75+ Free and Open-Source Tools to Enhance Your Privacy and Security
When you’re online or even working on your laptop without an internet connection, the programs you use track, analyze, store, and even share or sell much of your data-personal details, location, usage, and habits.
While this can help ads feel more targeted to you and your interests, it also exposes you to telemarketers, scam callers, and possibly even cybercriminals.
But there are affordable, high-quality solutions to help protect your privacy; free, open-source software solutions that anyone can regularly review can provide more privacy than expensive, proprietary software.
In this article, I’ve gathered dozens of free, open-source tools and programs covering operating systems, firmware, networks, and everyday apps. Each are selected for its features or policies that respect your privacy, keep you anonymous, encrypt your data, or protect you from malware, cyberattacks, or surveillance.
Glossary of Privacy and Security Features
This article provides a short list of basic terminologies to help you understand the features of some of the programs and tools.
Encryption |
|
End-to-end encryption (E2EE) |
|
Server-side encryption |
|
Hashing |
|
Zero-knowledge |
|
Decentralized network |
|
Two-factor authentication (2FA) |
|
Bug bounty program |
|
Operating Systems
An operating system (OS) manages your device’s hardware, software, and other interconnected systems. Just like proprietary systems, open-source systems are subject to malware and cyberattacks, so look for security features such as process or app isolation, encryption, and regular updates.
Several options are portable and can run from a USB device or external hard drive, leaving no trace of your personal data. Typically, open-source OSs store your data only for their usage and legal requirements, but you can always review the source code or consult the development community.
1. Linux Mint
Website: https://linuxmint.com/
Key features: Easy to use, pre-installed software
If you’re switching from Windows, the Linux Mint OS will have an easy learning curve. Built as a fork from the popular Ubuntu, this Linux distribution removes features that could be potentially harmful to privacy found in Ubuntu Core, such as containerized software packages. While Linux Mint doesn’t incorporate encryption and anonymized connections by default, you can install a VPN, Tor browser, and other privacy-enhanced apps.
Installation is easy and works “out-of-box” with minimum configuration. It has pre-installed software to help you get started quickly, such as LibreOffice (office suite), Gimp for image editing, Blender for 3D work, Inkscape for vector graphics, Spotify for music, and Steam for gaming.
2. Pop!_OS
Website: https://pop.system76.com/
Key features: Easy to use, OS for content creators, default encryption, ad-free
Pop!_OS is a Linux distribution based on Ubuntu that is for STEM professionals and creatives. Through an integrated software center, you can easily install software for bioinformatics, engineering, deep learning, and media production. Pop!_OS can be customized for optimal workflow and has features such as auto-tiling windows, window stacking, and easy keyboard shortcuts.
Pop!_OS guards your privacy with encrypted installation and partitions, protecting data from loss, theft, and malware. It doesn’t track your activities or share telemetry data for analysis. If you ever need a fresh install, you can run the installation and still keep important files in your Home folder.
3. elementaryOS
Website: https://elementary.io/
Key features: Easy to use, built-in privacy tools, routine cleanup
elementaryOS is built with several privacy features to protect your data and online freedom. For example, the Tattle-Tale feature notifies users about what an app is doing. You’ll receive notifications if an app tries to use your camera or microphone or pulls much of the CPU power. Apps also need permission to access your data or devices. Another feature is the routine cleanup, in which temporary and binned files are regularly cleared to help prevent data leaks.
The AppCenter, which comes with the OS, houses apps from independent developers that have been reviewed to ensure they comply with the operating system’s privacy and security policies. Bonus features include personalization options such as multitasking views and a do-not-disturb mode to help you work.
4. Fedora Workstation
Website: https://fedoraproject.org/workstation/
Key features: Easy to use, great for developers, regular updates, ad-free
Fedora Workstation comes with pre-installed software and software repositories that automatically install updates, making it accessible to non-technical users. OS releases are regular, with a version coming out every six months and receiving updates for the next 13 months. It has no ads, and your data isn’t sold or shared with third parties.
Developers will love the GNOME Boxes, which make virtualization simple with a choice of multiple operating systems to run. You’ll also get easy access to Red Hat’s containers, packages, developer tools, and runtimes from the OS.
5. Arch Linux
Website: https://archlinux.org/
Key features: For advanced users, highly customizable, command-line interface, popular among cybersecurity experts
Arch Linux is a Linux distribution made for highly technical users who want control over their data and OS features. It’s built with minimal frills and features, without a graphical user interface (GUI), and only a command-line interface after a fresh installation.
You can customize your security and privacy features by choosing software packages and components. One recommendation is the BlackArch repository, which offers many cybersecurity features, including tools for penetration testing.
The Arch Wiki is among the most comprehensive documentation available. A small community of developers supports the OS and operates under a rolling release model, in which updates are frequent and made as soon as available.
6. Qubes OS
Website: https://www.qubes-os.org/
Key features: For advanced users, strong software isolation, integrated virtual machines, Tor integration
Qubes OS is designed with compartmentalization in mind, allowing users to run separate spaces for work, personal, and other aspects of their lives. The OS works by launching lightweight virtual machines (VMs), called qubes, for each use, ensuring that any security or privacy breach in one space would not affect others. For example, you can set up a qube for your banking activities to protect it from any spyware or malware from other spaces.
For activities that can risk your privacy, such as web browsing, you can launch a disposable – a lightweight qube that will self-destruct after closing. Additionally, you can use the internet anonymously using the Tor network through the operating system’s integration with Whonix. More suitable for advanced users, Qubes OS has virtual machines that support multiple operating systems such as Fedora, Debian, or Windows.
7. Tails
Website: https://tails.net/
Key features: Portable, OpenPGP encryption, no tracking, Tor support
Tails is a portable OS based on the Linux distribution Debian and can be booted from a USB or SD card. It has an amnesia feature that ensures the platform leaves no trace of the sites you’ve visited, passwords typed, files downloaded, or other activities because it only runs from your computer’s RAM. However, it has a feature that can retain your settings and files in an encrypted form.
The OS uses the Tor network to protect users’ online privacy and security, and the system will block any app that tries to connect to the internet without Tor. Other secure and privacy-enhanced applications that are available include Thunderbird for encrypted email, KeePassXC for password creation and management, OnionShare for file sharing and communication over Tor, and Metadata Cleaner for metadata removal from files.
8. Whonix
Website: https://www.whonix.org/
Key features: Portable, strong isolation, Tor integration, pre-installed software
You can launch Whonix with the ease of an app from host operating systems like Windows, macOS, and Linux. For users who need a portable or live OS, Whonix can also be launched from USB sticks.
The system uses the Tor network to safeguard your security and anonymity. The architecture operates on the principle of isolation for added security, like separating Tor processes from other activities across two virtual machines. This design helps prevent DNS leaks, contain malware infection, and keep your private data secure.
Some software is preinstalled and comes with safe settings by default. They include Thunderbird for email, VLC media player, Gajim for messaging, and Electrum Bitcoin wallet.
9. PureOS
Website: https://pureos.net/
Key features: App isolation, convergence on Librem platforms, ad-free, no tracking
PureOS is based on the Linux kernel, with source code independently reviewed by developers and cybersecurity experts. It neither monitors nor logs your keystrokes, location, or usage. It’s also ad-free and comes with configurations and applications that protect your security. By default, apps are isolated through Wayland and AppArmor.
As a bonus, this OS allows true convergence (integration across different platforms) when using it on a Librem phone and laptop. In contrast, for example, Google doesn’t provide convergence as its laptop OS is Chrome while the mobile OS is Android.
Firmware
Essentially, firmware helps wake your machine and boots the required drivers, hardware components, and OS, acting as the initial bridge between your hardware and high-level OS.
One advantage of using open-source firmware is its transparency, which gives you more control over your privacy and decreases the risk of hidden security loopholes, especially as malware can attack during the boot process. Proprietary firmware may lack this level of transparency.
Flashing your mainboard or motherboard will require some technical know-how, but if you are keen to switch to open source, there are plenty of forums and guides to help you.
