How to maintain freedom and privacy using technology and Internet

 
 

Index

Aphorisms

What are the threats to our freedom and privacy?

Some simple rules to remember in order not to be overwhelmed

The digital sovereignty

How live without Google (and GAFA (GAFAM e FAANG))

How to live without BigG's services and applications

Some of the shames of the high-tech giants

Privacy and respect for the freedom of users by information and communication services and applications

Browser

Search engine

Advertising filter additional components and applications

Communication applications (messaging and VoIP)

Video conferencing applications

Email services and applications

Multi user email applications

Cloud storage and data sharing services and applications

File sharing services and applications

Secure connection services (VPN, TOR, I2P)

Resolver services DNS

Map services and applications

Translator services and applications

Calendar services and applications

Contacts services and applications

Digital notepad services and applications

Virtual assistant services and applications

Social network services and applications

Video content services and applications

Office services and applications

Antivirus or antimalware services and applications

Authenticator services and applications 2FA

Password management services and applications

Android apps catalogue

Mobile operating systems

Operating systems

Smartphone

Bibliography:

License:

 

 

Aphorisms

“Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say. It's a deeply anti-social principal because rights are not just individual - they're collective. The fact that you don't care about this or that freedom today doesn't mean you can't care about it tomorrow. What today may not have value for you, tomorrow may have value for an entire population, an entire people, an entire way of life. And if you don't stand up for it, then who will?” Edward Snowden, 2015

“When you say, ‘I have nothing to hide,’ you’re saying, ‘I don’t care about this right.’ You’re saying, ‘I don’t have this right, because I’ve got to the point where I have to justify it.’ The way rights work is, the government has to justify its intrusion into your rights. Edward Snowden, 2015

A person's true value is not measured by the values he claims to uphold, but by what he is willing to do to protect them. If you don't hold true to the values you believe in, you probably don't believe in them all the way.” Edward Snowden, 2015

“Privacy is not for sale, and human rights should not be compromised out of fear or greed.” Pavel Durov, 2018

“Every one of us is going to die eventually, but we as a species will stick around for a while. That’s why I think accumulating money, fame or power is irrelevant. Serving humanity is the only thing that really matters in the long run.” Pavel Durov, 2018

Surveillance is the business model of the Internet.Bruce Schneier, 2014

Too many wrongly characterize the debate as security versus privacy. The real choice is liberty versus control.Bruce Schneier, 2009

“The real psychological truth is this: if you’ve got nothing to hide, you are nothing.” Shoshana Zuboff, 2014

Will we be the masters of information, or will we be its slaves? If the digital future is to be our home, then it is we who must make it so.” Shoshana Zuboff, 2014

“In a world where software influences virtually every single aspect of our lives, Free Software is a precondition for a free society.” Reinhard Müller, 2019

 

“Anytime someone puts a lock on something you own, against your wishes, and doesn't give you the key, they're not doing it for your benefit.” Doctorow's Law, 2009

“It's the actions that matter. Our thoughts, good as they may be, are false pearls until they are transformed into actions. Be the change you want to see in the world.” Mahatma Gandhi, unknown

"The Web is designed to be universal: to include everything and everyone." Tim Berners-Lee, 2007

"We need to start talking about the right to access the Web and the right not to be spied on. The Internet must remain free, open and neutral." Tim Berners-Lee, 2011

“If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.” Cardinal Richelieu, 1641

“If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place, but if you really need that kind of privacy, the reality is that search engines including Google do retain this information for some time, and it's important, for example that we are all subject in the United States to the Patriot Act. It is possible that that information could be made available to the authorities.” Eric Schmidt, 2009

The technology will be so good it will be very hard for people to watch or consume something that has not in some sense been tailored for them.” Eric Schmidt, 2010

“A squirrel dying in front of your house maybe more relevant to your interests right know than people dying in Africa.” Mark Zuckerberg, 2011

“It’s the gradual, slight, imperceptible change in your own behaviour and perception that is the product...That's the only thing there is for them to make money from. Changing what you do, how you think, who you are.” Jaron Lanier, 2020

“A world constructed from the familiar is a world in which there's nothing to learn...(since there is) invisible autopropaganda, indoctrinating us with our own ideas.” Eli Pariser, 2011

Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.Benjamin Franklin, 1755

 
 
Figure The surveillance capitalism: "Amazon (Facebook) spies on 100 million devices, Google (Microsoft) spies on 400 million, NSA only for amateurs..."
 
 
 

What are the threats to our freedom and privacy?

Modern society is called the information society because technology and the Internet are used pervasively. These means are used for the dissemination of information and content for any purpose (popular, recreational, commercial, etc.). The most important thing is to be aware that our freedom as people is at risk in ways that are sometimes difficult to understand.

Government agencies continuously spy on us in the name of security through global surveillance programs (PRISM, Echelon, XKeyscore, Vault 7, Tempora, Cambdrige Analytica, Net Neutrality, TED with subtitles, TED with subtitles).

Service providers, in exchange for more or less useful free services, consider us as products for their own interests. The forms of abuse range from tracking user habits (TED with subtitles, digital merchandise fetishism and hidden exploitation) to not owning a good (application, film or disc) despite its purchase (DRM).

In order to be able to defend itself, a free solution is to use open source software better if free or designed to maintain the freedom of users. Open source software encourages the analysis and study of the source code in order to make corrections, changes and extensions. Free software adds to open source software respect for the freedom of users and the community; users have the freedom to run, copy, distribute, study, modify and improve the software. So it's a question of freedom, not price. To understand the concept, one need to think of "freedom of speech" and not "free beer".

The Free Software Foundation promotes the development and dissemination of free software through the General Public License (GPL). Free and open source software allows the revision of the source code by a large number of people. For this reason, it is more difficult for it to contain defects and malfunctions (bugs) or security holes and corrections are very quick. Moreover, since the source code is freely available, it is very difficult to intentionally insert spy functions (backdoors, trojans and spyware) without these being promptly discovered and eliminated differently from what happened for some commercial applications.

Furthermore, messages defined as "private" in e-mail services, social networks and communication applications are actually not. In most cases, messages are transmitted over the Internet and protected by encryption, but are readable by the service provider. To communicate in a truly private way through a digital device, different solutions based on end-to-end encryption are needed.

An unencrypted message is the same as a postcard while an encrypted message is the same as a traditional letter: in particular, end-to-end encryption ensures that only the recipient can open the envelope of the letter.

Finally, Term of Service (ToS) are the legal agreements between a service provider and the user who wishes to use them. In particular, they define the terms of use of a service in a legally binding manner and are essential for the protection of copyright on content and for protection against potential liability. The terms of service, due to their length and sometimes difficult to understand, are almost never read by the user who unconsciously accepts them.

 

Some simple rules to remember in order not to be overwhelmed

  1. 1.Proprietary software (closed source) protects the rights and the interests of the developer rather than the users; 

  2. 2.Free software guarantees transparency and freedom to users and is a necessary condition for a free society; 

  3. 3.A software that uses end-to-end encryption protects you from the collection of personal data and surveillance of mass media; 

  4. 4.A free service/product or an unclear business model gains through user data or their lives; 

  5. 5.It is better to pay for a service/product with a subscription or donation and be certain of its genuineness than to have it for free without any certainty. 

The digital sovereignty

 
 
 

According to the inventor of the World Wide Web (WWW), Tim Berners-Lee, the priorities to keep open and free Internet are the following:

  1. 1.Resume control of our personal data; 

  2. 2.Limit and, if possible, remove the spread of misinformation on the Web; 

  3. 3.Create tools for transparency and understanding of online political advertising. 

How live without Google (and GAFA (GAFAM e FAANG))


Figure 7: GAFAM the digital empires and colonialism of the Web. Source
 

What information are large technology companies collecting from us?

How the Tech Giants Make Their Billions

The question: it is possible to abandon Google (GAFAM and FAANG) and remain in the world of today without falling from the frying pan to the fire?

It's not easy because "BigG" is no longer just a search engine. In fact, BigG provides a series of services (video and document sharing, maps, email, mobile operating systems, etc.) very useful, if not indispensable, in everyday life.

BigG has become too invasive. Also, unlike its competitors, its purpose is to sell advertising. It is not a search engine (like Yahoo), it is not a software manufacturer (like Microsoft, Adobe, Oracle, IBM, etc.), it does not live by selling licenses (like Microsoft, Adobe, Oracle, IBM, etc.) or devices (Apple, HP, Lenovo, etc.) or services (excluding some services to companies and individuals).

