Skip to content

Privacy Tools

If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.

VPN Providers Password Managers Email Providers Browser Extensions DNS Servers Email Aliasing Services Photo Organization Tools

If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our forum or our Matrix community!

For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page.

  • Ad-Free Recommendations
  • Frequent Updates
  • Trusted by Readers
  • Complete Editorial Independence
  • Open-Source Contributions
  • Trusted by Journalists

Threat Model Labels

You may find any of the following icons on some of the recommendation pages:

We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum thread!

Private Web Browsers

Tor Browser logo

Tor Browser (Desktop & Android) is the top choice if you need anonymity, as it provides you with access to the Tor network, a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.

Read Our Full Review

  • Mullvad Browser logo Mullvad Browser


    Mullvad Browser is a version of Tor Browser with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users.

  • Firefox logo Firefox


    Firefox is a great Chromium alternative which provides strong privacy settings such as Enhanced Tracking Protection, which can help block various types of tracking.

  • Brave logo Brave Browser


    Brave is a private-by-default browser based on Chromium, so it should feel familiar and have minimal website compatibility issues.

  • Mull logo Mull (Android)


    Mull is a Firefox-based browser for Android centered around privacy and removing proprietary components.

  • Safari logo Safari (iOS)


    We recommend Safari alongside a tracker-blocker like AdGuard on iOS, because all iOS browsers are forced to be based on Safari anyways. This reduces the number of parties you're required to trust.

Top 3 Private VPN Providers

VPNs do not provide anonymity

Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.

If you are looking for anonymity, you should use the Tor Browser.

If you're looking for added security, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

Learn more

  • Proton VPN logo Proton VPN


    • 112+ Countries
    • WireGuard Support
    • Cash Payments
    • Partial Port Forwarding Support
    • No IPv6

    Read Full Review

  • IVPN logo IVPN


    • 37+ Countries
    • WireGuard Support
    • Monero & Cash Payments
    • No Port Forwarding
    • No IPv6

    Read Full Review

  • Mullvad logo Mullvad


    • 45+ Countries
    • WireGuard Support
    • Monero & Cash Payments
    • No Port Forwarding
    • IPv6 Support

    Read Full Review

Top 3 Private Email Providers

  • Proton Mail logo Proton Mail


    Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Genève, Switzerland. The Proton Mail Free plan comes with 500MB of Mail storage, which you can increase up to 1GB for free.

    Read Full Review

  • Mailbox.org logo Mailbox.org


    Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2GB storage, which can be upgraded as needed.

    Read Full Review

  • Tuta logoTuta logo Tuta


    Tuta (formerly Tutanota) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1GB of storage.

    Read Full Review

Email Aliasing Services

Self-Hosting Email

Secure Email Clients

Learn more

More Private Service Providers

Cloud Storage

Learn more

Data Removal Services

Learn more

DNS

DNS Providers

We recommend a number of encrypted DNS servers based on a variety of criteria, such as Mullvad and Quad9 amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended.

Learn more

Encrypted DNS Proxies

Learn more

Self-hosted Solutions

Learn more

Financial Services

Payment Masking Services

Learn more

Online Gift Card Marketplaces

Learn more

Photo Management

Learn more

Search Engines

Learn more

Software

Calendar Sync

Learn more

Cryptocurrency

Learn more

Data and Metadata Redaction

Learn more

Document Collaboration

Learn more

Encryption Software

Operating System Disk Encryption

For encrypting your operating system drive, we typically recommend using whichever encryption tool your operating system provides, whether that is BitLocker on Windows, FileVault on macOS, or LUKS on Linux. These tools are included with the operating system and typically use hardware encryption elements such as a TPM that other full-disk encryption software like VeraCrypt do not. VeraCrypt is still suitable for non-operating system disks such as external drives, especially drives that may be accessed from multiple operating systems.

Learn more

Learn more

OpenPGP Clients

Learn more

File Sharing and Sync

Learn more

Frontends

Learn more

Language Tools

Learn more

Multi-Factor Authentication Tools

Note: Hardware security keys have been moved to their own category.

Learn more

News Aggregators

Learn more

Notebooks

Learn more

Office Suites

Learn more

Password Managers

Learn more

Pastebins

Learn more

Real-Time Communication

Learn more

Hardware

Security Keys

Learn more

Mobile Phones

Learn more

Operating Systems

Mobile

Custom Android Operating Systems

Learn more

Android Apps

Learn more

Ways to Obtain Android Apps

Learn more

Desktop/PC

Learn more

Router Firmware

Learn more

Advanced Tools

These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively.

Alternative Networks

Learn more

Device Integrity Verification

Learn more


Share this website and spread privacy knowledge

Copy this text to easily share Privacy Guides with your friends and family on any social network!