(7 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{{GuideNotice}}
{{GuideNotice}}
{{StubNotice}}
<!--{{StubNotice}}-->
{{Alert|This guide is meant for, either internet online consumers, or people looking for an alternative. I (the original author) do not endorse any sensitive activity and is not responsible for any damages that may have caused. This is meant to be a longer and insightful version of the one found in the Main_Page that needs improving. It can go separate ways.|message=This guide is meant for, either internet online consumers, or people looking for an alternative. I (the original author) do not endorse any sensitive activity and is not responsible for any damages that may have caused. This is meant to be a longer and insightful version of the one found in the Main_Page that needs improving. It can go separate ways.}}
{{Alert|This guide is meant for, either internet online consumers, or people looking for an alternative. I (the original author) do not endorse any sensitive activity and is not responsible for any damages that may have caused. This is meant to be a longer and insightful version of the one found in the Main_Page that needs improving. It can go separate ways.|message=This guide is meant for, either internet online consumers, or people looking for an alternative. I (the original author) do not endorse any sensitive activity and is not responsible for any damages that may have caused. This is meant to be a longer and insightful version of the one found in the Main_Page that needs improving. It can go separate ways.}}
<!--{{Delete|I have changed my mind on this, since I am new here I didn't dig deeper in such guidelines and I haven't bothered to ask an admin about this, I do not want to maintain this anymore, and I don't want to deal with this guide anymore, I will focus on making guides that is appropriate for the wiki itself, and not for my own self-interest like I have made here as an example. My apologizes if I have made any inconvenience to any staff out there, I wish I could have done better then this one, kinda new to making articles to be honest.}}-->


==Introduction One (1) - Why was this made?==
==Introduction One (1) - Why was this made?==
Simply because of the lack of new guides being added, or simply, because other guides on the [[wikipedia:Clearnet_(networking)|clearnet]] are, most likely, unreliable. There are many reasons why, however, I (The original author, aka contributor) want to make it clear that this is simply a guide for anyone seeking privacy, and/or anonymity, even though we (The Consumer Rights Wiki) already have a page dedicated to this in the [https://consumerrights.wiki/Main_Page main page], but that is a issue on it's own as it isn't universal. It was made, and in summery, to provide an alternative to other mainstream platforms such as [https://www.privacyguides.org/en/ PrivacyGuides.org] and [https://www.privacytools.io/ PrivacyTools.io], to improve on those ideas and to provide basic to advanced consumer-level privacy and anonymity services, and software, that I (Original Author), recommend based on my (Original Author) experience and other sources that I may have viewed on the [[wikipedia:Darknet|darknet]] (Which may be depending on the credibility on the sources, it still provides the valuable information out, as of current writing).
Simply because of the lack of new guides being added, or simply, because other guides on the [[wikipedia:Clearnet_(networking)|clearnet]] are, most likely, unreliable. There are many reasons why, however, I (The original author, aka contributor) want to make it clear that this is simply a guide for anyone seeking privacy, and/or anonymity, even though we (The Consumer Rights Wiki) already have a page dedicated to this in the [https://consumerrights.wiki/Main_Page main page], but that is an issue on it's own as it isn't universal. It was made, and in summery, to provide an alternative to other mainstream platforms such as [https://www.privacyguides.org/en/ PrivacyGuides.org] and [https://www.privacytools.io/ PrivacyTools.io], to improve on those ideas and to provide basic to advanced consumer-level privacy and anonymity services, and software, that I (Original Author), recommend based on my (Original Author) experience and other sources that I may have viewed on the [[wikipedia:Darknet|darknet]] (Which may be depending on the credibility on the sources, it still provides the valuable information out, as of current writing).


Summary: It was made to provide an alternative to popular mainstream privacy sources such as [https://www.privacyguides.org/en/ PrivacyGuides.org] and [https://www.privacytools.io/ PrivacyTools.io], to combat inaccuracies and misleading information. While there is a Consumer Tools page, it is not universal and is short to be fully used for consumer privacy and security, which is lacking. This guide is designed for average daily consumer that just wants to get away with Big Tech, or consumer violations.
Summary: It was made to provide an alternative to popular mainstream privacy sources such as [https://www.privacyguides.org/en/ PrivacyGuides.org] and [https://www.privacytools.io/ PrivacyTools.io], to combat inaccuracies and misleading information. While there is a Consumer Tools page, it is not universal and is short to be fully used for consumer privacy and security, which is lacking. This guide is designed for average daily consumer that just wants to get away with Big Tech, or consumer violations.