Its fundamental profit comes from advertising and from this derives the total profiling of its users. Its control is so pervasive that BigG can now be considered a quasi-monopolist (duopoly with Facebook) of Internet advertising.

There is no need to demonise Google, as this is its business model: the services offered are excellent in exchange for the massive collection of personal data. The final choice depends on ourselves. Unfortunately, some facts are very puzzling (for example, any data uploaded to its servers becomes its property or it is allowed to do whatever you want with our profiles, including selling them to third parties).

Everyone can evaluate their privacy as they wish and decide whether the transfer of much personal information is worth the level of services that are obtained in return from BigG (GAFAM and FAANG).

 

 

A few key points:

 

How to live without BigG's services and applications

Service or application

Google

Alternatives

Browser

Google Chrome

Brave, Firefox, TOR

Search engine

Google Search

Searx, Presearch, Brave Search, DuckDuckGo, Startpage

Bookmarks

Google Bookmarks

xBrowserSync, Firefox Sync, Floccus, Pocket, Raindrop

Communication applications (messaging and VoIP)

Google Messages, Google Hangouts

Element, Telegram, Wire, Mega, Signal, Jami, Keybase

Video conferencing applications

Google Hangouts and Meets

Jitsi, BigBlueButton, Telegram, Mega, Wire, Jami

Email services and applications

Gmail

Proton Mail, Tutanota, Mailvelope, K9-mail

Cloud storage and data sharing services and applications

Google Drive

NextCloud, Syncthing, Proton Drive, Mega, Cryptomator

Map services and applications

Google Maps

OpenStreeMap, OsmAnd, Qwant maps

Services and applications Earth visualization

Google Earth

Cesium, Marble, Zoom Earth

Services and applications Street Map

Google Street View

OpenStreetCam

Translator services and applications

Google Translate

Apertium, LibreTranslate, LingvaTranslate, DeepL, Linguee, Swisscows

Calendar services and applications

Google Calendar

NextCloud, Proton Calendar, Fruux

Contacts services and applications

Google Contacts

NextCloud, Proton Mail, OpenContacts

Social network services and applications

 

Mastodon, Diaspora*, GNU social

Video content services and applications

YouTube

Invidious, PeerTube, DTube, NewPipe, FreeTube, Internet Archive

Office services and applications

Google Docs

LibreOffice, Collabora, Disroot, CryptPad

Android apps catalogue

Google Play

F-Droid, Aurora Store

Mobile operating systems

Android Open Source Project (AOSP)

Lineage OS, Lineage OS microG

Virtual assistant services and applications

Google Assistant

Mycroft, Home Assistant

Teclados Android

Gboard

AnySoftKeyboard, Simple Keyboard, OpenBoard

Activity tracker

Google Fit

Runkeeper, Endomondo, Samsung Health

Media center

Google Chromecast

Airtame, Roku

Music

Play Music

Tubeats, JustHearIt, Libre.fm

Books

Play Books

Internet Archive, Project Gutenberg, Open Library, Scribd

News and Events

Google News

Brave Today, Pocket, Flipboard

Payments

Google Pay

TransferWise, Revolut, Abra, Circle, Papaya Wallet

Blog

Blogger

Wordpress, Publii, Write.as, Ghost, Telegra.ph, Medium

Web sites

Google Sites

Wordpress, Publii, Joomla!, Grav, Silex

Alerts

Google Alerts

TalkWalker, F5bot, Mentionlytics

Photography

Google Photos

NextCloud, Piwigo, Proton Drive, Mega

Advertising for advertisers

Google Ads

Brave Rewards, Quantcast, Pinterest, AdRoll

Advertising for publishers

Google AdSense

Brave Rewards, Quantcast, Pinterest

Digital notepad services and applications

Google Keep

Standard Notes, Joplin, Disroot Etherpad

Authenticator services and applications 2FA

Google Authenticator

Authenticator browser, Aegis, Tofu

Analytic

Google Analytic

Matomo, GoatCounter, OpenWebAnalytic, Countly, Clicky

Resolver services DNS

Google DNS

OpenNIC, Mullvad, Quad9, AdGuard DNS

Domains

Google Domains

Njalla, Orange Website, Bahnhof

Note: the list is not complete, but it allows you to understand how many BigG services it uses to profile its users. The Android operating system has allowed BigG to extend its user base in a viral way. Unfortunately, without awareness and the correct countermeasures such as those in this document, using an Android device makes it a prisoner of BigG's services.

The best solution is to buy a device (smartphone or tablet), even used, compatible with a free operating system, based on the Android Open Source Project (AOSP), such as Lineage OS. In addition to allowing greater customization, performance (speed and battery life) and privacy, it allows you to receive operating system updates throughout the life of the device.

Note: the activation of the root (administrator user) and the replacement of the original operating system with an alternative one does not cancel the legal warranty.

Note: the installation of Lineage OS, although not difficult, requires a minimum of computer knowledge; however, it is possible to learn this procedure through a lot of information and videos present on the net source and source.

Some of the shames of the high-tech giants

 
 

Figure 10 Some of the anti-monopoly fines imposed by the European Commission against the US hi-tech giants. Source
 

Privacy and respect for the freedom of users by information and communication services and applications

 
 

Browser

Feature

Project

Chrome

Edge

Safari

Opera

Chromium

Firefox

Brave

TOR

Developer

Google

Microsoft

Apple

Opera

Google

Mozilla

Brave

TOR project

Open source

No

No

No

No

Yes

Yes

Yes

Yes

Web engine

Blink

Blink

Web kit, Nitro

Blink

Blink

Gecko, Servo

Blink

Gecko, Servo

Performance

High

High

Average

High

High

High

High

High

Required resources (CPU/RAM)

High

Average

Average

Average

High

Average

Average

Average

Additional components

Desktop version only

Desktop version only

Desktop and iOS version

Desktop version only

Desktop version only

Desktop and Android version

Desktop version only

Desktop and Android version

Integrated advertising filter

Yes, limited

No

No

Yes, default disabled

Yes, limited

Yes, limited

Yes

Yes, via NoScript

Integrated anti tracking

No

Yes, limited and default disabled

Yes, limited and default disabled

Yes, default disabled

No

Yes

Yes

Yes, via NoScript

Integrated anti fingerprinting

No

Yes, limited and default disabled

Yes, limited

No

No

Yes, limited and default disabled

Yes

Yes

Default safe connection (HTTPS)

Yes, default disabled

Yes, default disabled

Yes

Yes, default disabled

Yes, default disabled

Yes, default disabled

Yes

Yes

Business model

User data, advertising

User data, advertising

User data, advertising

User data, advertising

Google

Donations, agreement with search engines

BAT cryptocurrency

Donations

 

To make browsing safer and more confidential, you must use one of the following browsers:

Note: Chrome is the closed source version and owner of Chromium and is therefore considered not to be respectful of privacy. Google's business model, based on advertising, requires user data as payment for services.

Does your browser protect you against fingerprinting?

Firefox, Brave or Chrome: some very useful add ons to increase the browsing safety and privacy:

Firefox: additional add ons very useful to increase the privacy of browsing:

Note: xBrowserSync allows you to synchronize bookmarks between browsers and devices with end-to-end encryption and without registration.

Note: only Firefox and Kiwi on Android version support add ons, Chrome does not support them.

 

 

Figure 12: Welcome to the Google Botnet. There is nothing you can do with Google Chrome without it being transmitted to Google in some way...In addition, Google violates the GDPR.
 

Search engine

Feature

Project

Google Search

Bing

Startpage

Qwant

DuckDuckGo

Brave Search

Presearch

Searx

Developer

Google

Microsoft

Startpage

Qwant

DuckDuckGo

Brave

Presearch

Community

Open source

No

No

No

Partially

No

No

Partially

Yes

Architecture

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized

Decentralized

Decentralized

Infrastructure jurisdiction

USA

USA

Europe, USA

Europe (France)

USA

USA

World

World

Quality results

High

High

High (Google)

High (Bing)

High

High

High (Google, DuckDuckGo)

High (Google, Bing, Yahoo)

Independent search index

Yes

Yes

No

No

No

Yes

Yes

No

Integrated advertising filter

No

No

No

No

No

No

No

Yes

Integrated anti tracking

No

No

Yes

Yes

Yes

Yes

No

Yes

Safe connection (HTTPS by defect)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Business model

User data, advertising

User data, advertising

Advertising, donations

Advertising, donations

Advertising, donations

BAT cryptocurrency

Presearch cryptocurrency

Donations, public servers

Advertising, tracking and profiling

Yes

Yes

No

No

No

No

No

No

 

The following search engines are respectful of user privacy and provide innovative features:

Note: Google, Bing and Yahoo (Bing) have a business model based on advertising and requires user data as payment for services.