10. coreboot
Website: https://www.coreboot.org/
Key features: Secure, customizable, fast boot process, unbrickable update process
Coreboot is open-source firmware that can replace the ubiquitous BIOS or UEFI firmware. Its design helps users run an unbrickable update process. Before you decide on Coreboot, check out the list of supported motherboards.
Compared to proprietary firmware, coreboot provides a fast boot process as it only runs the tasks needed, from initializing the machine to transferring control to the OS. It’s also flexible, allowing you to choose the payload you want to boot the OS, storage, drivers, and other components.
In terms of security, coreboot has a minimal Trusted Computing Base that reduces the general attack surface and VBOOT2 support for a secure boot process. In addition, coreboot has a small code base, making it easier to maintain and the code auditable.
11. Libreboot
Website: https://libreboot.org/
Key features: Coreboot distribution, user-friendly, automated build, secure, customizable
If you find coreboot daunting, try Libreboot, a distribution of coreboot that comes with an automated build system and build process, as well as user-friendly instructions. Libreboot regularly releases tested versions that are pre-assembled with patches for stability. It uses coreboot for machine initialization and then offers SeaBIOS, GNU GRUB, and U-Boot as second-stage bootloader options.
For users just getting started with flashing hardware, Libreboot may be an accessible option. However, there are only a limited number of supported motherboards, and they are specific models of the Intel/AMD x86 and ARM-based architectures. You can opt to buy hardware that’s pre-loaded with Libreboot or send your device for professional installation by Minifree Ltd, owned by the founder of Libreboot.
12. OpenWrt
Website: https://openwrt.org/
Key features: Router firmware, highly customizable, WiFi improvements, firewall, VPN support
The Linux-based OpenWrt firmware supports a long list of brands and models of routers, extenders, switches, and other embedded devices, such as Asus, D-Link, Linksys, Netgear, and TP-Link. By default, OpenWrt is configured with the safest option so that you can be online without exposing your device to malicious attacks. For routers, OpenWrt can improve WiFi capabilities as it supports higher data rates and airtime fairness between stations.
The big advantage of using OpenWrt is that you can customize or extend your device’s functionalities by installing any of the 27,000 available packages. For example, you can install packages that block ads, provide IPV4/IPV6 transitioning, manage network traffic, and protect your privacy using OpenVPN or WireGuard.
Anonymous Networks
Suppose you want to escape surveillance, express your ideas or opinions freely, share sensitive information, protect your identity, or simply want better privacy. In that case, you can use networks that will make you anonymous. All the networks here use a decentralized design to hide your IP while encrypting your data, and several are designed to access the deep or dark web easily.
13. Tor
Website: https://www.torproject.org/
Key features: Onion routing, traffic encryption, anonymous browsing
Tor offers an onion-routing network and a browser called Tor Browser that lets users go online anonymously. In an onion-routing network, traffic is wrapped in three layers of encryption and then decrypted by onion nodes; it passes through randomly. This way, no single node knows both the origin and destination of your data. You can help grow the network by donating your bandwidth as a Tor relay.
Using the Tor browser hides your IP address, and ISPs can only see that you’re connected to a Tor network, helping you escape censorship and surveillance. However, using Tor results in slower speed due to the network design, and you may not be able to view certain content due to bans from certain governments, network operators, or site owners.
14. I2P
Website: https://geti2p.net/en/
Key features: P2P network, built-in proxy, E2EE, garlic routing, DPI resistant
Platforms: Windows, macOS, Linux, FreeBSD, Android port, Firefox, Chromium, OpenSSH
I2P is a decentralized network that relies on P2P nodes for traffic routing. It essentially adds a layer before your data is sent to the internet, and this layer uses encrypted unidirectional tunnels for efficient P2P connections. These tunnels segment incoming and outgoing traffic through proxy routers, hiding user IP addresses to offer more privacy with end-to-end encryption.
The network can also unblock censors, avoid detection due to pattern recognition, and have transport protocols that avoid deep-packet inspection (DPI) surveillance. Compared to Tor’s onion routing, it’s based on garlic routing, where data is divided into smaller pieces and sent through the network.
However, I2P is not designed as an anonymous proxy for the Internet; you may be better off using Tor for that. I2P is designed for browsing private Internet content, such as those on the deep or dark web.
15. Hyphanet
Website: https://www.hyphanet.org/index.html
Key features: Self-contained P2P network, data encryption
Hyphanet is a decentralized P2P network that operates differently than the others in this list. For starters, you can’t access regular internet content on Hyphanet. It doesn’t function as a proxy that anonymizes users like Tor; rather, it is a self-contained network.
To use Hyphanet, you need to sacrifice some disk space for content to be hosted on your node in this P2P network. Data is encrypted on every node, so you have no idea nor have control of what gets stored on your device.
Users can anonymously share files, publish, communicate, and browse Hyphanet content. By switching to “darknet” or friend-to-friend mode, you will only be connected to nodes you’ve identified as people you know, creating a highly secure and private network.
16. Lokinet
Website: https://lokinet.org/
Key features: Onion routing, traffic encryption, low-latency anonymous routing protocol, seamless interoperability
Platforms: Windows, macOS, Linux
Lokinet supports anonymous browsing, including access to private sites, to avoid monitoring, surveillance, and censorship. Designed as an onion-routing network, it uses Oxen service nodes and the Low-Latency Anonymous Routing Protocol (LLARP). User traffic is encrypted multiple times at exit nodes before entering the Lokinet network. Just like Tor, your identity is kept anonymous once it enters the network.
Lokinet’s advantage over Tor and I2P is that it works with any browser and other applications, such as email clients and instant messengers, without requiring a special program, update, or script.
17. ZeroNet
Website: https://zeronet.io/
Key features: Bitcoin cryptography, P2P network, built-in content database, automatic content updates, Tor support
Platforms: Windows, macOS, Linux, Android
Built using the same cryptography as Bitcoin and the same P2P technology stack as BitTorrent, ZeroNet is a decentralized network that can help protect your privacy. Content is hosted on peer nodes on ZeroNet; every time you visit a site, it downloads the content for you to become a temporary host. Updates to a website are cryptographically signed and synced to peer nodes automatically, eliminating the need to refresh sites.
ZeroNet is beneficial for activists, journalists, and independent creatives who want to publish and distribute content easily without going through a centralized network. Furthermore, it has an integrated database for data-heavy sites such as social media, which allows for faster content updates. You can customize your interface by installing plugins and other apps, and it supports the Tor browser if you need enhanced privacy.
Browsers
When searching for secure browsers that can help defend your privacy, look for features that block ads, trackers, and scripts, let you manage your cookies for privacy, and allow you to browse in incognito mode. Privacy-enhanced browsers shouldn’t take a digital fingerprint of you or collect your data. Secure browsers can protect against cyberattacks and malware infection.
18. Brave
Website: https://brave.com/
Key features: Ad blocker, tracker blocker, fingerprinting protection, support for Tor network, built-in AI assistant
Platforms: Windows, macOS, Linux, Android, iOS
Brave automatically blocks ads, trackers, and scripts. Additionally, it protects you from browser fingerprinting, a technique in which a digital fingerprint is created based on data points collected from your browsing activities, such as OS name, browser type, time zone, and screen resolution.
The architecture is designed in three layers. The first layer blocks trackers, cookies, and fingerprints. The second works on advanced security measures, such as site partitioning to stop cross-site scripting and blocking bounce trackers. The last layer focuses on ensuring limited data collection and adhering to strict privacy policies.
You can integrate Brave with the Tor network through a feature called Private Window with Tor for anonymous browsing. However, this will affect your browser speed as the connection is routed through several Tor nodes.
19. Mozilla Firefox
Website: https://www.mozilla.org/en-US/firefox/
Key features: Encrypted cloud sync, tracker blocker, customizable
Platforms: Windows, macOS, Linux, Android, iOS
While Mozilla Firefox isn’t exactly a name synonymous with privacy, the browser is still worth checking out. By default, it eliminates most trackers from advertisers, provides fingerprinting protection and blocks crypto miners from using your device as a mining resource.
You can customize Firefox for better privacy by installing extensions such as uBlock Origin, a comprehensive content blocker, or Smart HTTPS to enable secure connections for the sites you visit. The browser’s private mode doesn’t save your history, cookies, or data from your browsing sessions. It’ll give you a report of any threats it has stopped and offers insights into your online safety.