===Why not security? Why isn't it mentioned?===
===Why not security? Why isn't it mentioned?===
It can go both ways, either you use a Operating System (E.g [[Apple|MacOS]]) that is still maintained and is considered the "best of the best" in terms of security, while it is moderately privacy friendly, it still can perform actions that may be considered "Privacy Invasive" or "Surveillance Software" such as [https://www.whonix.org/wiki/Host_Operating_System_Selection#Windows_Surveillance scanning your files] such as [https://www.whonix.org/wiki/Host_Operating_System_Selection#Windows_Backdoors documents] uploaded to cloud for example, or having access to your local files.<ref>{{Cite news |first=ldsandon |date=February 24th, 2016. |title=Scaring: Windows 10 lets Microsoft access your own local files |url=https://www.sandon.it/node/104 |url-status=dead |archive-url=https://web.archive.org/web/20160325072357/http://www.sandon.it/node/104 |archive-date=March 25, 2016 |access-date=August 26th, 2025 |work=Sandon}}</ref>  
It can go both ways, either you use an Operating System (E.g [[Apple|MacOS]]) that is still maintained and is considered the "best of the best" in terms of security, while it is moderately privacy friendly, it still can perform actions that may be considered "Privacy Invasive" or "Surveillance Software" such as [https://www.whonix.org/wiki/Host_Operating_System_Selection#Windows_Surveillance scanning your files] such as [https://www.whonix.org/wiki/Host_Operating_System_Selection#Windows_Backdoors documents] uploaded to cloud for example, or having access to your local files.<ref>{{Cite news |first=ldsandon |date=February 24th, 2016. |title=Scaring: Windows 10 lets Microsoft access your own local files |url=https://www.sandon.it/node/104 |url-status=dead |archive-url=https://web.archive.org/web/20160325072357/http://www.sandon.it/node/104 |archive-date=March 25, 2016 |access-date=August 26th, 2025 |work=Sandon}}</ref>  


Either way, security is also important in this guide, also. But, what is important is you, the consumer, should understand that, while it may become popularized in the future (Privacy & Anonymity), there are other software services that offer security (Maintained, or Design) such those that are still updated or have by-design features such as [[wikipedia:Plausible_deniability|plausible deniability]]  or [[wikipedia:Virtualization|virtualization]]. Either way, any software listed here is maintained, and those that are not are removed and instead replaced with a up-to-date version.
Either way, security is also important in this guide, also. But, what is important is you, the consumer, should understand that, while it may become popularized in the future (Privacy & Anonymity), there are other software services that offer security (Maintained, or Design) such those that are still updated or have by-design features such as [[wikipedia:Plausible_deniability|plausible deniability]]  or [[wikipedia:Virtualization|virtualization]]. Either way, any software listed here is maintained, and those that are not are removed and instead replaced with a up-to-date version.
Line 30: Line 32:
Because many of us (you the viewer and the wiki contributors) know that they simply cannot be trusted, no matter what. You may have seen that [[Google]] is introducing an [[Android]] "certified devices" update regarding [[Google|Google Play]] when [[Google plans to restrict sideloading of Android apps|developers have to verify themselves]] and to prevent side-loading. Which, in the process of verification, it can lead into [[de-anonymization]]. Another one, [[Microsoft]] acknowledged the fact that what Windows 10 is doing is illegal in terms of privacy.<ref>{{Cite news |last=Davey |first=Winder |date=Aug 28, 2019, 03:40am EDT |title=Microsoft Confirms Windows 10 Privacy Investigation With A $4 Billion Sting |url=https://www.forbes.com/sites/daveywinder/2019/08/28/microsoft-confirms-windows-10-privacy-investigation-with-a-4-billion-sting/ |url-status=live |archive-url=https://www.forbes.com/sites/daveywinder/2019/08/28/microsoft-confirms-windows-10-privacy-investigation-with-a-4-billion-sting/ |archive-date=May 7th, 2025 |access-date=August 28th, 2025 |work=Forbes}}</ref> Or how about [[Mozilla]], having their [[firefox]] to have a [[terms of service]] ([[Mozilla introduces TOS to Firefox|2]]) because they are an [https://www.mozilla.org/en-US/advertising/ advertising company]. How about [[Apple]] having their MacOS having an increased [https://www.youtube.com/watch?v=FQ84qw4ZMxc surveillance capabilities]. There are many examples of this and honestly, there are '''many reasons why you should not trust big tech corporations''' like these.
Because many of us (you the viewer and the wiki contributors) know that they simply cannot be trusted, no matter what. You may have seen that [[Google]] is introducing an [[Android]] "certified devices" update regarding [[Google|Google Play]] when [[Google plans to restrict sideloading of Android apps|developers have to verify themselves]] and to prevent side-loading. Which, in the process of verification, it can lead into [[de-anonymization]]. Another one, [[Microsoft]] acknowledged the fact that what Windows 10 is doing is illegal in terms of privacy.<ref>{{Cite news |last=Davey |first=Winder |date=Aug 28, 2019, 03:40am EDT |title=Microsoft Confirms Windows 10 Privacy Investigation With A $4 Billion Sting |url=https://www.forbes.com/sites/daveywinder/2019/08/28/microsoft-confirms-windows-10-privacy-investigation-with-a-4-billion-sting/ |url-status=live |archive-url=https://www.forbes.com/sites/daveywinder/2019/08/28/microsoft-confirms-windows-10-privacy-investigation-with-a-4-billion-sting/ |archive-date=May 7th, 2025 |access-date=August 28th, 2025 |work=Forbes}}</ref> Or how about [[Mozilla]], having their [[firefox]] to have a [[terms of service]] ([[Mozilla introduces TOS to Firefox|2]]) because they are an [https://www.mozilla.org/en-US/advertising/ advertising company]. How about [[Apple]] having their MacOS having an increased [https://www.youtube.com/watch?v=FQ84qw4ZMxc surveillance capabilities]. There are many examples of this and honestly, there are '''many reasons why you should not trust big tech corporations''' like these.