 

Advertising filter additional components and applications

Feature

Project

Adblock

Adblock Plus

AdGuard

Ublock origin

Blokada

Pi-hole

Developer

Community

Eyeo

AdGuard

Community

Community

Community

Open source

Yes

Yes

Partially

Yes

Yes

Yes

Required resources (CPU/RAM)

High/High

High/High

Low/Low

Low/Low

Low/Low

Low/Low

Android/iOS/browser

No/No/Yes (Firefox, Brave, Chrome, Edge, Safari)

No/No/Yes (Firefox, Brave, Chrome, Edge, Safari)

Yes/Yes/Yes (Firefox, Brave, Chrome, Edge, Safari)

No/No/Yes (Firefox, Brave, Chrome, Edge, Safari)

Yes/Yes/No

Does not require installation on the device, only Raspberry Pi

Performance

Average

Average

High

High

High

Average

Acceptable advertising list

Yes

Yes

Yes, optional

No

No

No

Requires to establish VPN connection

No

No

Yes, local connection

No

Yes, local connection

No

Browser/operating system protection type

Yes/No

Yes/No

Yes/Yes

Yes/No

No/Yes

No/No, entire local network

Required root user

No

No

No

No

No

No

Download Android/iOS/PC

No/No/Web site

No/No/Web site

Web site/App Store/Web site

No/No/Web site

Web site-F-Droid/No/No

Web site

Business model

Paid features

Advertising

Paid features

Donations

Donations

Donations

Advertising, tracking and profiling

Yes

Yes

Yes, minimal

No

No

No

 

Some open source applications for Android, availables only on F-Droid, which allow you to block advertising:

The main advantages of using an advertising filter:

Note: browsing on a PC is via a browser which uses the add ons as an advertising filter. On the other hand, browsing on Android and iOS is done through applications that require an advertising filter at the operating system level provided by a specific application.

 

Communication applications (messaging and VoIP)

Feature

Project

Whatsapp

Messenger

iMessage

Skype

Viber

Telegram

Mega

Keybase

Signal

Wire

Element

Developer

Facebook

Facebook

Apple

Microsoft

Rakuten

Telegram

Mega

Zoom

Signal

Wire

Element

Open source

No

No

No

No

No

Partially

Partially

Partially

Yes

Yes

Yes

Architecture

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized/decentralized

Decentralized/centralized

Infrastructure jurisdiction

USA

USA

USA

USA

Luxembourg/Japan

Netherlands/USA/Singapore

New Zealand

USA

USA

Switzerland/local

Local/UK

Bonds intelligence agencies

Yes

Yes

Yes

Yes

No

No

No

No

No

No

No

Web/Android/iOS/PC

Yes/Yes/Yes/Yes

Yes/Yes/Yes/No

No/No/Yes/Yes, macOS only

Yes/Yes/Yes/Yes

No/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/Yes/Yes/No

Yes/Yes/Yes/Yes

No/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Users (active/group size)

2000 M/1024

1300 M/250

1000 M/32

300 M/600

260 M/250

700 M/200 k

200 M/500

1 M/10 k

40 M/1000

30 M/500

40 M/10 k

Size (attachments/storage)

2 GB/unlimited (local storage)

25 MB/ unlimited (cloud storage)

100 MB/unlimited (local storage)

300 MB/unlimited (local storage)

200 MB/unlimited (local storage)

2 GB, paid version 4 GB/unlimited (cloud storage)

Unlimited/15 GB, paid version up to 16 TB (cloud storage)

Unlimited/250 GB (cloud storage)

100 MB/unlimited (local storage)

100 MB/unlimited (local storage)

100 MB/unlimited (cloud storage)

Safe attachments/self-destructing messages

No/No

No/Yes

No/No

No/No

No/Yes

No/Yes

Yes/No

Yes/Yes

Yes/Yes

Yes/Yes

Yes/No

Cloud/local backup support

Yes, third parties in clear text/Yes

Yes, clear text/Yes, export

Yes, clear text/No

Yes, clear text/Yes, export

Yes, clear text/Yes, export

Yes, clear text/Yes, export

Yes, E2E encryption/No

Yes, E2E encryption/No

No/Yes

No/Yes

Yes, E2E encryption/No

Anonymous registration/username

No/No

Yes, email/Yes

Yes, email/Yes

Yes, email/Yes

No/No

No/Yes

Yes, email/Yes

Yes/Yes

No/No

Yes, email/Yes

Yes/Yes

2FA – two factor authentication

Yes

Yes

Yes

Yes

No

Yes

Yes

No

No

Yes

No

E2E encryption chat-call/group/conference

Yes/No/No

Yes, secret conversations/No/No

Yes/Yes/Yes

Yes/No/No

Yes/No/No

No, secret chats only/No/No

Yes/Yes/Yes

Yes/Yes/Not available

Yes/Yes/Yes

Yes/Yes/Yes

Yes/Yes, private groups/Yes, private groups

TOFU

Yes

No

Yes

Yes

Yes

No, secret chats only

Yes

No

Yes

Yes

Yes, only the first device

Perfect Forward Secrecy

Yes

Yes, secret conversations only

No

No

Yes

Yes, secret chats only

Yes

Yes, self-destructing messages only

Yes

Yes

Yes

Server federation

No

No

No

No

No

No

No

No

No

Yes, paid version

Yes

Business model

User data, advertising

User data, advertising

User data

User data, advertising

User data, advertising

Paid features, advertising

User data, paid features

User data, paid features

Donations

Paid features

Paid features

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

Yes

Yes

No

No

No

No

No

 

Note: a good comparison in term of security and privacy features of the most commonly used communication services or applications.

 
 

Video conferencing applications

Feature

Project

Messenger

Hangouts-Meet

Skype-Teams

Zoom

Telegram

Mega

Wire

NextCloud Talk

BigBlueButton

Jitsi

Developer

Facebook

Google

Microsoft

Zoom

Telegram

Mega

Wire

NextCloud

BigBlueButton

Community/8x8

Open source

No

No

No

No

Partially

Partially

Yes

Yes

Yes

Yes

Architecture

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized/decentralized

Decentralized/centralized

Decentralized/centralized

Decentralized/centralized

Infrastructure jurisdiction

USA

USA

USA

USA

Netherlands/USA/Singapore

New Zealand

Switzerland/local

Local/service provider server venue

Local/service provider server venue

Local/service provider server venue

Web/Android/iOS/PC

Yes/Yes/Yes/Yes

Yes/Yes/Yes/No

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/Yes/Yes/No

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/No/No/No

Yes/Yes/Yes/Yes

Maximum users (conference/chat)

50/250

Hangouts 25/25

Meet 100/100 conference only 60 minutes, 500/100000 paid version only

Skype 50/50

Teams 100/100 conference only 60 minutes, 300/20000 paid version only

100/100 conference only 40 minutes, 1000/1000 paid version only

2000/200000

20/500

25/25, 100/500 paid version only

Local installation 10/100

High performance installation

50/500

150/150

500/500

Video codec support

VP8

VP8/VP9

H.264

H.264

VP8/VP9

VP8/VP9

VP8

VP8/VP9

VP8/H.264

VP8/VP9/H.264

Audio codec support

Opus/ISAC

Opus

Skype SILK

Teams Satin/SILK

Opus/SILK

Opus

Opus

Opus

Opus

Opus

Opus

Camera-Screen/Audio sharing

1/No

Hangouts/Meet 1/Yes, PC only

Skype/Teams 2/Yes, PC only

2/Yes, PC only

2/Yes

1/No

1/No

1/No

2/Yes, PC only

1/Yes, PC only

Application integration

No

Yes, Google docs and other paid version

Skype No

Teams Yes, Microsoft office and other paid version

Yes, Moodle and other

No

Yes, Mega cloud

Yes, paid version

Yes, NextCloud

Yes, Moodle, Wordpress and other

Yes, EtherPad, Moodle

E2E encryption conference/chat

No/No

No/No

No/No

Yes/Yes, optional

No/No, secret chats only

Yes/Yes

Yes/Yes

Yes/Yes

No/No

Yes/Yes

2FA – two factor authentication

Yes

Yes

Skype Yes

Teams No, paid version only

Yes

Yes

Yes

Yes

Yes

No

No, user not necessary

Anonymous registration /username

Yes, email/Yes

Yes, email/Yes

Yes, email/Yes

Yes, email/Yes

No/Yes

Yes, email/Yes

Yes, email/Yes

Yes, email/Yes

Yes/Yes

Yes/Yes

On-premises installation

No

No

No

No

No

No

Yes, paid version

No

Yes

Yes

Business model

User data, advertising

User data, advertising, padi features

User data, advertising, padi features

User data, advertising, padi features

Paid features, advertising

User data, paid features

Paid features

Paid features

Donations

Paid features

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

Yes

No

No

No

No

No

 

