better off with a Linux or BSD open source operating system that has been build with security and privacy in mind. | |||
* [https://tails.net/ The Amnesic Incognito Live System - Tails] - Debian based operating system that can be installed in your computer, a thumb drive or run from a live DVD, this is the best choice for beginners. Tails routes your Internet data through the Tor network, with the firewall configured to make it impossible to leak your real IP. It will circumvent Internet censorship and it will leave no trace behind unless you ask it explicitly. Tails comes with a messenger, text editor, video player and many other utilities. | |||
* [ | * [https://www.qubes-os.org/ Qubes Operating System] - Linux operating system using virtualisation to isolate every single application you have, making it is impossible for malware to spread from your Internet browser or text editor to the operating system. Quebes does not come with Tor out of the box but you can easily install Whonix, a virtual operating system similar to Tails, using a template provided by Qubes and enjoy anonymous Internet access with one of the most secure set ups possible. | ||
=== Other === | === Other === | ||
* [https:// | * [https://www.torproject.org/ Tor Project] - Browser to access the Internet anonymously. | ||
* [https://www.whonix.org/ Whonix] - Very similar to Tails but it runs inside a virtual box. | * [https://www.whonix.org/ Whonix] - Very similar to Tails but it runs inside a virtual box. You should be advanced in computer skills to use it. | ||
* [https://geti2p.net/ GetI2P] - Anonymous network similar to Tor that can be used for email and Internet browsing. | * [https://geti2p.net/ GetI2P] - Anonymous network similar to Tor that can be used for email and Internet browsing. | ||
==See also== | == See also == | ||
* [[Internet security tutorial]] | * [[Internet security tutorial]] | ||
* [[Encryption]] | * [[Encryption]] | ||
* [[Email_security|Email Security]] | * [[Email_security|Email Security]] | ||
== References == | |||
{{Reflist}} | |||
[[Category:Technology]] | [[Category:Technology]] |
Latest revision as of 13:31, 4 June 2025
This page contains external links to free programs that will help you protect your privacy, some of the listed tools might show you advertisements or a nagging screen inviting the user to upgrade to a paid for version, they might also make it difficult for you to find the free version on their website.
Secure Email
Most privacy email services charge for their services, the free privacy email services that exist, are provided with the hope that some of their free customers will upgrade to paid accounts and with that money they finance the free service for other users. Usually free accounts are given with limited resources to encourage them to upgrade to a paid account, but it might still be enough for light email users.
One way to obtain an anonymous email account is to hide your computer IP using Tor to register with any free email provider but many free webmail providers ban Tor proxy IPs and they ask for a backup email account, the method will fail many times.
Warning: If you use the Tor Browser any website requiring you to enable Javascript presents a serious security risk. Javascript code has been used by law enforcement agencies (or LEO="Law Enforcement Officers") to defeat the security of Tor -- LEO may even have the capability to inject Javascript into websites without the knowledge of the website administrator if they control the server.
- Tuta - Free German based encrypted email service that reportedly keeps no logs.
- ProtonMail - Encrypted email service in Switzerland that does not keep logs.
Note: ProtonMail recovery email account has been used in the past by law enforcement to track down users and it could be used by malicious actors too. You should not enter any traceable recovery email address in extreme privacy situations.[1]
VPN Providers
Free VPN services finance their activities displaying advertisements while you surf, or with a freemium model where they convert a part of their free users into paying ones to finance the free VPN. A few other VPN services get government or private funding to help people living in oppressive regimes to bypass censorship, the funding allows them to provide a free service focused towards bypassing firewalls but keeping logs tracking the originating IP.
When choosing a VPN pick a company that will not keep any logs and is located in a jurisdiction where they have no obligation to keep them. Remember that you have no way to verify if the VPN company claims are true or not, when extreme security measures are necessary, browse the Internet with Tor instead of a VPN.
- ProtonVPN - Company in Switzerland, no bandwidth limit, company claims they do not keep logs, not even for free users.
- WindScribe - Company is based in Canada, free version has a bandwidth limit. They claim they do not keep logs.
- ExpressVPN - Company that is based in British Virgin Islands. They claim not to keep logs.
- NordVPN - Company that has bases in UK, Netherlands, Poland, Germany, Lithuania, Switzerland, and Panama. The parent company is based in Netherlands. Use this VPN with caution due to the 14 eyes security alliance and other friendly countries towards this alliance.
Encryption Software
To quickly send encrypted email files or messages you can use Winrar or 7-Zip, the protection they offer is strong enough to stop even corrupt law enforcement agents, but to be sure that if your computer is ever lost or stolen no data will be recovered, you will need to use full disk encryption, file encryption alone can not protect you from temporary files and Internet browsing history leaking into your hard drive, the only way to protect is by fully encrypting your operating system.
- Veracrypt - Free open source encryption software to fully encrypt your hard drive. Available for Windows, Linux and Mac computers, but the full disk encryption option only works in Windows. In Linux and Mac Veracrypt can only be used to create encrypted virtual disks.
