Anonymity
Principles 4 & 6: Data sovereignty & Transparency
Tor Browser
Browse the web anonymously. Tor routes your traffic through a network of volunteer-run relays, making it difficult to trace your activity back to you. Used by journalists, activists, and anyone who needs to move freely online. The network becomes stronger as more people use it.
Go to Tor →
Operating System
Principle 7: Resilience
Linux
An open-source operating system that puts you in control of your machine. No telemetry, no forced updates, no hidden processes. Distributions exist for every level of experience: Ubuntu and Fedora for beginners, Debian for stability, Arch for full control.
Explore distributions →
Network Layer
Principle 4: Data sovereignty
Mullvad VPN
A VPN with no accounts, no email required, and no activity logs. You pay, they provide access, without tracking. Independently audited and designed to minimise data collection by default.
Go to Mullvad →
Self-Hosting
Principles 5 & 7: Subsidiarity & Resilience
YunoHost
A server operating system designed to make self-hosting accessible. Install and manage your own email, cloud storage, and collaborative tools from a simple interface. Run your own infrastructure without being a system administrator.
Go to YunoHost →
Collaborative Documents
Principles 4 & 6: Data sovereignty & Transparency
CryptPad
End-to-end encrypted collaborative documents. Everything is encrypted in your browser before it leaves your machine, so even the server operator cannot read your files. A privacy-respecting alternative to mainstream document platforms.
Go to CryptPad →
Knowledge & Practice
Principles 6 & 7: Transparency & Resilience
Surveillance Self-Defense
A practical guide to digital autonomy by the EFF. Covers threat modeling, tool selection, and step-by-step practices for protecting your data and communications. Designed for activists, journalists, and anyone who wants to understand their risks.
Go to EFF →