 

 
 

Email services and applications

Feature

Project

Gmail

Outlook

Mailfence

Mailvelope

Tutanota

Proton Mail

Mail-in-to-box

Developer

Google

Microsoft

Mailfence

Community

Tutanota

Proton

Community

Open source

No

No

No

Yes

Partially

Partially

Yes

Architecture

Centralized

Centralized

Centralized

Centralized/decentralized

Centralized

Centralized

Decentralized

Infrastructure jurisdiction

USA

USA

Belgium

Service provider server venue

Germany

Switzerland

Local

Anonymous payment method

No

No

Paid, Bitcoin, email required

Donations and paid, Bitcoin, email required

Donations and paid, Bitcoin, email required

Bitcoin, cash, email required

Not necessary

E-mail application support

Yes

Yes

No

No

No

Yes, via Proton Bridge paid version

No

Size (attachments/mailbox)

25 MB/15 GB

20 MB/15 GB

50 MB/0.5 GB, 5 GB paid version

Service provider limits

25 MB/1 GB, 1000 GB paid version

20 MB/1 GB, 500 GB paid version

Unlimited (local storage)

Safe attachments/self-destructing messages

No/

No/No

No/No

Yes/Yes, depends on the service provider

Yes/Yes

Yes/Yes

Yes/No

E2E encryption

No

No

Yes

Yes

Yes

Yes

Yes

2FA – two factor authentication

Yes

Yes

Yes

Yes, depends on the service provider

Yes

Yes

Not necessary

Business model

User data, advertising

User data, advertising

Paid features

Donations, paid features

Paid features

Paid features

Donations

Advertising, tracking and profiling

Yes

Yes

No

No

No

No

No

 

The following e-mail services are respectful of user privacy and some of them provide innovative features:

Note: Gmail, Outlook have a business model based on advertising and require user data as payment for services. In addition, messages can be read by service providers as the encryption keys are saved on the server. A simple way to secure these services is to use a browser like Firefox with the Mailvelope add on or an email client like Thunderbird. Both solutions add end-to-end encryption and make message content unreadable to service providers.

 

Multi user email applications

Feature

Project

Gmail

Outlook

Yahoo Mail

BlueMail

K9-mail

Thunderbird

Claws Mail

Developer

Google

Microsoft

Yahoo

BlueMail

Community

Mozilla

Community

Open source

No

No

No

No

Yes

Yes

Yes

Multi platform

Android/iOS

Android/iOS-Windows/macOS

Android/iOS

Android/iOS-Windows/macOS

Android

GNU/Linux/Windows/macOS

GNU/Linux/Windows

Multi user support

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Support for encryption/digital signatures

No/No

Yes/Yes

No/No

No/No

Yes/Yes, via OpenKeychain

Yes/Yes, via Enigmail

Yes/Yes, via GNUPG

IMAP/POP3/exchange support

Yes/Yes/Yes

Yes/Yes/Yes

Yes/Yes/No

Yes/Yes/Yes

Yes/Yes/Yes

Yes/Yes/Yes, via ExQuilla

Yes/Yes/No

Additional components

No

No

No

No

Yes

Yes

Yes

Business model

User data, advertising

User data, advertising

User data, advertising

Paid features

Donations

Donations

Donations

Advertising, tracking and profiling

Yes

Yes

Yes

No

No

No

No

 

 

Cloud storage and data sharing services and applications

Feature

Project

Google Drive

OneDrive

iCloud

Dropbox

Mega

Cryptomator

Proton Drive

NextCloud

OwnCloud

Syncthing

Developer

Google

Microsoft

Apple

Dropbox

Mega

Cryptomator

Proton

NextCloud

OwnCloud

Community

Open source

No

No

No

Partially

Partially

Yes

Partially

Yes

Yes

Yes

Architecture

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized/decentralized

Centralized

Decentralized/centralized

Decentralized/centralized

Decentralized

Infrastructure jurisdiction

USA

USA

USA

USA

New Zealand

Service provider server venue

Switzerland

Local/service provider server venue

Local/service provider server venue

Local

Web/Android/iOS/PC

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

No/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Yes/Yes/Yes, via Möbius Sync/Yes

Storage size

15 GB/paid version up to 2 TB

5 GB/paid version up to 1 TB

5 GB/paid version up to 2 TB

2 GB/paid version up to 5 TB

20 GB/paid version up to 16 TB

Service provider limits

5 GB/paid version up to 500 GB

Unlimited (local storage)/service provider limits

Unlimited (local storage/service provider limits

Unlimited (local storage)

Synchronisation/versioning

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Depends on the service provider

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

E2E encryption

No

No

Yes, optional

No

Yes

Yes

Yes

Yes

Yes

Yes

2FA – two factor authentication

Yes

Yes

Yes

Yes

Yes

No

Yes

Yes

Yes

Yes, manual

Business model

User data, advertising, paid features

User data, advertising, paid features

User data, advertising, paid features

User data, advertising, paid features

User data, paid features

Donations

Paid features

Paid features

Donations, paid features

Donations

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

No

No

No

No

No

No

 

 

File sharing services and applications

Feature

Project

WeTransfer

pCloudTransfer

Sendanywhere

SwissTransfer

Disroot Lufi

WebTorrent

OnionShare

Developer

WeTransfer

pCloud

Estmob

Infomaniak

Disroot

WebTorrent

Community

Open source

No

No

No

Yes

Yes

Yes

Yes

Architecture

Centralized

Centralized

Centralized

Centralized

Centralized

Decentralized

Decentralized

Infrastructure jurisdiction

USA

USA

USA

Switzerland

Holland

Local

Local

Web/Android/iOS/PC

Yes/No/No/No

Yes/No/No/No

Yes/Yes/Yes/Yes

Yes/No/No/No

Yes/No/No/No

No/No/No/Yes

No/No/No/Yes

File size

2 GB/20 GB paid version

5 GB

10 GB/50 GB paid version

50 GB

2 GB

Unlimited (local storage)

Unlimited (local storage)

Sharing duration

7 days/configurable paid version

7 days

Up to 48 hours/configurable paid version

Up to 30 days

Up to 30 days

Unlimited

Unlimited

Persistent connection required

No

No

No

No

No

Yes, during sharing

Yes, during sharing

E2E encryption

No, only paid version

Yes

Yes

Yes

Yes

Yes

Yes

Secure connection protocol

HTTPS/TLS

HTTPS/TLS

HTTPS/TLS

HTTPS/TLS

HTTPS/TLS

WebRTC/TLS

Onion routing network

Business model

User data, advertising, paid features

User data, advertising, paid features

Advertising, paid features

Paid features

Donations

Donations

Donations

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

No

No

No

 

 

Secure connection services (VPN, TOR, I2P)