When you enable sync across devices, your data, including saved passwords, tabs, auto-fill data, bookmarks, and history, will be encrypted for syncing.
20. Tor Browser
Website: https://www.torproject.org/
Key features: Ad blocker, tracker blocker, Tor network, anonymous browsing, built-in VPN, fingerprinting protection
Platforms: Windows, macOS, Linux, Android
Tor Browser, built from Firefox, is considered one of the best browsers to use when you need anonymity or are concerned about surveillance. By routing your traffic through the Tor network, the browser hides your identity from websites and ISPs. Moreover, your data is encrypted three times as it moves through the Tor network, giving you stronger online security.
The browser also blocks scripts, ads, trackers, and fingerprinting from third parties. By default, you’re always in incognito or private mode when browsing, where cookies and browsing data are deleted after each session. It also upgrades web links you visit to a more secure encrypted connection (HTTPS) when available.
21. DuckDuckGo
Website: https://duckduckgo.com/
Key features: Search engine, browser extension, ad blocker, no tracking, fingerprinting protection, email tracker protection, GPC support
Platforms: Windows, macOS, Android, iOS, Chrome, Edge, Firefox, Opera, Safari
DuckDuckGo markets itself as a superior replacement to the Chrome browser and Google search engine, especially in terms of privacy. DuckDuckGo’s browser automatically blocks ads, third-party trackers, email trackers, and cookie pop-ups. Meanwhile, the search engine doesn’t retain your browsing history, cookies, or other information from your browsing session.
The browser supports Global Privacy Control, a set of privacy policies and protocols that informs websites of your privacy preferences, such as your refusal to allow your data to be sold or shared. DuckDuckGo is free but offers a paid subscription that provides a fast VPN, personal information removal service, and identity theft recovery service.
22. Epic Privacy Browser
Website: https://epicbrowser.com/
Key features: Ad blocker, tracker blocker, built-in VPN, fingerprinting protection, crypto miner blocker
Platforms: Windows, macOS, Android, iOS
Epic Privacy Browser offers ad, tracker, and crypto-mining blockers, as well as fingerprinting protection. It can also show who is spying on you on other browsers and the trackers that Epic has blocked. To improve security, it regularly deletes cookies and encrypts your data when connecting to websites that support encryption.
You can add additional security by enabling a feature that routes your traffic through Epic’s free encrypted proxy. The proxy servers hide your IP address and are in seven countries (the US, Canada, Singapore, France, Germany, the Netherlands, and the UK). For customization, you can install any of the extensions on the Chrome Webstore, as Epic is built from open-source Chromium.
23. Opera
Website: https://www.opera.com/
Key features: Ad blocker, tracker blocker, built-in VPN, cryptojacking protection, cross-site attack protection, DNS encryption
Platforms: Windows, macOS, Linux, Chromebook, Android, iOS
One of the oldest browsers available, Opera still offers strong privacy and security features. It blocks ads, trackers, and crypto miners and offers an incognito mode that does not track browsing data.
For users who want a more private browsing experience, Opera offers a free no-log VPN. This feature is not automatic and requires users to enable it in settings. There are three server locations for the free VPN service, but users can upgrade to the pro subscription and get access to over 30 server locations.
In terms of security, Opera segments content into isolated processes to lower the threat of cross-site attacks and data leaks. The DNS-over-HTTPS (DoH) protocol provides encryption for DNS traffic, while every browser add-on is subject to a manual review before approval for Opera’s store.
24. Ungoogled Chromium
Website: https://github.com/ungoogled-software/ungoogled-chromium
Key features: De-Googled, ad blocker, tracker blocker, enhanced file safety, cookie clearing
Platforms: Windows, macOS, Linux, Android
Ungoogled Chromium is an open-source Chromium browser without any Google features or tracking. Chromium is one of the most popular open-source browsers and is the base source code for many popular browsers like Chrome, Opera, and Microsoft Edge. However, it was developed by Google and comes with functionalities that may compromise your privacy as it uses some of Google’s web services and binaries at its core.
With Ungoogled Chromium, all requests to Google’s web services have been removed while binaries have been replaced with alternatives. Features that may compromise control and privacy are removed, while new features that promote them are added. Since it is basically Chromium without ties to Google, you can use any add-on used in Chrome for this browser. One downside is that updates need to be done manually.
25. Iridium
Website: https://iridiumbrowser.de/
Key features: Advanced users, de-Googled, portable, cookie clearing, Qwant search engine
Platforms: Windows, macOS, Linux
Iridium is a Chromium-based browser that’s suitable for advanced users. It is only available as source code tarballs, so you’ll have to unpack it, compile its source code, and install it yourself. It’s also not available on any mobile operating systems, including Android and iOS.
However, Iridium does promote user privacy by removing many Google web services and dependencies in Chromium. Cookies and other user data disappear when the browser is closed. By default, the browser does not save passwords, autofill text, or prediction domain names. Furthermore, the default search engine is Qwant, not Google. Qwant does not retain, share, or sell user data.
One downside is that Iridium provides infrequent updates, which means users may miss out on the latest Chromium updates and patches.
Extensions
Browser extensions are add-ons that can extend the browser’s functionality, such as deleting cookies and bookmarking web content. The extensions here are varied and offer different ways to safeguard your privacy and give you a smooth browsing experience.
26. ToS;DR
Website: https://tosdr.org/
Key features: Privacy policy rating system, DuckDuckGo integration
Platforms: Chrome, Firefox, Edge, Opera, Safari
ToS;DR was born out of a desire to educate the average user by interpreting the legalese in terms of service (ToS) documents for software, apps, and platforms.
This browser extension provides summarized versions of ToS documents and rates them, making it easier to understand your user rights. Each platform or software is graded from A to E, with A offering the best privacy policy where users are treated fairly, and their data is not sold or abused. DuckDuckGo’s browser has an integration with ToS;DR, combining the browser’s privacy score with the extension’s ratings to give a more comprehensive experience.
27. Decentraleyes
Website: https://decentraleyes.org/
Key features: Ad-free, no tracking
Platforms: Chrome, Opera, Firefox, Edge
Decentraleyes emulates a local content delivery network (CDN) to deliver content while blocking trackers. When you block trackers and ads, it may break certain web pages, so the extension works by finding local files, in the way a local CDN does, to load content without disrupting the browsing experience. However, it avoids large CDNs that claim to offer free services but come with a catch.
Decentraleyes is considered a complementary extension to other privacy extensions such as uBlock Origin and AdBlock Plus. It also works upon installation without requiring users to configure anything.
28. ClearURLs
Website: https://github.com/ClearURLs/Addon
Key features: URL cleaning, ad blocker, tracker blocker, batch cleaning
Platforms: Firefox, Chrome, Edge
Based on Mozilla’s WebExtensions technology, ClearURLs works optimally on Firefox and other Chrome-based browsers. Its main feature is to remove tracking data that is added to URLs when you click on links and content. It also blocks other methods of tracking, such as hyperlink auditing (which tracks users through pings in HTML) and ETag tracking (tracking elements that are added to browser caches).
Plus, you’ll get an integrated batch-cleaning feature in which multiple links with tracking data are cleared. This extension also prevents Google and Yandex from rewriting search results (which could add tracking elements).
29. Cookie AutoDelete
Website: https://github.com/Cookie-AutoDelete/Cookie-AutoDelete
Key features: Self-destructing cookies, no tracking, white/grey lists
Platforms: Chrome, Firefox, Edge
Cookie AutoDelete does what it says, and that’s deleting cookies immediately when users close a browser tab. It provides a white list for when you want to allow cookies from certain sites and a grey list for cookies that will be deleted when the browser restarts.
You can import and export your cookie preferences and easily view the number of cookies on a site. An auto cleaning feature, which you can configure in the settings, clears your cookies automatically. There’s also an option for manual cleaning if you prefer.
30. Floccus
Website: https://floccus.org/
Key features: Bookmark manager, cloud sync, cross-browser support, ad-free, no tracking
Platforms: Android, iOS, Edge, Chrome, Brave, Chromium, Firefox
The Floccus extension syncs your browser’s bookmarks across devices without collecting any data or allowing any ads. It is available on multiple browsers and as an app for Android and iOS.