You might ask yourself: "Which one should I trust?" The answer depends, and will most likely lead to it being '''no'''. But the issue itself is that, while you may have seen [[Proton]] advertised everywhere, including their sponsors online, such as [https://protonvpn.com/ ProtonVPN], or their password manager [https://proton.me/pass Proton Pass]. However, nobody should be trusting an marketing strategy. But for now, they should be "trustworthy" as of the current writing.  
You might ask yourself: "Which one should I trust?" The answer depends, and will most likely lead to it being '''no'''. But the issue itself is that, while you may have seen [[Proton]] advertised everywhere, including their sponsors online, such as [https://protonvpn.com/ ProtonVPN], or their password manager [https://proton.me/pass Proton Pass]. However, nobody should be trusting a marketing strategy. But for now, they should be "trustworthy" as of the current writing.  


For now this will be a list of "trusted*" corporations that we the contributors put into.
For now this will be a list of "trusted*" corporations that we the contributors put into.


*[https://proton.me/ Proton AG]
*[https://proton.me/ Proton AG] (There are many reports that indicate its untrustworthy in recent news)
*[https://tuta.com/ Tuta]
*[https://tuta.com/ Tuta]


Line 41: Line 43:


The issue is that we shouldn't trust our own governments just because they are 'honest', which they aren't, we gotta be speculative on the things that they pose a danger to. Do note that we do not endorse any sort of sensitive activity when it comes to, say, endorsing or promoting [[wikipedia:Anarchism|anarchism]], that is a separate issue that you must figure it out. Ideally, there is no such thing as a true good government.
The issue is that we shouldn't trust our own governments just because they are 'honest', which they aren't, we gotta be speculative on the things that they pose a danger to. Do note that we do not endorse any sort of sensitive activity when it comes to, say, endorsing or promoting [[wikipedia:Anarchism|anarchism]], that is a separate issue that you must figure it out. Ideally, there is no such thing as a true good government.
===Why should my traffic be on Tor Browser?===
It depends, if you are in a country known for state surveillance or "police state" then you should, otherwise, it is optional as long as your ISP isn't known to sell data about your internet activity (sometimes this is called "logs" in my case). For that to actually hide your usage of Tor, you need to use Tor bridges, which is in the connections tab.
===How do I manually audit the code for malware (e.g backdoor, spyware, keylogger...)===
In order to actually do this, in a literal sense, you would need to have a programming knowledge, and for this reason, you must learn the programming language it is written in, if it is C, learn C, if it Python, learn Python, and so on and so forth. However, if you don't have time for doing so, you gotta use an LLM or an AI "chatbot" to do so for you, however it may lead into inaccuracies or [[wikipedia:Hallucination_(artificial_intelligence)|artificial hallucination]], which may be a drawback but it is worth the risk, if you don't want to do so, learn programming and then learn a easy to learn programming language like Python or Go, this is an advice, so bear with us. 


==Manual One (1) - The basics==
==Manual One (1) - The basics==
Line 79: Line 87:
|None. It is obvious.
|None. It is obvious.
|-
|-
|
|Artificial intelligence training data about you
|
|If you shared something sensitive, like your medical or disability status, your vulnerabilities, or as such. It could lead into increased AI capabilities that it will understand natural language processing, and for the worst, reinforced bias (which is a ethical implication).
|
|Don't use artificial intelligence, simple.
|
|There is a [https://www.searchenginejournal.com/google-gemini-privacy-warning/507818/ article] that details it. However, for the time being it is at least for now okay to use alternatives such as Duck.ai and Brave Leo, all of which are for now, safe to use as an alternative.
|}
|}
==Manual Two (2) - Consumer-friendly alternatives==
Just a clear heads up, we do not endorse any of these, just that it is recommended, nothing else.
===Software-level alternatives and recommendations===
====Operating System (OS)====
A side note: if you are going to use those distributions for production work, make sure to encrypt your hard drive upon installation (the partitioning), this will increase security in case of theft or the law enforcement or dubbed as "feds" trying to snoop in on your unencrypted hard drive.
#[https://linuxmint.com/ Linux Mint]
##Often recommended for beginners to those that are familiar with the traditional Windows desktop experience. Stable, but it is generally a lightweight version of Ubuntu. Does not contain any form of OS-level tracking whatsoever.
#[https://www.debian.org/ Debian]
##A one distribution that has inspired many distributions that are based off of, such as Ubuntu for example. It is rock-solid stable, it is lightweight, and has customization options in the installation menu when you start Debian for the first time.
#[https://www.kicksecure.com/ KickSecure]
##Based on Debian (but hardened), it is secure, and has a great documentation detailing your usage on that said distribution. It is free software, as they have claimed to be, and has [https://xfce.org/ Xfce] as its default desktop environment, making the distribution lightweight and performant.




==References==
==References==
<references />
<references />