Feature

Project

NordVPN

ExpressVPN

IVPN

Mullvad

Proton VPN

TOR

I2P

Developer

NordVPN

ExpressVPN

IVPN

Mullvad

Proton

TOR project

Community

Open source

No

No

Yes

Yes

Yes

Yes

Yes

Architecture

Centralized

Centralized

Centralized

Centralized

Centralized

Decentralized

Decentralized

Infrastructure jurisdiction

Panama

British Virgin Inslands

Gibraltar

Sweden

Switzerland

World

World

Number of devices

Paid up to 6

Paid up to 3

Paid up to 7

Paid up to 5

1 gratis/paid up to 10

Unlimited

Unlimited

Anonymous payment method

Bitcoin, Ether, Ripple, email required

Bitcoin, email required

Bitcoin

Bitcoin, BitcoinCash

Bitcoin, cash, email required

Free, Bitcoin, Monero, Ethereum, Litecoin donations

Free, Bitcoin, Monero, Ethereum, Litecoin donations

Log traffic/DNS/IP/timestamp

No/No/No/No

No/No/No/No

No/No/No/No

No/No/No/No

No/No/No/No

No/No/No/No

No/No/No/No

Traffic encryption

AES256-ChaCha20

AES256

AES256-ChaCha20

AES256-ChaCha20

AES256-ChaCha20

AES256

AES256

Secure connection protocol

OpenVPN/IPSec-IKEv2/Wireguard

OpenVPN/IPSec-IKEv2/Lightway

OpenVPN/WireGuard

OpenVPN/WireGuard

OpenVPN/IPSec-IKEv2/Wireguard/Stealth

Onion routing network

Garlic routing network

Kill switch/anti DNS leak

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

No/Yes

No/Yes, DNS not used

P2P traffic/unlimited bandwidth

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes, paid version

Yes/Yes, low speed

Yes/Yes, low speed

Independently audited

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Perfect Forward Secrecy

Yes

Yes

Yes

Yes

Yes

Yes

Yes

TOR/multi server encryption support

Yes/Yes

Yes/No

No/Yes

No/Yes

Yes/Yes

Yes/Yes, onion routing

Yes/Yes, garlic routing

DPI protection

Yes

No

Yes

Yes

Yes

Yes

Yes

Malware and ads protection

Yes

No

Yes

Yes

Yes

No

No

Encrypted/clear traffic split

Yes

Yes

No

Yes, except iOS

Yes

No

No

Port forwarding

No

Yes

No

No

Yes

No

No

Business model

Paid features

Paid features

Paid features

Paid features

Paid features

Donations

Donations

 

 

Resolver services DNS

Feature

Project

Google DNS

OpenDNS

Cloudflare

CleanBrowsing DNS

AdGuard DNS

Quad9

OpenNIC

Provider

Google

Cisco

Cloudflare

CleanBrowsing

AdGuard

ClearDNS

Community

Open source

No

No

No

No

Yes

No

Yes

Architecture

Centralized

Centralized

Centralized/decentralized

Centralized

Centralized

Centralized

Decentralized

Infrastructure jurisdiction

USA

USA

USA

USA

Cyprus

Switzerland

World

DNS over TLS (DoT)

No

No

Yes

Yes

Yes

Yes

No

DNS over HTTPS (DoH)

Yes

Yes

Yes

Yes

Yes

Yes

No

DNScrypt

No

Yes

No

Yes

Yes

Yes

Yes

DNSSEC

Yes

No

Yes

Yes

Yes

Yes

Yes

Alternative TLD

No

No

.crypto, .zil

No

No

No

Yes

IPv4 address

8.8.8.8

8.8.4.4

208.67.222.222

208.67.220.220

1.1.1.1

1.0.0.1

185.228.168.9

185.228.169.9

94.140.14.14

94.140.14.15

9.9.9.9

149.112.112.112

192.71.245.208

31.171.251.118

Performance

High

High

High

High

High

High

High

Content filter

No

Yes, optional (family)

Yes, optional (adults, malware)

Yes, optional (family, adults, malware)

Yes, optional (family, adults)

Yes, optional (malware)

No

Anti-censorship

No

No

Partial

No

No

No

Yes

DNS Hijacking/Logging

No/Yes

No/Yes

No/Yes

No/Minimum

No/Minimum

No/Minimum

No/No

Business model

Users data, paid features

Users data, paid features

Users data, paid features

Paid features

Paid features

Donations

Donations

Advertising, tracking and profiling

Yes

Yes

Yes

No

No

No

No

DNS protocols and operating systems compatibility

Protocol

Operating system

Windows

macOS

iOS

Android Open Source Project (AOSP)

GNU/Linux

OpenWRT

DNS over TLS (DoT)

Unbound, stubby

Unbound, stubby

No

Native Android P 9.0+, Blokada, DNS66

Unbound, stubby

Unbound, stubby

DNS over HTTPS (DoH)

dnscrypt-proxyV2

dnscrypt-proxyV2

DNSCloak

Dnscrypt-proxyV2, DNS66, Daedalus

dnscrypt-proxyV2

dnscrypt-proxyV2

DNScrypt

dnscrypt-proxyV2

dnscrypt-proxyV2

DNSCloak

Dnscrypt-proxyV2, DNS66, Daedalus

dnscrypt-proxyV2

dnscrypt-proxyV2

 

 

Note: a secure connection via VPN, automatically changes the DNS resolver.

Map services and applications

Feature

Project

Google Maps

Apple Maps

Bing maps

Maps.me

Waze

Here WeGo

OsmAnd

OpenStreeMap

Developer

Google

Apple

Microsoft

Mail.ru

Google

Here

Community

Community

Open source

No

No

No

Yes

No

No

Yes

Yes

Web/Android/iOS/Tizen

Yes/Yes/Yes/Yes

No/No/Yes/No

Yes/No/No/No

Yes/Yes/Yes/No

Yes/Yes/Yes/No

Yes/Yes/Yes/Yes

No/Yes/Yes/No

Yes/Yes/Yes/No via OsmAnd/OsmAnd+

Maps

Google

TomTom

Bing, Here

OpenStreeMap

Waze

Here

OpenStreeMap

OpenStreeMap

Real time traffic

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes, via OsmAnd+

Autovelox/Speed limits

No/No

No/Yes

No/Yes

No/No

Yes/Yes

No/No

No/Yes

No/Yes, via OsmAnd+

3D maps

Yes

Yes

Yes

No

Yes

Yes

No

Yes, via Marble

Preloaded maps (offline)

Yes, expiry 15 days

No

Yes

Yes

Yes

Yes

Yes

Yes

Points of interest

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Route registration

Yes

No

No

No

Yes

No

Yes

No

Sharing and collaboration

No

No

No

No

Yes

No

Yes

Yes

Additional components

No

Yes

No

No

No

No

Yes

Yes, no third parts

Business model

Users data, advertising

Users data, advertising

Users data, advertising

Users data, advertising, paid features

Users data, paid features

Users data, paid features

Donations, paid features

OSMF foundation, donations

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

Yes

Yes

No

No

 

 

Translator services and applications

Feature

Project

Google translate

Microsoft Bing translator

DeepL

Apertium

Developer

Google

Microsoft

DeepL, Linguee

Apertium

Open source

No

No

No

 

Quality/quantity of languages

High/High

High/High

Maximum/Low

Average/Average

Dictionary

 

 

Linguee

 

Web/Android/iOS/PC

Yes/Yes/Yes/No

Yes/Yes/Yes/Yes, Windows only

Yes/Yes, via DeepL/No/Yes, Windows and macOS only

Yes/Yes/No/Yes

Additional components

Firefox, Chrome integrated

Firefox, Edge, Outlook

Firefox/Brave/Chrome

No

Translation limit

5000 characters, unlimited paid version

5000 characters, unlimited paid version

5000 characters, unlimited paid version

No

Preloaded languages (offline)

Yes

Yes

No

Yes

Document translation

Yes, format (.doc, .docx, .txt)

Yes, format (.pptx)

Yes, format (.docx, .pptx, .txt)

Yes, format (.odt, .ods, .odp, .docx, .xlsx, .pptx, .txt)

Website translation

Yes

Yes

No

Yes

Translation of conversations

Yes

Yes

No

No

Confidential translation

No

No

No, paid version only

Yes

Business model

Advertising, users data, paid features

Advertising, users data, paid features

Users data, paid features

Donations

Advertising, tracking and profiling

Yes

Yes

Yes

No

 

 

Calendar services and applications

Feature

Project

Google calendar

Outlook

Outlook.com

iCloud Calendar

Thunderbird

Proton Calendar

NextCloud

Developer

Google

Microsoft

Microsoft

Apple

Mozilla

Proton

NextCloud

Open source

No

No

No

No

Yes

Partially

Yes

Architecture

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized

Decentralized/centralized

Infrastructure jurisdiction

USA

USA

USA

USA

Service provider server venue

Switzerland

Local/service provider server venue

Web/Android/iOS/PC

Yes/Yes/Yes/No

No/Yes/Yes/Yes, Windows and macOS only

Yes/Yes/Yes/Yes, Windows only

Yes/No, via DAVx5 or Google calendar/Yes/Yes, Windows and macOS only

No/No/No/Yes

Yes/Yes/Yes/No

Yes/Yes, via DAVx5+Etar/Yes, via native application/Yes

Reminders/notifications support

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Third-party calendars support