You’ll need to use a syncing server such as Google Drive, Nextcloud Bookmarks, or any WebDAV-compatible service that is accessible to all your devices. Currently, you can only sync with end-to-end encryption when you use Drive or WebDav as the middle server. This feature is not available if you use Nextcloud Bookmarks or Git with Floccus.
31. NoScript
Website: https://noscript.net/
Key features: Ad-free, no tracking, tracker blocker, Tor integration
Platforms: Mozilla Firefox and derivatives, Tor, Google Chrome, Chromium-based browsers
Scripts can compromise your security and privacy, and NoScript works to only allow scripts to run from trusted sites that you choose. There are four levels of trust you can assign to a site, and the default is set to the lowest level. It also prevents cross-site scripting and well-known side-channel attacks such as Meltdown and Spectre.
This extension works best with Firefox and its derivatives, including Tor Browser, which has the extension built in. Chromium-based browsers such as Google Chrome, Microsoft Edge, and Vivaldi have feature limitations; users with these browsers won’t have access to the injection checker XSS filter and the cross-tab identity.
Ad Blockers
Ad blockers are programs that stop ads from appearing, reducing distractions and preventing data tracking. The best ad blockers let you customize extensively and are up to date with the latest cybersecurity threats. Several of the open-source apps listed below let you define which content to filter out and create white, grey, and black lists to improve your browsing experience.
32. Privacy Badger
Website: https://privacybadger.org/
Key features: Ad blocker, no tracking, content filtering
Platforms: Chrome, Firefox, Opera, Edge, and Firefox on Android
Privacy Badger, which brands itself as a privacy tool, offers a service different from ad blockers. Unlike traditional ad blockers that remove everything, Privacy Badger monitors trackers and removes them if they track users across multiple sites without permission. It doesn’t block an ad if the advertisement isn’t tracking users. The logic is that this will encourage advertisers to respect user privacy better.
Furthermore, unlike some ad blockers, Privacy Badger uses an algorithm to determine what qualifies as a tracker instead of relying on a manually created list of suspicious and harmful trackers. It also relies on learning updates from an internal training project that detects new trackers on thousands of popular sites. As such, Privacy Badger does not learn about trackers from your browsing activities to protect your privacy unless you allow it.
33. uBlock Origin
Website: https://ublockorigin.com/
Key features: Tracker blocker, no tracking, content filtering, white list, malware protection
Platforms: Chrome, Firefox, Edge, Opera
The uBlock Origin extension is a content blocker with a small footprint. It removes ads and trackers and blocks sites containing malware on Chromium-based browsers, Firefox, and versions of Safari prior to release 13. uBlock Origin is also highly customizable, allowing users to set content filtering rules and add sites to a white list.
At the time of writing, Chromium’s release of Manifest V3 (MV3), a feature that changes how browser extensions interact with content, is affecting some ad blockers, including uBlock Origin. As such, users can opt to use uBlock Origin Lite, an MV3-based content blocker on Chromium-based browsers, or to switch browsers to Firefox.
34. AdBlock
Website: https://getadblock.com/en/
Key features: Ad blocker, tracker blocker, social media ad blocker, Acceptable Ads program
Platforms: Android, iOS, Edge, Chrome, Safari, Firefox
AdBlock has over 65 million users and is available in 40 languages. This extension protects you from trackers, annoying ads, crypto miners, and malicious sites. Plus, it blocks ads on Twitch and Facebook.
In 2015, AdBlock joined the Acceptable Ads program (developed by a US nonprofit called the Acceptable Ads Committee). Ads that are deemed acceptable are those that are not intrusive or annoying, are clearly labeled as advertisements, and follow standards set by the Acceptable Ads Committee.
AdBlock is free but has a premium subscription with extra features such as cookie banner blockers, enhanced pop-up blockers, themes, backup and syncing capabilities, and user customization.
35. NextDNS
Website: https://nextdns.io/
Key features: DNS server, no logs, ad blocker, tracker blocker, malware protection, parental control, analytics
Platforms: Windows, macOS, Linux, Android and iOS, Google Chrome, Safari, Opera, Firefox, Edge
NextDNS is a DNS (domain name system) resolution service that increases security and privacy in your browser by managing DNS requests instead of using your ISP’s default DNS. It blocks malevolent domains, ads, trackers, malware, phishing attempts, crypto miners, and other threats.
Parents should check out the parental control feature that implements safe searches, filters inappropriate content, and blocks certain apps or sites on Facebook, TikTok, Snapchat, Fortnite, Instagram, Twitch, and YouTube. Furthermore, NextDNS provides comprehensive analytics and real-time logs to measure your security, privacy, and parental control strategies. You can choose where to store your logs or disable logs completely.
NextDNS is free for the first 300,000 DNS queries each month and will function as a normal DNS without blocking features for subsequent queries.
36. Adblock Ultimate
Website: https://adblockultimate.net/
Key features: Ad blocker, tracker blocker, malware protection, white list
Platforms: Android, iOS, Windows, Chrome, Firefox, Opera, Edge
AdBlock Ultimate has over 50 million monthly users. By default, it removes ads and trackers and blocks malicious sites without exception. It doesn’t come with a list of acceptable ads, so you can define which sites and advertisers to trust in a white list. By blocking all ads and trackers, users get a smoother and faster browsing experience with improved load speed and smaller memory usage and bandwidth.
This open-source browser extension is free as an Android or iOS app. It’s not free on Windows but does come with additional features, such as blocking video commercials and premium customer support.
37. Stands Free Adblocker
Website: https://www.standsapp.org/
Key features: Ad blocker, tracker blocker, malware protection, white/black list, filter customization
Platforms: Chrome, Edge, Firefox, Opera, Brave, Vivaldi, Android
Previously known as Fair Adblocker, Stands Free Adblocker removes ads, banners, autoplay video ads, and trackers. Users can check real-time data on the number of ads that were blocked for each site. Additionally, it protects against malware and phishing attempts, such as malicious sites and harmful trackers and ads.
Stands Free Adblocker offers a high degree of customization. In addition to allowing users to specify which advertisers are acceptable, users can customize filters for Facebook ads, search ads, sponsored links, and email ads. They can also create white and black lists to tailor their preferences.
Disk Encryption
Disk encryption tools can encrypt your stored files and media to protect your personal and sensitive data, especially in case of threats by malicious actors. Key features to look for include strong cryptography, the ability to encrypt multiple assets such as full disks, operating systems, and hard drive partitions, and multi-factor authentication support.
38. VeraCrypt
Website: https://veracrypt.fr/en/Home.html
Key features: Virtual encrypted disk, real-time encryption, partition encryption, hidden disk volume, multiple algorithms
Platforms: Windows, macOS, Linux
Starting as a fork from the discontinued TrueCrypt, VeraCrypt fixes many of the security issues found under its predecessor. Using encryption algorithms including AES-256, Twofish, and Serpent, it can encrypt whole disks, external storage devices such as a USB stick, and operating systems.
Furthermore, you can create a virtual encrypted disk in a file, mounting it as if it’s a real disk. You can also create hidden volumes, where you create a hidden space inside a disk’s volume that’s password-protected, giving an extra layer of security in case you’re forced to hand over your password or keys.
VeraCrypt uses parallelization, a technique that uses all the cores in a multi-core processor to make encryption and decryption faster. It also uses pipelining, a feature that allows encryption to happen immediately in RAM when a portion of a file is loaded without waiting for the full file to be moved to memory. Combined with hardware AES acceleration support, this is a decent all-around tool.
39. DiskCryptor
Website: https://diskcryptor.org/
Key features: BitLocker replacement, RAID encryption, external storage encryption, multiple algorithms
Platforms: Windows
DiskCryptor is an open-source alternative to the proprietary BitLocker by Microsoft. It supports multiple ciphers such as AES, Twofish, and Serpent, including their combinations. You can encrypt whole disks, including dynamic disks, disks with large sector sizes in RAID configurations, and external storage devices, CDs, and DVDs. Additionally, it provides OS partition encryption with password-enabled boot loading.
