Security of Data in Transit

Resources for securing the data you exchange with others.

Last updated: APRIL 2019


BROWSING

DuckDuckGo

WHAT: Privacy-enhancing search engine and browser for mobile and desktop.

USEFUL FOR: Making private searches and browsing online. Good alternative to Google, Bink and other commercial search engines that harvest user data.

PLATFORM: iOS, Android, website and cross-platform browser add-on.

COST: Free.

DIFFICULTY: Easy.

LIMITS: Using a privacy-enhancing search engine will NOT make you anonymous as it does not protect you against tracking by your internet service provider or some governments.

LEARN MORE: Security Planner’s Advanced Anonymity Guide provides some useful advice on ways to enhance your anonymity online.

Firefox Multi-Account Containers

WHAT: A Firefox extension.

USEFUL FOR: Having greater control over your browsing habit. The extension separates cookies by “container”, allowing you to use the web with multiple identities or accounts simultaneously.

PLATFORM: Works on desktop, across platforms.

COST: Free

DIFFICULTY: Easy

Google Analytics Opt-out

WHAT: Browser extension.

USEFUL FOR: To prevent your data from being used by Google Analytics.

PLATFORM: Works in desktop. Available for Google Chrome, Mozilla Firefox, Apple Safari and Opera.

COST: Free.

DIFFICULTY: Easy.

HTTPS Everywhere

WHAT: Browser extension.

USEFUL FOR: Making sure major websites encrypt your communications, especially when you input sensitive data such as your account password.

PLATFORM: Works in desktop and mobile. Available for Google Chrome, Mozilla Firefox, Opera, and Android.

COST: Free

DIFFICULTY: Easy

Orbot and Orfox

WHAT: Mobile apps.

USEFUL FOR: Channelling your Android mobile’s entire internet connection through the Tor network. Tor provides greater anonymity online.

PLATFORM: Android.

COST: Free.

DIFFICULTY: Medium.

LIMITS: May slow down your internet connection.

LEARN MORE: What’s the Tor network and how it works.

Privacy Badger

WHAT: Browser add-on.

USEFUL FOR: Blocking invisible trackers.

PLATFORM: Available for desktop and mobile: Google Chrome, Mozilla Firefox, Opera and Android.

COST: Free.

DIFFICULTY: Easy.

Site Isolation

WHAT: A Chrome browser setting that protects against known security bugs in browsers. It forces Chrome to load each website in its own process. This stops a site from stealing your data from another website.

USEFUL FOR: Protecting your browsing activity from snooping by websites such as Facebook.

PLATFORM: Works on Chrome.

COST: Free

DIFFICULTY: Medium

LIMITS: Turning on site isolation may slightly slow down your Chrome browser. It may also cause some websites not to function properly.

LEARN MORE about site isolation.

StartPage

WHAT: Privacy-enhancing search engine.

USEFUL FOR: Making private searches and browsing online. Good alternative to Google, Bink and other commercial search engines that harvest user data.

PLATFORM: Website. Cross-platform.

COST: Free

DIFFICULTY: Easy

LIMITS: Using a privacy-enhancing search engine will NOT make you anonymous as it does not protect you against tracking by your internet service provider or some governments.

LEARN MORE: Security Planner’s Advanced Anonymity Guide provides some useful advice on ways to enhance your anonymity online.

Tor Browser

WHAT: Browser.

USEFUL FOR: Browsing the Internet anonymously and protecting your online activity.

PLATFORM: Desktop. Cross-platform.

COST: Free.

DIFFICULTY: Medium.

LIMITS: Use Tor with caution. Entering personal data into a website will reveal your identity even when you are using Tor. Tor will not protect you either against malicious websites or malware.

LEARN MORE about the Tor Project here. Get advice on how to enhance your anonymity online by consulting the Security Planner’s Advanced Anonymity Guide.


CIRCUMVENTION AND OBFUSCATION SERVICES

VIRTUAL PRIVATE NETWORKS

WHAT: A Virtual Private Network, or VPN, is a program that channels your device’s internet connection through an encrypted “tunnel” which helps protect your privacy and security. A VPN can also allow you to access blocked content on your network.

USEFUL FOR: Protecting the privacy and security of your internet activity. Accessing blocked or censored content online.

RECOMMENDED VPN SERVICE PROVIDERS

Choose carefully, depending on your needs, which service offers a better balance of privacy and anonymity (open source, anonymous sign in, no metadata collection, safe jurisdiction), ease of use and availability across platforms.

Provider Open source Metadata collection Anonymous sign in Jurisdiction Paid Ease of use Platform
Mullvad Yes No Yes Sweden Yes Good Cross-platform
ProtonVPN No No Yes Switzerland Freemium Good Cross-platform
Psiphon Yes No Yes - Free Good iOS, Android, Windows

LIMITS: A VPN does NOT make you entirely anonymous. The services you sign on to on the internet can still figure out who you are. The use of a VPN does NOT eliminate the need for making sure that other security measures are in place to protect your devices and accounts.

LEARN MORE: Security Planner’s Advanced Anonymity Guide provides some useful advice on ways to enhance your anonymity online.


COLLABORATING AND TEAMWORK

Hypothes.is

WHAT: Open source annotation plug-in.

USEFUL FOR: Annotate the web with collaborators.