Yes

Yes

Yes

Yes

Yes

No

Yes

WebDAV/CalDAV support

Yes/Yes

Yes/Yes, via CalDavSynchronizer

No/No

Yes/Yes

Yes/Yes, via Lightning Calendar

Yes/Yes, via Proton Bridge paid feature

Yes/Yes

Business model

Advertising, users data, paid features

Advertising, users data, paid features

Advertising, users data, paid features

Advertising, users data

Donations

Paid features

Paid features

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

No

No

No

 

 

Contacts services and applications

Feature

Project

Google contacts

Outlook

Outlook.com

iCloud contacts

Thunderbird

Proton Mail

NextCloud

Developer

Google

Microsoft

Microsoft

Apple

Mozilla

Proton

NextCloud

Open source

No

No

No

No

Yes

Partially

Yes

Architecture

Centralized

Centralized

Centralized

Centralized

Centralized

Centralized

Decentralized/centralized

Infrastructure jurisdiction

USA

USA

USA

USA

Service provider server venue

Switzerland

Local/service provider server venue

Web/Android/iOS/PC

Yes/Yes/Yes/No

No/Yes/Yes/Yes, Windows and macOS only

Yes/Yes/Yes/Yes, Windows only

Yes/Yes, via Sync iCloud/Yes/Yes, Windows and macOS only

No/No/No/Yes

Yes/Yes/Yes/No

Yes/Yes, via DAVx5 and native application/Yes, via native application/Yes

Categories/groups support

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Duplicates merge support

Yes

Yes

Yes

Yes

Yes, native and via

DuplicateContactsManager

Yes

Yes

Import/export formats (.csv, .vcf) support

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

No/Yes

WebDAV/CardDAV support

Yes/Yes

Yes/Yes, via OpenProtocolsConnector

No/No

Yes/Yes

Yes/Yes, via CardBook

Yes/Yes, via Proton Bridge paid feature

Yes/Yes

Business model

Advertising, users data, paid features

Advertising, users data, paid features

Advertising, users data, paid features

Advertising, users data

Donations

Paid features

Paid features

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

No

No

No

 

 

Digital notepad services and applications

Feature

Project

Google keep

OneNote

Note

Evernote

Disroot Etherpad

Joplin

Standard Notes

Developer

Google

Microsoft

Apple

Evernote

Disroot

Community

Standard Notes

Open source

No

No

No

No

Yes

Yes

Yes

Architecture

Centralized

Centralized

Centralized

Centralized

Centralized

Decentralized/centralized

Decentralized/centralized

Infrastructure jurisdiction

USA

USA

USA

USA

Holland

Local/backup service venue

Local/backup service venue

Web/Android/iOS/PC

Yes/Yes/Yes/No

Yes/Yes/Yes/Yes, only Windows

Yes/No/Yes/Yes, only mac OS

Yes/Yes/Yes/Yes, only Windows and mac OS

Yes/No/No/No

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Storage size

15 GB/paid version up to 30 TB

5 GB/paid version up to 5 TB

5 GB/paid version up to 2 TB

50 MB/paid version up to 10 GB

Unlimited

Unlimited (local storage)/backup service limits

Unlimited (local storage)/backup service limits

Synchronization

Yes

Yes

Yes

Yes, 2 devices/unlimited paid version

Yes

Yes

Yes

Versioning/markdown support

No/Yes, only Web via plugin

Yes/Yes, only Web via plugin

No/Yes, only Web via plugin

Yes, paid version/Yes, only Web via plugin

Yes/Yes

Yes/Yes

Yes, paid version/Yes

Sharing and collaboration

Yes, paid version

Yes, paid version

Yes

Yes, paid version

Yes

No

No

Offline access

Yes

Yes

Yes

Yes, only PC/Yes, paid version

No

Yes

Yes

E2E encryption

No

Yes

Yes

Yes, only Windows and mac OS

No

Yes

Yes

2FA – two factor authentication

Yes

Yes

Yes

Yes

Yes

No

Yes, paid version

Business model

User data, advertising, paid features

User data, advertising, paid features

User data, paid features

User data, advertising, paid features

Donations

Donations

Donations, paid version

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

No

No

No

 

 

Virtual assistant services and applications

Feature

Project

Google Assistant

Siri

Cortana

Alexa

Bixby

Home Assistant

Mycroft

Developer

Google

Apple

Microsoft

Amazon

Samsung

Community

Mycroft

Open source

No

No

No

No

No

Yes

Yes

Android/iOS/PC

Yes/Yes/Yes, Chrome OS only

Yes/Yes/Yes, macOS only

Yes/Yes/Yes, Windows only

Yes/Yes/Yes, Windows only via Cortana

Yes/No/No

No/No/Yes, only Windows

Yes/No/only GNU/Linux

Quality understanding

High

High

High

High

High

High

High

Multi language support

Yes

Yes

Yes

Yes

Limited

Yes, via Snips

No, in development

TV/wear/car/home/speaker devices support

Yes/Yes/Yes/Yes/Yes

Yes/Yes/No/Yes/Yes

No/Yes/No/Yes/Yes

Yes/Yes/Yes/Yes/Yes

Yes/Yes/No/No/No

No/No/No/Yes/No

No/No/No/Yes/No

Third party device support

Yes

No

Yes

Yes

No

Yes, Raspberry Pi

Yes, Raspberry Pi

Third party app support

Yes

Yes

Yes

Yes

No

Yes, Yes

Yes, in development

Ready to use

Yes

Yes

Yes

Yes

Yes

No

Yes

Business model

Advertising, users data

Advertising, users data

Advertising, users data

Advertising, users data

Advertising, users data

Donations, paid features

Donations, paid features

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

Yes

No

No

 

 


Figure 16: virtual assistants installed on smartphones or on any TV/wear/auto/home/speaker device are able to listen and to see everything that happens in the surrounding environment (home, office, outdoor, car, etc.). Data collected is transmitted to the servers of the service provider to improve it and to make a profit. Source
 

There are various alternatives that do not require you to share your data with anyone. At the moment the best alternative is Mycroft.

 

Social network services and applications

Feature

Project

Facebook

Instagram

Twitter

LinkedIn

Steemit

Diaspora*

Friendica

GNU Social

Mastodon

Developer

Facebook

Facebook

Twitter

Microsoft

Steemit

Diaspora/Community

Community

Community

Community

Open source

No

No

No

No

Yes

Yes

Yes

Yes

Yes

Architecture

Centralized

Centralized

Centralized

Centralized

Decentralized

Decentralized

Decentralized

Decentralized

Decentralized

Infrastructure jurisdiction

USA

USA

USA

USA

World

World

World

World

World

Number of active users (millions)

2200

1000

330

260

 

1

 

 

 

Web/Android/iOS

Yes/Yes/Yes

Yes/Yes/Yes

Yes/Yes/Yes

Yes/Yes/Yes

Yes/Yes, via Mixion/No

Yes/Yes, via Dandelion*/Yes, via Twispora

Yes/Yes/No

Yes/Yes, via AndStatus/Yes, via Shoyu

Yes/Yes, via AndStatus/Yes, via Amarok

2FA – two factor authentication

Yes

Yes

Yes

Yes

No, not necessary

Yes

 

Yes, via plugin

Yes

Censorship

Yes

Yes

Yes

Yes

No

No

No

No

No

Third party app support

Yes

Yes

Yes

Yes

Yes, Steem Projects

Yes

Yes

Yes

Yes

Integration with other social networks or blogs

No

No

No

No

Yes, Facebook, Twitter

Yes, Twitter, WordPress

Yes, Diaspora*, GNU social

Yes, Mastodon. Twitter

Yes, GNU social

Business model

Advertising, users data

Advertising, users data

Advertising, users data

Advertising, users data

Steem and Steem Dollars cryptocurrencies

Foundation, donations

Donations

Donations

Donations

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

No

No

No

No

No

 

Note: you can use Instagram and Twitter through their open source advertising-free and privacy friendly alternative interfaces Bibliogram and Nitter.

 

Video content services and applications

Feature

Project

YouTube

Vimeo

DailyMotion

DTube

PeerTube

Internet File

Developer

Google

Vimeo

Vivendi

DTube

Framasoft

Internet File

Open source

No

No

No

Yes

Yes

Yes

Architecture

Centralized

Centralized

Centralized

Decentralized

Decentralized

Centralized

Infrastructure jurisdiction

USA

USA

Francia

World

World

USA

Quality/quantity video

High/Maximum

High/High

High/High

High/Low

High/Low

High/Low

Features

YouTube

Vimeo

DailyMotion

DTube

PeerTube

Internet File

Web/Android/iOS

Yes/Yes/Yes

Yes/Yes/Yes

Yes/Yes/Yes

Yes/Yes/Yes, via DTubeViewer

Yes/Yes, via NewPipe/Yes, via any browser

Yes/Yes/Yes

Contents download

No, via NewPipe/SkyTube or Firefox.