DiskCryptor supports hardware AES acceleration on the latest Intel and AMD processors based on the AES New Instructions. These instructions use a device’s hardware to encrypt and decrypt more quickly than software alone.
File Sharing
File-sharing software lets you send files securely by encrypting them. However, you should be careful with how you share the files, and it should be done over a secure network. File-sharing apps should also support a wide range of file formats and make it easy for recipients to decrypt the files. Portability is also important for those times when you’re away from your computers and need to send a file quickly.
40. Hat.sh
Website: https://hat.sh/
Key features: Browser-based, client-side encryption, AES-256 encryption, unlimited file size
Designed to be secure, simple, and fast, Hat.sh is a browser-based file encryption tool using the AES-256-GCM algorithm. It allows you to encrypt and decrypt files using a password or public and private keys, and it has a native key generation and pairing feature.
The software can encrypt files of all types and sizes; however, it can only encrypt up to 1 GB on Safari and mobile browsers. Hat.sh runs locally on your device and doesn’t upload any files to third-party servers.
The recommended security practice is to never store your keys or passwords in cloud storage, to always have a backup, and to use a communication channel with end-to-end encryption when sharing your keys or password.
41. Picocrypt
Website: https://github.com/Picocrypt/
Key features: Lightweight, fast, XChaCha20 encryption, Serpent encryption, header data protection
Platforms: Windows, macOS, Linux, web app
Picocrypt is a file encryption tool designed for portability. It measures only 3 MiB (mebibyte) and is available in standalone form with a command-line interface or GUI (graphical user interface). You can also use the app in a browser, but that option has limited features and a maximum file size of 1 GiB (gibibyte).
This tool is open-source and auditable. It uses the XChaCha20 cipher instead of the more established AES-256 standard. XchaCha20 encrypts data in streams instead of blocks, as AES does, and requires less computing power compared to AES. You can try the “Paranoid” mode, which uses XChaCha20 and Serpent ciphers.
For added security, Picocrypt protects an encrypted volume’s header data using Reed-Solomon parity, so you can recover your files in case of disk corruption.
42. 7-Zip
Website: https://www.7-zip.org/
Key features: File archiver, AES-256 encryption, self-extracting, multiple languages
Platforms: Windows, macOS, Linux
7-Zip is a file zip tool with AES-256 encryption. Although it’s built for Windows, you can access unofficial builds for Linux and other operating systems. You can also run it from a command line, which is handy for writing scripts to automate tasks. Most of the source code is reviewable and is under the GNU General Public License, a standard that ensures open-source software remains open source.
One of the highlights is the ease of use for users who receive 7-Zip files and don’t have the software to extract them. The self-extracting feature creates encrypted containers as a .exe file that automatically unzips and decrypts files with a double click. Plus, the software supports 89 languages to enable file sharing with just about anyone.
43. GnuPG
Website: https://gnupg.org/
Key features: Disk encryption, email encryption, OpenPGP encryption, key management, multiple algorithms
Platforms: Windows, macOS, Linux, RISC OS
GnuPG is an open-source alternative to PGP (Pretty Good Privacy), a proprietary cryptography tool owned by Symantec.
GnuPG offers a wide range of encryption cipher choices, including AES, Twofish, DES, and ChaCha20. It can encrypt files, disks, external storage and media, and email. Additionally, it provides a key management feature to prevent man-in-the-middle attacks, using key signatures for verification.
Although it is a command-line interface tool, several frontend packages, including GUIs for Windows, mail user agents (MUA) for email encryption, chat, and scripting applications, can be installed.
Email and Messaging
With email, you need to watch out for phishing attempts, malicious spam, email spoofing, and unauthorized access to your inbox. The open-source apps in this section have many features that can keep you safe, such as E2EE, multi-factor authentication support, anonymous accounts, and a no-tracking policy.
44. Proton Mail
Website: https://proton.me/
Key features: E2EE, PGP encryption, email, calendar, contact encryption, ad-free, tracker blocker, no tracking, 2FA, free VPN
Platforms: Windows, macOS, Linux, Android, iOS, web app
Proton Mail offers many privacy and security features and has servers in Switzerland, known to have some of the strictest privacy laws in the world. It provides end-to-end encryption for email, calendars, and contacts, meaning the encryption and decryption happen on the client side before it gets sent to Proton Mail’s servers. It’s also built with zero-knowledge architecture, working without accessing user data and personal information.
You can opt to protect your email with passwords and employ two-factor authentication with physical keys such as Yubikey. Proton Mail wards off phishing attempts detects spam, and blocks tracking pixels and ads. Proton Mail Bridge enables you to keep your current email and setup by adding end-to-end encryption to other email programs such as Microsoft Outlook and Apple Mail.
The free plan gives you email, three calendars, 5GB of storage, no-log VPN for one device, and a password manager – all encrypted for your security and privacy.
45. Tuta
Website: https://tuta.com/
Key features: E2EE, email, calendar, contact encryption, ad blocker, tracker blocker, no tracking, 2FA
Platforms: Windows, macOS, Linux, Android, iOS, web app
Tuta is an E2EE service that covers email, calendars, and contacts. It uses both symmetric and asymmetric cryptography and provides quantum-safe algorithms to prevent attacks from quantum computers. It hosts encrypted data in Germany but does not store user login credentials on those servers. A public and private key pair is created when you register an account and is stored locally on your device.
The email service strips header data for your privacy and blocks ads and trackers, but it doesn’t track your activities. Plus, Tuta places an encrypted search index on your device so you can search through your email privately. For extra security, it supports Time-Based One-Time Password (TOTP) and Universal 2nd Factor (U2F) for two-factor authentication (2FA). The free plan includes 1 GB of email and a calendar.
46. FairEmail
Website: https://email.faircode.eu/
Key features: Email encryption, OpenPGP encryption, no tracking, minimalist design
Platforms: Android
Built for Android, FairEmail is a bare-bones email app. Even with its minimalist design, it still packs many features, including conversation threading, design themes, and offline storage and functions. In terms of privacy, it uses OpenPGP and S/MIME encryption protocols, removes tracking and ads, and doesn’t monitor user activity.
For security, FairEmail authenticates messages, reformats messages, warns about links to prevent phishing, and provides a secure message view by removing potentially unsafe styling, scripts, and HTML elements. Advanced users who need more may opt for premium features such as notifications, email filters, and delayed email deliveries.
47. Signal
Website: https://signal.org/
Key features: Voice call E2EE, message encryption, no tracking, ad-free, self-destructing messages
Platforms: Windows, macOS, Debian-based distributions, Android, iOS
Signal, a messaging app based on the Signal protocol, offers end-to-end encryption for voice calls and messages. Many popular messaging platforms, such as WhatsApp and Skype, use the Signal protocol.
Signal offers group chats, file sharing, self-destructing messages, and stickers without ads, trackers, or affiliate marketing. You can make videos and group calls using your phone’s data instead of SMS and MMS plans. One downside to the app is that Signal requires your phone number to create an account. However, it is not displayed to other users by default, and you have several privacy options regarding this in the settings.
48. Telegram
Website: https://telegram.org/
Key features: E2EE for secret chats, AES-256 encryption, RSA encryption, device sync
Platforms: Windows, macOS, Linux, Android, iOS, web app
Telegram is close to hitting the billion-user mark and can be highly private if you use the secret chat feature. This comes with end-to-end encryption, self-destructing messages, no message forwarding, and chats that are only stored on your device instead of servers. For regular chats, Telegram still encrypts messages to protect users’ privacy.
Telegram uses AES-256 and RSA-2048 ciphers and Diffie-Hellman for key exchanges. If your account has been inactive for over six months, it will be deleted automatically, deleting your messages and personal information. Other features include an unlimited number of files for sharing and syncing across multiple devices and chat groups of up to 200,000 members.
49. Session
Website: https://getsession.org/
Key features: E2EE, decentralized onion routing network, anonymous account, no tracking
Platforms: Windows, macOS, Linux, Android, iOS
With end-to-end encryption and an onion routing network, Session is a viable option if you want to be anonymous. The platform sends your messages through a decentralized onion routing network, where messages are encrypted multiple times so that no server knows both the origin and destination of a message. When sending onion requests, your IP address is also hidden. Users don’t provide an email or phone number to register a Session account.