Data Wiping
Documents, images and videos you delete can be easily recovered with specialist software. The only sure way to get rid of a file for ever is to overwrite it with other data on top, the following programs will do that for you.
- BleachBit - Internet browsing and temporary files data wiping software
- Eraser - File and hard drive empty sectors wiper
- Privazer - It securely wipes temporary files and hard drive free space
- CCleaner - Program to securely erase history browsing, cookies, temporary files and other personal data stored in your hard drive.
Password Manager
You should never reuse usernames and passwords if you care about online security and privacy. If you reuse in a real life self-help or entertainment discussion board the same username or email address being used for boylover activism, somebody could make the connection. A search engine query can locate all places on the Internet where that username is being employed. Another factor is that if you reuse the same password in multiple online accounts and one of those accounts is hacked, the attacker will have access to all accounts you own on the Internet. Bots can automatically attempt multiple usernames and passwords taken from a hacked database, by choosing a unique username and password for each online account you have, you will limit the damage in case of a hacking incident.
Passwords managers are needed to be able to remember dozens or hundreds of unique usernames and passwords for online accounts. There are two types of password managers:
An offline password manager database is not accessible from the Internet and you don´t have to trust third parties with your data, hence security is higher. The disadvantage is that it will be harder to access the password manager from other devices without physically moving the file and you might have compatibility issues on mobile devices.
- KeePassXC Password Manager - Offline light weight free open source password manager that works in Windows, Mac and Linux.
Cloud based password managers are less secure than offline password managers, if the service is on the cloud you have to trust that the company holding those passwords is really as secure as they say they are and they normally charge a fee for their services. The advantage is that being on the cloud has the convenience of not having to store anything on your hard drive and it is accessible across multiple devices like smartphones and tablets.
- BitWarden - Online password manager that can be sync across multiple devices.
Windows Privacy Software
Windows is an extremely privacy invasive operating system, if you are serious about privacy move to Linux, if for whatever reason you can´t here are some privacy tips for Windows to make Microsoft spying on you harder but be aware that Windows can not be made totally private, with each new release and update Microsoft keeps moving the base to spy more and log users.
The most important thing you should do in Windows 11 is to never use a Microsoft account to log into your operating system because this will send and link your private data to Microsoft cloud servers, there are a few work arounds to be able to use Windows 11 without an account but unfortunately Microsoft keeps changing the rules with each new update, because a work around might be out of date by the time you read this, it is best that you use a search engine with fresh information to locate the latest tricks to install Windows 11 without an account. Even when you are logged in Windows without any Microsoft account there are features like OneDrive, Microsoft cloud storage services, that are enabled by default, you could easily upload a personal picture or document to Onedrive by accident without being warned that Microsoft scans all files you upload to OneDrive to detect illegal content, something that invades personal privacy, you should disable OneDrive straight away, privacy conscious people should avoid Microsoft and Google products as much as possible.
- O&O ShutUp10 - Free antispy tool for Windows 10 and 11 to quickly disable advertising IDs, OneDrive and automatic sending of crash reports to Microsoft, using a slider you can choose what services you are ok with and which ones must be disabled.
Free Antivirus
Windows 11 comes with Windows Defender, a fully featured security solution that scans your computer for malware and viruses, it is enabled by default but if you install new antivirus software, Windows will disable Windows Defender and use your preferred antivirus solution instead. Most online reviews point out at the high quality of Windows Defender, the main reason why somebody might want to use a different product it is lack of trust in Microsoft products, or somebody looking for advanced control over their antivirus software. Windows Defender has few customisation options.
- Avast Free Antivirus - During installation you might be asked if you want additional software, look out and uncheck boxes.
- Avira Antivirus - Free version will display nagging to try to get you to upgrade to their paid version.
Operating System
Macintosh operating systems and specially Windows, have all kind of tracking mechanisms that can be misused and besides being closed source, they are not focused in privacy. If you are really serious about security you will be better off with a Linux or BSD open source operating system that has been build with security and privacy in mind.
- The Amnesic Incognito Live System - Tails - Debian based operating system that can be installed in your computer, a thumb drive or run from a live DVD, this is the best choice for beginners. Tails routes your Internet data through the Tor network, with the firewall configured to make it impossible to leak your real IP. It will circumvent Internet censorship and it will leave no trace behind unless you ask it explicitly. Tails comes with a messenger, text editor, video player and many other utilities.
- Qubes Operating System - Linux operating system using virtualisation to isolate every single application you have, making it is impossible for malware to spread from your Internet browser or text editor to the operating system. Quebes does not come with Tor out of the box but you can easily install Whonix, a virtual operating system similar to Tails, using a template provided by Qubes and enjoy anonymous Internet access with one of the most secure set ups possible.
Other
- Tor Project - Browser to access the Internet anonymously.
- Whonix - Very similar to Tails but it runs inside a virtual box. You should be advanced in computer skills to use it.
- GetI2P - Anonymous network similar to Tor that can be used for email and Internet browsing.