Yes, content from paid users

Yes, native apps only

Yes, via DTubeViewer

Yes

Yes

Contents upload

Yes, unlimited, 15 minutes and 12 hours verified users

Yes, 5 GB, 7 TB paid version

Yes, unlimited

Yes, unlimited

Yes, 1 GB

Yes, unlimited, recommended 50 GB

Registration required

Yes

Yes

Yes

Yes

Yes

Yes

Censorship

Yes

Yes

Yes

No

No

Yes

Business model

Advertising, users data, paid features

Users data, paid features

Advertising, users data

Steemit cryptocurrency

Donations

Donations

Advertising, tracking and profiling

Yes

Yes

Yes

No

No

No

Note: you can use YouTube through its open source advertising-free and privacy friendly alternative interface Invidious.

 

Office services and applications

Feature

Project

Microsoft office

Microsoft office365

Google docs

Apache OpenOffice

LibreOffice

Collabora (NextCloud+LibreOffice)

Developer

Microsoft

Microsoft

Google

Apache

The Document Foundation

Collabora/NextCloud/The Document Foundation

Open source

No

No

No

Yes

Yes

Yes

Architecture

Decentralized

Centralized

Centralized

Decentralized

Decentralized

Decentralized/centralized

Quality/functionality

High/High

High/High

High/High

Average/Average

High/High

High/High

GNU/Linux/Windows/macOS/Android/iOS

No/Yes/Yes/Yes/Yes

No/Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes/Yes

Yes/Yes/Yes/No/No

Yes/Yes/Yes/Yes (viewer)/No

Yes/Yes/Yes/Yes/Yes

Version Web

No

Yes

Yes

No

No

Yes

Microsoft Office format (.doc, .xls, .ppt, etc.) support

Yes

Yes

Yes

Yes

Yes

Yes

Microsoft Office XML format (.docx, .xlsx, .pptx, etc.) support

Yes

Yes

Yes

No, only reading

Yes

Yes

Open Document Format (ODF) (.odt, .ods, .odp, etc.) support

Yes

Yes

Yes

Yes

Yes

Yes

PDF format support

Yes

Yes

Yes

Yes

Yes

Yes

Collaboration tools

No

Yes

Yes

No

No

Yes

Business model

Paid licence, advertising, users data

Paid licence, advertising, users data

Paid advanced features, advertising, users data

Donations

Donations

Donations, paid features

Advertising, tracking and profiling

Yes

Yes

Yes

No

No

No

 

Some applications on the Web useful as collaborative tools:

 

PDF and eBook readers:

Antivirus or antimalware services and applications

Feature

Project

Windows defend

Avast Free Security Suite

MalwareBytes

Avira Free Antivirus

Comodo Internet Security

Immunet

ClamAV

Developer

Microsoft

Avast

MalwareBytes

AvIre

Comodo

Cisco

Community

Open source

No

No

No

No

No

No (use ClamAV)

Yes

GNU/Linux/Windows/macOS/Android/iOS

No/Yes/No/No/No

No/Yes/Yes/Yes/No

No/Yes/Yes/Yes/Yes

No/Yes/Yes/Yes/Yes

Yes/Yes/Yes/No/No

No/Yes/No/No/No

Yes/Yes, via ClamWin/Yes/No/No

Real time protection/boot scan

Yes/No

Yes/Yes

Yes/Yes, limited trial period

Yes/Yes

Yes/Yes

Yes/No

Yes, partial

CloudAV Protection

No, Windows 10 only

Yes

Yes, limited trial period

Yes

 

 

No

Heuristic support

No

Yes

Yes, limited trial period

Yes

 

No

No

Email/anti-spam scanning support

No

Yes/No, paid version only

No/No

Yes/No

Yes/Yes

Yes/No

Yes/No

Web browsing protection support

No, Edge only

Yes

No

Yes

Yes

No

No

Rootkit protection

No

Yes

Yes, limited trial period

Yes

Yes

Yes

No, GNU/Linux and macOS only via Rootkit Hunter

Advanced ransomware protection

No

No, paid version only

Yes, limited trial period

No, paid version only

No

Yes

No

Firewall

Yes, Windows firewall

No, paid version only

No

No

Yes

No

No

Business model

Advertising, users data

Paid version, users data

Paid version, users data

Paid version, users data

Paid version, users data

Users data

Donations

Advertising, tracking and profiling

Yes

Yes

Yes

Yes

Yes

Yes

No

Some alternatives to protect your devices:

Authenticator services and applications 2FA

Feature

Project

Google authenticator

Authy

FreeOTP

Tofu

Aegis

Proton Pass

Authenticator Browser

Developer

Google

Twilio

FreeOTP

Community

Beem

Proton

Community

Open source

No

No

Yes

Yes

Yes

Yes

Yes

GNU/Linux/Windows/macOS/Android/iOS

No/No/No/Yes/Yes

Yes/Yes/Yes/Yes/Yes

No/No/No/Yes/Yes

No/No/No/No/Yes

No/No/No/Yes/No

Yes/Yes/Yes/Yes/Yes

Yes/Yes/Yes/No/No

Memory encryption support

No

Yes

No

Yes

Yes

Yes

Yes

Clear/password/openPGP backup support

No/No/No

No/No/No

No/No/No

No/No/No

Yes/Yes/No

Yes/Yes/Yes

Yes/Yes/No

Compatible with Google authenticator

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Cloud synchronization

Yes, via Google Drive

Yes, via Authy

No

No

No

Yes, via Proton Drive

Yes, via Google Drive/Dropbox

TOTP/HOTP support

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Business model

Users data, advertising

Paid version only

Donations

Donations

Donations

Paid version only

Donations

Advertising, tracking and profiling

Yes

No

No

No

No

No

No

 

Note: Proton Pass and Bitwarden are password managers and 2FA authenticators, but it is not recommended to keep saved passwords and authentication code generation in the same place.

 

Note: a very good guide on how two factor authentication (2FA) works and the necessary precautions.

 

Note: a very good list of services and applications that support two factor authentication (2FA).

 

Password management services and applications

Feature

Project

Lastpass

Dashlane

1password

Keepassxc

Firefox

Bitwarden

Proton Pass

Lesspass

Developer

Lastpass

Dashlane

1password

Community

Mozilla

Bitwarden

Proton

Community

Open source

No

No

No

Yes

Partially

Yes

Partially

Yes

Web/GNU/Linux/Windows/macOS/Android/iOS/browser

Yes/Yes/Yes/Yes/Yes/Yes/Yes (Firefox, Brave, Chrome, Edge, Safari)

Yes/Yes/Yes/Yes/Yes/Yes/Yes (Firefox, Brave, Chrome, Safari)

Yes/Yes/Yes/Yes/Yes/Yes/Yes (Firefox, Brave, Chrome, Safari)

No/Yes/Yes/Yes/Yes/Yes/Yes (Firefox, Brave, Chrome)

No/No/No/No/Yes/Yes/Yes, Firefox only via Sync

Yes/Yes/Yes/Yes/Yes/Yes/Yes (Firefox, Brave, Chrome, Edge, Safari)

No/No/No/No/Yes/Yes/Yes (Firefox, Brave, Chrome, Edge)

No/No/No/No/Yes/Yes/Yes (Firefox, Brave, Chrome)

Architecture

Centralized

Centralized

Centralized

Decentralized

Centralized/decentralized

Centralized/decentralized

Centralized

Local, no storage

E2E encryption

Yes

Yes

Yes

No, not necessary

Yes

Yes

Yes

No, not necessary

2FA – two factor authentication

Yes

Yes

Yes

No, not necessary

Yes

Yes

Yes

No, not necessary

Master password/Secret key

Yes/No

Yes/Yes, optional

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Yes/Yes

Offline password derivation

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Data encryption/brute force attack prevention