Your messages are encrypted using the Session protocol, which is built on libsodium, an open-source software library for ciphers, signatures, and other security codes. At the time of writing, Session has a voice call feature in the beta version that uses peer-to-peer networking instead of onion routing. The platform will also be moving from the Oxen decentralized network to a new decentralized network in the future.
Video Conferencing
You can host online meetings with video conferencing software, with extra features such as live streaming, simulcasting, and recording. To protect your privacy, look for offerings such as E2EE, password-protected sessions, and features that don’t retain your meeting’s data or allow for anonymous account creation.
50. Wire
Website: https://wire.com/en/
Key features: E2EE, zero-knowledge architecture, video calling, VoIP Calls, messaging, file sharing
Platforms: Windows, macOS, Android, iOS, web app
Wire provides end-to-end encryption for messages, media files, and calls. It uses the cipher by Proteus, a version of the Axolotl/Double Ratchet protocol for messaging, and the AES cipher for calling media. With servers in Germany, the video conferencing app adheres to strict European Data Protection laws.
The application prevents man-in-the-middle (MITM) threats by comparing client key fingerprints and runs device verification to ensure you are speaking to the right person. It is built on zero-knowledge architecture and uses edge computing for faster processing. With the free plan, you can use Wire on a maximum of eight devices and receive standard user support.
51. Jitsi
Website: https://jitsi.org/
Key features: E2EE on web app, secure video conferencing, live broadcasting, recording, simulcasting
Platforms: Android, iOS, web app, Debian and Ubuntu (Self-hosted)
Jitsi is an open-source suite of video communication products and is best known for Jitsi Meet, a video conferencing solution. You can use Jitsi Meet in a browser with text chats and password-protected meeting rooms. Businesses can install Jitsi Meet as a standalone program and integrate it with other Jitsi projects to build a secure and private video communication tool with features such as telephone dial-in and dial-out, as well as streaming to YouTube Live.
You can enable end-to-end encryption for video, audio, and screen shares. Traffic is encrypted using DTLS-SRTP, never stored on servers, and processed in memory only. Only the person creating a meeting room needs an account; providing identifiers such as name and email is optional. Data from the meeting is later destroyed. However, video and audio recordings are stored in the cloud for 24 hours for users to download.
52. Jami
Website: https://jami.net/
Key features: P2P network, E2EE, fast, video conferencing, streaming, recording, messaging
Platforms: Windows, macOS, Linux, Android, iOS
Jami is a video communication application offering end-to-end encryption and user anonymity. You don’t need to share any personal details to register an account, as your handle is associated with a fingerprint of a public key stored on your device. One Jami account can be linked to multiple devices.
Jami uses a peer-to-peer (P2P) network instead of a centralized network. The upside of this is that you can still use Jami without an internet connection to talk to someone if they are on the same local network. Connection is also faster with P2P, and latency is lower. Jami features include audio and video calls, instant messaging, group chats, recordings, screen sharing, and media streaming.
Firewall and Network Security Tools
Your network and connections need to be secure to prevent data leaks, breaches, and attacks by malware and spyware.
In this section, I cover open-source firewalls that allow customization and can work with different network configurations, such as WANs, LANs, and VLANs. To further secure your login credentials, you’ll also need antivirus solutions with up-to-date virus databases and multi-factor authentication tools.
53. pfSense CE
Website: https://www.pfsense.org/
Key features: Load balancing, NAT, integrated virus scanner, virtual LAN, VPN support
PfSense CE is the free community edition of pfSense’s firewall. It’s based on the FreeBSD OS and comes with features such as load balancing, IPv6 support, network address translation (NAT), DHCP server, DNS server, and support for IPSEC, VLAN, and VPN. Third-party software packages can add more features and customize your firewall.
Currently, only two versions of the free edition are supported by pfSense, with the last release being July 2023; the company is shifting its focus to the paid firewall solution, pfSense Plus. Users who buy Netgate hardware will get pfSense Plus for free. However, the free pfSense CE is still a good open-source option if you need a stable firewall solution.
54. IPFire_
Website: https://www.ipfire.org/
Key features: Flexible customization, QoS, real-time DPI, VPN support
Linux-based IPFire_ is a firewall with flexible customization and configurations. It has bandwidth load-balancing capabilities to give you fast internet through the Quality of Service feature. It’s also secure due to its real-time deep packet inspection (DPI) that monitors suspicious activity, checks for malware and uses a DNS proxy to protect against DNS attacks and spoofing.
IPFire_ has a highly configurable web proxy that can check for user permissions, so you can block adult sites for kids. It employs caching for faster browsing and can cache operating systems. If you need a firewall for multiple locations, you can use IPSec or OpenVPN for secure connections between them. Everything is managed and configured from a web interface.
55. VyOS
Website: https://vyos.io/
Key features: Customizable, WAN load balancing, NAT, zone-based firewall, cloud firewall, VPN support
VyOS is a network OS based on Debian. Users receive updates on a rolling release model, and the last stable release is Vyos Equuleus 1.3. It offers capabilities such as a customizable firewall, NAT, WAN load balancing, DHCP and DNS servers, VPN support, and Secure Shell (SSH) Management, a protocol that allows secure access to devices over an unsecured network.
VyOS supports zone-based firewalls, allowing you to define a zone for multiple interfaces through a simple configuration. Since VyOS works on standard AMD64, i586, and ARM systems, you can use it as a router and firewall for cloud servers with Amazon AWS, Azure, Oracle, and Google services.
56. OPNSense
Website: https://opnsense.org/
Key features: Real-time display, Multi-WAN load balancing, hardware failover, VPN support, multi-language
OPNSense is a FreeBSD-based firewall that supports IPv4 and IPv6 and can display real-time traffic filtering. The web proxy offers features such as firewall aliases, DNS blacklisting, and the inclusion of external blacklists to keep the latest malware at bay. It also offers two-factor authentication (2FA).
It has provision for multi-WANs (wide area networks) with load balancing and hardware failover features. Plus, it offers built-in access to IPSEC and OpenVPN. The UI is intuitive and offers multiple languages.
Anti Virus
Antivirus programs help detect, prevent, and delete malware. They reference a virus database that’s frequently updated with the latest threats and look for suspicious behaviors or patterns. The software listed here can be an alternative to your current antivirus, with features such as regular scans and support for multiple file formats. If you’re interested, we have lists of free antivirus for Windows and the best antivirus solutions.
57. ClamAV
Website: https://www.clamav.net/
Key features: On-access scanning, frequent virus database update, multi-threaded daemon, various file format support
Platforms: Windows, macOS, Linux
ClamAV is anti-malware software for web content, email, command lines, and files. Currently, on-access scanning is only available on Linux. Relying on signatures to recognize malware, its virus signature database is automatically updated several times daily. This database is protected such that parties with malicious intent can’t modify it.
It has multi-threaded scanner daemon capabilities to run several scans in the background efficiently. Additionally, it has integrated support for all standard mail file formats, multiple archive file formats, ELF executables and Portable Executable files, and widely used document formats such as Microsoft Office, MacOffice, PDF, and HTML.
58. ClamWin
Website: https://clamwin.com/
Key features: Scanning scheduler, integration with Outlook, ClamAV virus database
Platforms: Windows
Based on the ClamAV engine, ClamWin is an antivirus that’s licensed under the GNU GPL. Its features include virus and spyware detection, a scanning scheduler, integration with Microsoft Windows Explorer, and an automatic email attachment scanner with Microsoft Outlook.
The virus database, which is the same one used by ClamAV, is updated automatically. However, unlike ClamAV, ClamWin doesn’t offer on-access scanning, which means users must manually scan a file before opening it.
Multi-Factor Authentication (MFA) Tools
MFA tools add layers of security in addition to passwords to prevent brute-force attacks. With MFA, when someone discovers your password, you will still be protected because they require other authentication factors to log in. The apps here can work with many popular apps, such as social media, email, cloud drives, and operating systems.