PLATFORM: Add-on for Chrome and other browsers.

COST: Free.

DIFFICULTY: Easy.

LIMITS: Does not work on all web pages.

LEARN MORE: How it works.

Riseup Pad

WHAT: An etherpad (ephemeral, open-source, web-based collaborative real-time text editor) hosted by Riseup.

USEFUL FOR: Real-time group collaboration of text documents.

PLATFORM: Works on all platforms.

COST: Free.

DIFFICULTY: Easy.

LIMITS: Accessing a Riseup Pad does not protect from snooping by internet service providers or governments. For added security, it is recommended to access the Riseup Pad via a VPN connection such as the Riseup VPN or a “Tor hidden service”, a unique, anonymous link only accessible via the Tor Browser.


EMAILING

Hawkpost

WHAT: Secure online form.

USEFUL FOR: Getting encrypted data (email or files) from people who know nothing or little about PGP encryption. You still need, as the recepient, to open PGP encrypted files meant for your eyes only.

PLATFORM: Works on any browser, on a desktop or mobile.

COST: Free.

DIFFICULTY: Easy.

LIMITS: As a recepient, you will have to create a “box” for receiving encrypted data. You are therefore required to be knowledgeable of PGP encryption.

LEARN MORE: How PGP encryption works.

ProtonMail

WHAT: Webmail service provider.

USEFUL FOR: Using an open source and secure alternative to popular webmail service providers such as Gmail. Protonmail uses end-end-encryption and open source cryptography and does not have access to users data.

PLATFORM: Works on mobile and desktop on all platforms.

COST: Freemium.

DIFFICULTY: Easy.

LIMITS: The free plan is limited to 500MB storage and 150 messages per day.

LEARN MORE: ProtonMail offers additional security features such as address verification and PGP integration. Learn more about how to use ProtonMail’s security features here.

ProtonMail + Tor

WHAT: A way to run ProtonMai over the Tor network.

USEFUL FOR: Adding an extra layer of anonymity to your ProtonMail use.

PLATFORM: Works on desktop through the Tor browser. (Users must have the Tor browser already installed.)

COST: Free.

DIFFICULTY: Medium.

LEARN MORE about ProtonMail over Tor setup here.


MESSAGING

When choosing a messaging tool, make sure they meet your security and privacy requirements. Access Now recommends looking at the following features in any messaging tool:

The following table compiled by Access Now offers an overview of recommended messaging tools based on the requirements listed above:

Tool Open source Default E2E Group chat Encryption protocol Anonymous sign-up Email sign-up Phone sign-up Self-destructing messages Remote message deletion Metadata Collection Paid Jurisdiction Self-hosted Usability
Signal Yes Yes Yes Signal No No Yes Yes No No No USA No Good
Wire Yes Yes Yes Proteus No Yes Yes Yes Yes Yes Freemium Switzerland No Good
Riot Yes Yes Yes Matrix Yes Yes Yes No No Yes No - Yes Medium
Mattermost Yes No Yes No encryption No Yes No No Yes No No - Yes Good
Threema Only encryption protocol Yes Yes NaCl Yes No No No No No No Switzerland No Good
WhatsApp Only encryption protocol Yes Yes Signal No No Yes Yes Yes Yes No USA No Good
Wickr Me Only encryption protocol Yes Yes Wickr Yes No No Yes Yes No No USA No Good

LEARN MORE: Secure Messaging Apps Comparison.


SENDING LARGE FILES

Firefox Send

WHAT: Open source, end-to-end encrypted file sharing website developed by Mozilla Firefox.

USEFUL FOR: Anonymous sharing of large files with end-to-end encryption via a link that automatically expires. You can choose how long you want your files to remain available online and possibly protect the link with a password.

PLATFORM: Cross platform.

COST: Free.

DIFFICULTY: Easy.

LIMTS: Upload is limited to 2.5 GB and files cannot be stored longer than a week.

LEARN MORE: Send Privacy Notice.

Onion Share

WHAT: Lightweight, open source file sharing program.

USEFUL FOR: Anonymous sharing of large files with colleagues via the Tor network. The program generates a link that you then share securely with recipients. They then proceed to collect the file by opening the link via the Tor browser.

PLATFORM: Compatible for Windows, MacOS and various versions of Linux.

COST: Free.

DIFFICULTY: Medium.

LEARN MORE about the Tor network.

Riseup Share

WHAT: Free file sharing service provided by Riseup, a volunteer-run collective.

USEFUL FOR: Anonymous sharing of large files with colleagues via an end-to-end encrypted channel.

PLATFORM: Works on all browsers.

COST: Free.

DIFFICULTY: Easy.

LIMITS: Upload is limited to 50 mb and files are stored no longer than a week.

LEARN MORE about Riseup.


VIDEO-CONFERENCING

Jitsi Meet

WHAT: A program for conference calls.

USEFUL FOR: Safe alternative to Skype. Allows conducting secure online calls without the need for installing complicated software. Jitsi Meet can be used directly in a browser. It can also be used as a stand-alone mobile application. Users can share a live screen view of their desktop and easily invite new participants by simply sharing a link.

Jitsi is end-to-end encrypted and open source.

PLATFORM: Works on iPhone, Android and desktop, across platforms.

COST: Free

DIFFICULTY: Easy

LEARN MORE: How Jitsi Meet works.