AES256/PBKDF2-SHA256

AES256/Argon2d-SHA256

AES256/PBKDF2-HMAC-SHA256

AES256-ChaCha20/HMAC-SHA256-Argon2id

AES256/PBKDF2-HMAC-SHA256

AES256/Argon2-SHA256

AES256/bcrypt-SHA256

AES256/PBKDF2-SHA256

Devices synchronization

Yes

Yes

Yes

Yes, via Keyshare

Yes

Yes

Yes

No, not necessary

Business model

Users data, paid licence

Users data, paid licence

Paid licence

Donations

Donations

Paid licence

Paid licence

Donations

Advertising, tracking and profiling

Yes

Yes

No

No

No

No

No

No

 

 

 

A robust password meets the following requirements:

 

 

 
 

Android apps catalogue

Feature

Project

Google Play

Apk-pure

Aptoide

Aurora Store

F-Droid

Developer

Google

Topk-pure

Aptoide

Community

Community

Open source

No

No

Yes

Yes

Yes

Quality/quantity apps

High/High

Average/Average

High/High

High/High

High/Average

Registration required

Yes

No

No, available

No, paid app only

No

Preinstalled apps store

Google catalogue

Apk-pure catalogue

Collection of catalogues

Google catalogue

Open source catalogue

Type of applications

Open source/closed source/paid

Open source/closed source

Open source/closed source

Open source/closed source/paid

Open source

Security

Average, possibility of virus and counterfeiting

Low, high possibility of virus and counterfeiting

Average, possibility of virus and counterfeiting

Average, possibility of virus and counterfeiting

High, no possibility of virus and counterfeiting

Sharing apps via local network (WiFi, Bluetooth)

No

No

No

No

Yes

Required secure source installation/root user

No/No

Yes/No

Yes/No

Yes/No

Yes/No

Remote control of apps by providers

Yes

No

No

No

No

Business model

Users data, advertising

Users data, advertising

Users data, advertising

Donations

Donations

Advertising, tracking and profiling

Yes

Yes

Yes

No

No

 

Mobile operating systems

Feature

Project

Android (OEM)

iOS

Fire OS

Android Open Source Project (AOSP)

Tizen

Lineage OS

Lineage OS microG

Developer

Google/device manufacturers

Apple

Amazon

Google

Samsung

Community

Community

Open source

Partially (driver and mobile services closed source)

No

No

Partially (driver closed source)

Partially (driver and SDK closed source)

Partially (driver closed source)

Partially (driver closed source)

Operating system/kernel

AOSP/Linux

iOS/Darwin

AOSP/Linux

AOSP/Linux

GNU/Linux

AOSP/Linux

AOSP/Linux

Smartphone/tablet/TV/smartwatch/car/IoT

Yes/Yes/Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes/Yes/No

Yes/Yes/Yes/No/No/Yes

Yes/Yes/Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes/No/Yes

Yes/Yes/No/No/No/No

Yes/Yes/No/No/No/No

Root user

No

No

No

Yes

No

Yes

Yes

Preinstalled apps

Yes, G Suite

Yes, Apple apps

Yes, Amazon apps

No

Yes, Samsung apps

No

No

Preinstalled mobile services, libraries and API

Yes, Google Mobile Service (GSM) (Play Service, Play Store, Search)

Yes, integrated on the operating system

Yes, integrated on the operating system

No, available via microG Project

Yes, integrated on the operating system

No, available via microG Project

Yes, microG Project

Preinstalled app store

Yes, Google Play

Yes, App Store

Yes, Amazon Store

No, available via F-Droid, Aurora Store,

Open Gapps Project

Yes, Samsung Store

No, available via F-Droid, Aurora Store,

Open Gapps Project

No, available via F-Droid, Aurora Store,

Open Gapps Project

Remote control by providers

Yes

Yes

Yes

No

Yes

No

No

Virtual assistant

Yes, Google Assistant

Yes, Siri

Yes, Alexa

No

No

No

No

Business model

OEM

Apple

Amazon

Google

Samsung

Donations

Donations

Advertising, tracking and profiling

Yes

Yes

Yes

No

No

No

No

Some alternatives to the most common mobile operating system:

Note: malware tends to attack devices with Android operating system because it is the most widespread with about 86% of users while iOS with about 13% of users. The main threats come from the installation of malicious applications often from unknown sources. By using the open source application catalog F-Droid or Aurora Store catalog you can reduce these risks.

Note: Vigilante is an open source application for Android that notifies when a third-party application and/or service use the camera and/or microphone (similar to the native iOS 14 feature).

Operating systems

Feature

Project

Windows

macOS

Chrome OS

GNU/Linux

Ubuntu/Ubuntu Mate/Lubuntu

Arch linux/Manjaro

Debian

Developer

Microsoft

Apple

Google

Community

Canonical

Community

Debian/Community

Open source

No

No

Yes

Yes

Yes

Yes

Yes

Kernel

Windows NT

Darwin

Linux

Linux

Linux

Linux

Linux

PC/server/mainframe/supercomputer/embedded

Yes/Yes/No/No/Yes

Yes/No/No/No/No

Yes/No/No/No/Yes

Yes/Yes/Yes/Yes/Yes

Yes/Yes/No/Yes/Yes

Yes/Yes/No/Yes/Yes

Yes/Yes/No/Yes/Yes

Package manager

No, third parts Chocolatey

No, third parts MacPort, Homebrew

No, compatible app GNU/Linux

Yes

APT

Pacman

APT

Preinstalled app store

Yes, Windows store

Yes, AppStore

Yes, Google Play

No

Yes, GNOME software, Synaptic

No

Yes, Software center

Remote control by providers

Yes

Yes

Yes

No

No

No

No

Virtual assistant

Yes, Cortana

Yes, Siri

Yes, Google Assistant

No

No

No

No

Business model

Paid licence, Microsoft

Apple

Google

GNU/Linux foundations, donations

Canonical, donations

Foundation, donations

Debian foundation, donations

Advertising, tracking and profiling

Yes

Yes

Yes

No

Yes, Ubuntu only

No

No

 

Some alternatives to the most common operating system:

Note: malware  tends to attack computers running Windows for various reasons:

The main threats stem from the installation of malicious applications often downloaded from the Internet. Using the Chocolatey catalog or Windows store you can reduce these risks.

Smartphone

Feature

Project

Android

iPhone

Fire phone

Fairphone 3

Librem 5

Pinephone

Developer

Google/fabricantes de equipos

Apple

Amazon

Fairphone

Purism

Pine 64

Open software/hardware

Partially/No

No/No

No/No

Yes/No

Yes/Yes

Yes/Yes

Removable battery

No, excluding the exceptions

No

No

Yes

Yes

Yes

Physical power buttons camera/microphone/WiFi/GPS

No/No/No/No

No/No/No/No

No/No/No/No

No/No/No/No

Yes/Yes/Yes/Yes

Yes/Yes/Yes/Yes

Operating system

Android (OEM)

iOS

Android (OEM)

Android (OEM) e AOSP

Pure OS

GNU/Linux

Alternative operating system

Yes, if supported by Lineage OS, Ubuntu Touch, Postmarket OS

No

No

Yes, Fairphone Open, Ubuntu Touch, Sailfish OS

Yes, Ubuntu Touch, Postmarket OS

Yes, Ubuntu Touch, Postmarket OS, Sailfish OS, Plasma Mobile

Root user

No

No

No

Yes

Yes

Yes

Preinstalled apps

Yes, G Suite

Yes, Apple apps

Yes, Amazon apps

Yes, G Suite removible

Yes, removible

No

Preinstalled mobile services, libraries and API

Yes, Google Mobile Service (GSM) (Play Service, Play Store, Search)

Yes, integrated in the operating system

Yes, integrated in the operating system

Yes, Google Mobile Service (GSM) (Play Service, Play Store, Search) removible

Yes, Librem.one removible

No

Preinstalled app store

Yes, Google Play

Yes, App Store

Yes, Amazon Store

Yes, Google Play removable

No, available GNOME software, Software center

No, available GNOME software, Software center

Remote control by providers

Yes

Yes

Yes

Yes, removable

No

No

Virtual assistant

Yes, Google Assistant

Yes, Siri

Yes, Alexa

Yes, Google Assistant removable

No

No

Business model

Google, OEM

Apple

Amazon

Fairphone Fairtrade

Purism

Pine 64

Advertising, tracking and profiling

Yes

Yes

Yes

Yes, removable

No

No

 

Detoxification from data: how to use your smartphone intelligently.

 

Bibliography:

 

License:

This document is released under the Creative Commons Attribution-ShareAlike CC BY-SA license.

 
 
Images and content not produced by this work, but available on the Web, are released with their original license.

fpoi

freedom.privacy.internet@pm.me