59. FreeOTP
Website: https://freeotp.github.io/
Key features: 2FA, QR code generator
Platforms: Android, iOS
Published by Red Hat, FreeOTP is a simple two-factor authentication app you can use on Android and Apple mobile devices. It will generate one-time passwords from your mobile app that can be used even when you are offline. It works with popular software, including Facebook, Evernote, and Google. There’s also a web-based, one-time token generator.
FreeOTP uses open-source standards and can be used to build a login management system with software such as FreeIPA.
60. Aegis Authenticator
Website: https://getaegis.app/
Key features: MFA, biometric authentication, token encryption
Platforms: Android
Aegis is considered an open-source alternative to Google Authenticator and Authy. Any service that works with Google Authenticator will work with Aegis. It uses HOTP and TOTP standards.
Additionally, Aegis adds another layer of security by encrypting all tokens in a vault, which requires passwords or biometrics to decrypt them. You can customize your interface through themes and easily search for the tokens you need by using icon packs. It also supports automatic backups to make it more secure.
61. 2FAS
Website: https://2fas.com/
Key features: MFA, biometric authentication, service key recovery, device sync, browser extension
Platforms: Android, iOS, Chrome, Brave, Firefox, Edge, Opera, Safari
2FAS is a two-factor authentication program using the TOTP standard. It can be used to secure social media, online services, password managers, crypto platforms, and other potentially sensitive apps.
For extra security, your service keys are in a secure cloud backup, which lets you recover them even if you lose your mobile. If needed, you can use biometrics such as FaceID on iOS and fingerprints on Android devices. 2FAS also offers browser extensions, where the connection between your mobile and browser is encrypted end-to-end.
Cloud Storage
Cloud storage services allow you to store, share, and manage your files online. Potential threats to these services include hacking attempts, spyware, and data breaches. The open-source services included here offer encryption, support MFA, and have features for collaboration and file sharing.
62. Nextcloud Hub
Website: https://nextcloud.com/
Key features: Encrypted content collaboration platform, file sharing, voice and video calls, self-hosting option
Platforms: Windows, macOS, Linux, Android, iOS
Nextcloud Hub provides secure cloud file storage, communication, and collaboration platforms through a suite of products that you can self-host. These products allow you to collaborate with your team using voice and video calls, file sharing and editing, and email and calendar integration.
Nextcloud Files encrypts your files in the cloud and comes with a built-in file access control, file versioning, and integration with webmail, calendars, and contacts. Meanwhile, Nextcloud Talk complies with the GDPR, ensuring your data remains private on your server. For a fee, you’ll also get an AI assistant to answer questions and help with simple tasks.
63. Cryptomator
Website: https://cryptomator.org/
Key features: Vault encryption, client-side encryption, regular testing and audit
Platforms: Windows, macOS, Linux, Android, iOS
With Cryptomator, you don’t have to give up your current cloud storage. You can encrypt files on your existing cloud storage, such as Dropbox, Google Drive, OneDrive, and the Files app on iOS. Data is encrypted client-side, and the keys are also stored locally to give you a more private and secure experience.
It works by creating a password-protected vault inside your existing online storage. Any file that’s moved here will be encrypted. Independent security experts regularly audit Cryptomator’s source code, and the software is also tested robustly in terms of code quality and coverage that’s above the industry test average.
64. Internxt
Website: https://internxt.com/
Key features: E2EE, zero-knowledge encryption, file sharing, built-in VPN access
Platforms: Windows, macOS, Linux, Android, iOS, web app
The blockchain-based Internxt offers many features for secure file storage, file sharing, and VPN connections. However, the free plan only offers 1GB of data with access to all services.
Internxt provides end-to-end encryption using AES-256, with all passwords and data stored locally on your devices. Using the free unlimited VPN, you can store and share files privately without any scans or tracking. Internxt is GDPR-compliant, fully auditable, and reviewed by Securitum, a penetration testing company.
65. ownCloud
Website: https://owncloud.com/
Key features: Encrypted content collaboration platform, self-managed and hosted, virus scanner, MFA, bug bounty program, free and premium plans
Platforms: Windows, macOS, Linux, Android, iOS, web app
Cloud storage service ownCloud delivers secure and private file sharing and collaboration. The feature list is extensive for paid editions; the free edition, called Community, offers a self-managed and on-site solution with limited features. On this account, you get unlimited users on desktop and mobile, encryption, an antivirus scanner (using ClamAV), support for virtual files, MFA, and a host of other features.
Encryption is done both in transit (using HTTPS and the latest Transport Layer Security (TLS) protocol) and at rest (where files are encrypted at the application server before being stored in the cloud storage). Meanwhile, you can enable end-to-end encryption through a plugin.
Password Management
Password managers can generate and securely store strong passwords. Among the key features of the free password managers listed here are offline access, strong encryption, syncing between devices, and MFA support. If you need more alternatives, check out the top 10 most secure open-source password managers.
66. KeePass
Website: https://keepass.info/
Key features: Portable, multiple algorithms, import/export, password generator
Platforms: Windows, macOS, Linux, Android, iOS, web app
KeePass is a password manager for Windows with unofficial builds for Linux, macOS, FreeBSD, Unix, Android, iOS, and other mobile devices. It can function as portable or external storage. You can organize your passwords into groups or as a tree with branching subgroups and export the list in either text, HTML, XML, or CSV format.
The encrypted database is protected from general run-time attacks (such as keyloggers) and non-runtime attacks (like memory dump analyzers). It supports AES, Rijndael, and Twofish cryptographies and uses SHA for hashing. For extra security, you can lock your database using key files and a master password.
67. Bitwarden
Website: https://bitwarden.com/
Key features: E2EE, secure text sharing, auto-fill capability, free and premium plans
Platforms: Windows, macOS, Linux, Android, iOS, Google Chrome, Edge, Firefox, Safari, Opera, Vivaldi, Brave, Tor, DuckDuckGo
With zero-knowledge and end-to-end encryption, Bitwarden lets you share data securely. Its free plan includes Bitwarden Send, which enables users to share text that’s secured with a password, expiration date, deletion date, or number of accesses allowed. Users also get unlimited devices, and all of Bitwarden’s core features on the free account.
Bitwarden has paid plans if you need more features, such as file sharing, unlimited sharing, and an integrated authenticator for one-time passwords. You can also host your own Bitwarden server to keep your data completely private. Bitwarden is compliant with GDPR, SOC 2, HIPAA, Data Privacy Framework (DPF), and CCPA laws and runs regular audits.
68. Passbolt
Website: https://www.passbolt.com/
Key features: Self-hosted, E2EE, secure password sharing, MFA, user management
Platforms: Windows, Android, iOS, Google Chrome, Brave, Opera, Firefox, Vivaldi, Edge
If you need a password manager for your team or business, consider Passbolt. The free self-hosted plan offers unlimited users and a host of features, including private and shared folders, password sharing, multi-factor authentication, user and group management, and role-based user access control.
In addition to offering end-to-end encryption, Passbolt encrypts each password individually so that one password breach in a brute-force attack will not affect other encrypted passwords. 2FA is on by default, and other capabilities include export/import, encrypted notes, mobile apps, and browser integration.
69. Clipperz
Website: https://clipperz.is/
Key features: Browser-based, anonymous account, message sharing, offline copy
Platforms: Accessible through web browsers
Clipperz is a browser-based password manager with a 128-bit security level and one-time password support. To create an account, you don’t need to provide any personal information, as it only requires a username and a passphrase.
Users can share encrypted messages privately through the “secret sharing” feature, which creates a secure link for the intended recipients. You can also export or import your data and save a read-only offline copy of your encrypted vault as an HTML file.
70. Psono
Website: https://psono.com/
Key features: Password sharing, Salt crypto library, client-side encryption, offline access, MFA, self-hosting
Platforms: Android, iOS, Google Chrome, Mozilla Firefox, Edge
Psono uses Curve25519 and Salsa20 algorithms via the NaCl (Salt) crypto and network library instead of the widely used RSA and AES. Password encryption is done client-side and is transported through three layers of encryption from browser to server, supporting perfect forward secrecy. Other features include secure file sharing, password breach detection, cloud backup, and offline access.
One advantage of using Psono is that it provides a free enterprise edition for up to 10 users who are running a small business or managing teams, provided you host it yourself.
Note-Taking Apps
Note-taking apps let you create, organize, search, and share your online notes. Some of the programs in this section provide E2EE, zero-knowledge architecture, and note backups. All of them offer a paid account with access to more features and storage, but the free accounts are still beneficial, especially for users who only need light usage.
71. Standard Notes
Website: https://standardnotes.com/
Key features: E2EE, XChaCha20 encryption, device sync, 2FA, encrypted email backups
Platforms: Windows, macOS, Linux, Android, iOS, web app
Standard Notes protects user privacy by implementing zero-knowledge encryption, a no-tracking policy, and a self-hosted email service to avoid using third-party email services that may share user data. Plus, the software’s source code is regularly audited by independent reviewers. While it does use its own self-hosted analytics tool, this is privacy-focused and not intrusive to the user experience.
The app uses the XChaCha20-Poly1305 cryptography with the Argon2 algorithm, and encryption takes place on user devices. Users on the free account get text notes only, unlimited data sync across all devices, password-protected notes, 2FA, notes export into a text file or encrypted file, offline access, and daily email backups.
72. Notesnook
Website: https://notesnook.com/
Key features: E2EE, XChaCha20 encryption, attachment encryption, device sync, offline access
Platforms: Windows, macOS, Linux, Android, iOS
Notesnook offers end-to-end encryption, real-time sync across devices, and offline access. It uses the same cryptography as Standard Notes, which is XChaCha20-Poly1305 cryptography with the Argon2 algorithm.
Non-paying users can use it on unlimited devices, create unlimited notes, and access a basic web clipper. The editor offers a substantial amount of support for code blocks, markdowns, lists, tables, and embedded videos. You can also create bi-directional links between notes to better organize your content. One feature that may be useful is the app lock, which secures the whole app with a hardware security key.
Virtual Private Networks (VPNs)
A VPN can hide your IP address through proxy network servers to escape surveillance or censorship and safeguard your online privacy. Free VPNs generally offer only basic features. While you’ll have to compromise on speed, bandwidth, and certain security features, they are still a decent option if you need a secure and private connection online. It’s also worth comparing the open-source options included here with free proprietary VPNs.
73. Proton VPN
Website: https://protonvpn.com/
Key features: Unlimited monthly data, AES-256 encryption, streaming, kill switch, DNS leak protection
Platforms: Windows, macOS, Linux, Android, iOS, Chromebook, Chrome, Firefox
Proton VPN is offered by the same Swiss company that offers the popular open-source Proton Mail. The two products are bundled in a free account. Users get unlimited data on one device with no ads on the VPN service. The free account connects to no-log servers in five locations: Japan, the Netherlands, Poland, Romania, and the US.
You get features such as AES-256 encryption, split tunneling, a kill switch, DNS protection, an always-on connection, and stealth mode, which lets you avoid censorship and gain access to sites banned by governments. Proton VPN does not block streaming sites for non-paying users, but the service is not guaranteed; for that, users need to upgrade to a paid plan.
74. hide.me
Website: https://hide.me/en/free-vpn
Key features: Unlimited monthly data, no-log, Torrenting, 24/7 support
Platforms: Windows, macOS, Linux, Android, iOS
The free VPN plan from hide.me uses servers in eight locations across the US, UK, Netherlands, Germany, France, Finland, and Switzerland. It supports torrenting, automatic connections on unsecure networks, split tunneling, and a feature called StealthGuard that only allows usage of specific apps with a VPN connection, making it ideal for torrenting.
Although there’s no cap on data and bandwidth for 1 device, the company does throttle speed for free users and restricts access to streaming-optimized servers. However, hide.me offers 24/7 support for all customers, including those on the free plan, unlike most open-source VPNs.
75. Windscribe
Website: https://windscribe.com/
Key features: Encryption, split tunneling, kill switch, malware protection, customizable
Platforms: Windows, macOS, Linux, Android, iOS, Chrome, Firefox, Edge, FireTV, AndroidTV, AppleTV
Windscribe does not throttle speed on the free plan but only offers 10GB worth of data monthly (if you sign up with your email) or 2GB (if you don’t share your email). You can gain an extra 5GB if you advertise Windscribe’s service on X (formerly Twitter).
With a free account, you get unlimited devices and connections to no-log servers in 10 countries. It also comes with features such as encryption, split tunneling, and auto-connection – standard features you’d expect from other free VPNs.
But Windscribe also comes with ad and malware blockers, custom port selection, port forwarding for when you need to access your local network remotely, and a proxy gateway for when you need to use a VPN on devices that don’t normally support it, such as TVs and gaming consoles.
Digital Security Education
If you’re interested in learning more about basic cybersecurity to protect yourself and your loved ones, I’ve included a handful of free courses that can help. The courses cover topics on understanding online privacy and security, having strong passwords, enhancing the security of your browsers and networks, and using the right security tools.
76. Udemy Courses
Website: https://www.udemy.com/
You can find free courses at Udemy that cover cybersecurity and general internet safety. Check out the course by ExpressVPN called Internet Safety: Guide to Online Privacy and Security, which has a 4.6/5 rating. Over 4000 people have enrolled in this course to learn about strong passwords, encryption, secure networks, malware, safe online banking, and tips on protecting your online safety.
Another highly rated course is from the security company Fourth Wall Technologies. The course teaches about email security, browser security, encryption, antivirus, and online shopping safety. With over 13,000 reviews and a 4.3/5 rating, this course is designed for non-technical individuals who want to learn basic cybersecurity to protect their security and privacy online.
77. Electronic Frontier Foundation
Website: https://www.eff.org/
The Electronic Frontier Foundation (EFF), a nonprofit focused on defending online privacy, hosts a free course called Surveillance Self-Defense, designed for beginners and intermediate internet users.
The “Basics” section of the course is for beginners to learn more about online surveillance and how to maintain privacy. The “Tool Guides” cover instructions on how to secure your devices and detect trackers, circumvent censorship, and use the Tor network.
The course also offers advice written specifically for those who need privacy in their line of work or life, such as activists, journalists, abortion patients, and members of the LGBT community. Meanwhile, advanced tech users can still benefit from more in-depth lessons on encryption, countering tracking methods, and online privacy.
78. GCFGlobal.org
Website: https://edu.gcfglobal.org/en/
GCFGlobal provides thousands of free lessons on technology, personal finance, and design. Its course on internet safety covers strong passwords, malware, phishing, social media privacy, browser and network security, and online shopping safety. A quiz at the end tests your learning. It also offers an internet safety course for kids that talks about cyberbullying, social media privacy, and mobile device security.
The nonprofit Goodwill Community Foundation owns the organization, which has been offering free courses for nearly 20 years. By signing up for a free account, you can track your progress and access your course certificates.
79. Heimdal Security
Website: https://cybersecuritycourse.co/
Heimdal Security is a cybersecurity company offering a free course, Cyber Security for Beginners, that teaches how to secure your online activities and personal data. The course is delivered to your email every two days for five weeks, totaling 20 lessons that cover cybersecurity basics, safety tips, and how to detect vulnerabilities to protect yourself from malicious content and cyber attacks.
Students will also receive freebies such as bite-sized content, cheat sheets, and discounts on the company’s products. Heimdal Security was founded by the 2011 and 2012 winners of the CTF(capture the flag) championship at DefCon.
The Bottom Line
Considering how much of our work and lives happen online, protecting our online privacy and security is crucial. You’ll never know who has access to your data or what can happen to you when your personal data is no longer solely yours.
By swapping your current software, OS, and firmware with open-source tools, you can take back some of the control or keep your identity anonymous when browsing online. However, no solution or setup can be fully secure and private.
You can still be exposed if you’re not careful with your privacy offline, as you could fall for social engineering threats or scams. With these programs, you can at least start enhancing your online privacy and reducing your reliance on proprietary software.
Attention: WizCase owns the visual and written content on this site. If our cybersecurity insights resonate with you and you wish to share our content or visuals, we ask that you credit WizCase with a link to the source in recognition of our copyrights and the diligent work of our expert cybersecurity researchers.
Leave a Comment
Cancel