Back to Research
Privacy2025-05-11

Privacy-Focused Applications

Looking into Privacy-Focused Applications and their user cases

Web Browsers

BrowserKey Privacy FeaturesPlatformsOpen SourceMitigated ThreatsTor Browser• Multi-layer onion routing (anonymizes IP/location)
• Blocks trackers/scripts (amnesic mode, isolates cookies)Win, macOS, Linux, Android
(iOS via Onion Browser)Yes (Tor Project)ISP surveillance (hides origin), network surveillance, tracking by sites, device fingerprintingBrave• Built-in Shields: blocks ads, trackers, third-party cookies, fingerprinting
• Tor-mode private window (optional)
• HTTPS-only connections, encrypted Brave SyncWin, macOS, Linux, Android, iOSYes (Chromium-based;
source on GitHub)Web tracking/ads, profiling, some network fingerprintingFirefox• Enhanced Tracking Protection (blocks known trackers)
• DNS-over-HTTPS for private DNS queries
• HTTPS-Only Mode (forces encrypted HTTPS)Win, macOS, Linux, Android, iOSYes (Mozilla)Third-party tracking, cookie surveillance, ISP sniffing (with DoH/HTTPS), insecure HTTP

Each of the above browsers is actively maintained. Tor Browser (based on Firefox) provides full anonymous routing to hide your IP. Brave and Firefox strengthen privacy by blocking web trackers and enforcing encrypted connections. Brave's built-in Shields block ads, cookies, and scripts by default. Firefox similarly blocks cross-site trackers and supports encrypted DNS and HTTPS. All are cross‑platform (including Linux and iOS) and open source, resisting tracking and many ISP/censorship threats.

Messaging Apps

AppKey Privacy FeaturesPlatformsOpen SourceMitigated ThreatsSignal• End-to-end encryption (Signal Protocol with forward secrecy)
• "Sealed Sender" (hides sender on server, minimal metadata)Android, iOS, Win,
macOS, LinuxYes (clients &
protocol open)Eavesdropping (content protected), limited metadata leaks, account spoofing preventedSession• E2E encryption; onion routing network (no server can see your IP)
• No phone/email required (fully anonymous accounts)Android, iOS, Desktop
(Win/macOS/Linux)Yes (clients open)Server logging (no data to log), ISP snooping (IP hidden), metadata collectionElement (Matrix)• Decentralized federated chat (self-hosted servers)
• E2E encryption enabled by default in private roomsAndroid, iOS, Win,
macOS, Linux, WebYes (Matrix standard
& clients open)Eavesdropping (E2EE), censorship (no central server), server-side metadata (room membership)

Signal provides private 1:1 and group chat with the strongest known E2EE (Signal Protocol) and very limited metadata. Session is designed to "send messages, not metadata": it uses a decentralized onion‑routing mixnet so that even the server never learns your IP. Element (Matrix) is a federated chat client that supports E2EE by default in rooms. All of the above have open‑source clients and run on Linux and mobile. They protect message content against eavesdroppers, and by decentralization or minimal-logging they mitigate ISP/third‑party tracking and identity correlation.

Email Services

ServiceKey Privacy FeaturesPlatformsOpen SourceMitigated ThreatsProtonMail• End-to-end (and "zero-access") encryption of emails and mailboxes
• Encrypted subject lines (optional)Web, iOS, AndroidPartially
(client code open)Email interception (TLS + E2EE),
service breach (zero-access),
mass surveillanceTutanota• E2E encryption of mail and headers/metadata (even subjects)
• Anonymous signup; no IP or phone logsWeb, Linux,
iOS, AndroidYes (clients open)Data mining (zero-knowledge storage),
tracking (no logs), ISP snoopingMailfence• Client-side OpenPGP encryption (in-browser)
• Digital signatures to verify sender
• Belgian jurisdiction (strong privacy law)Web, iOS, AndroidNo (proprietary)Server side eavesdropping,
phishing (signatures),
unauthorized access

ProtonMail and Tutanota are leading encrypted email providers. ProtonMail (Switzerland) uses end‑to‑end and "zero‑access" encryption so that emails are unreadable to the provider. Tutanota (Germany) likewise auto‑encrypts all content and even metadata (subject lines). Both provide mobile and web clients. Mailfence is a Belgian OpenPGP-based service; encryption happens in your browser, so the server never sees plaintext. These services protect against ISP or hacker snooping, and by encrypting data at rest they defend against provider breach. (Platforms for all include web, Android/iOS. Only clients/code may be open‑source, not servers.) They mitigate surveillance and metadata collection, and use signatures/SSL to guard against phishing and tampering.

Identity & Authentication

ToolKey FeaturesPlatform SupportOpen SourceMitigated ThreatsHardware FIDO2 Keys
(SoloKey, YubiKey, Titan)• Hardware U2F/FIDO2 authenticators
• Public-key cryptography with origin-bindingAny device with USB/NFC
(Linux, Windows, Mac, Android)SoloKey: Yes (HW/FW)
Others: Partial (FIDO open)Phishing (origin-binding),
password theft (2FA)Bitwarden• Open-source password manager
• AES-256 encrypted vault with cross-device syncLinux, Windows, Mac,
Android, iOS, WebYesPassword breaches,
credential reuse

Hardware security keys (USB/NFC) provide strong two-factor or passwordless login. They leverage FIDO2/WebAuthn so that the key cryptographically verifies the login page's origin (URL), making logins phishing-resistant. SoloKeys are fully open‑source hardware keys; others (YubiKey, Titan) use proprietary chips but open standards. Keys work on Linux, iOS, etc., and eliminate password interception. A good complement is an encrypted password manager like Bitwarden, which is fully open source and encrypts your credentials on-device. These tools help prevent account takeover (ISP logins or stolen credentials) and reduce identity correlation by using unique keys per service.

Secure File Storage

Service/ToolKey Privacy FeaturesPlatformsOpen SourceMitigated ThreatsNextcloud– Self-hosted cloud storage
– Optional end-to-end encryption app (client-side encryption)
– TLS for transfersServer: Linux; Clients: Web, Windows, macOS, Android, iOSYes (AGPL)Service trust (self-hosted), data breach on server (with E2EE enabled)Syncthing– Peer-to-peer folder sync (no central server)
– TLS encryption in transit (device-to-device)
– LAN/VPN capableLinux, Windows, macOS, AndroidYesCloud provider trust (none, P2P), intermediate server trustProton Drive– End-to-end encrypted cloud storage
– File-sharing with password links
– Swiss jurisdictionWeb, Windows, macOS, Linux, Android, iOSNoCloud breach (zero access to content), provider surveillanceTresorit– Enterprise E2EE storage (zero-knowledge)
– Encrypts files and metadata client-side
– Advanced sharing controlsWindows, macOS, Linux, Android, iOSNoCloud provider snooping (content and metadata encrypted), complianceCryptPad– Collaborative office suite (docs, sheets) end-to-end encrypted
– No account needed for sharing
– Zero-knowledge hostingWeb (no native desktop)YesCollaboration on cloud (server has no plaintext), surveillance of content

Nextcloud (self-hosted) gives you full control over data; with its End-to-End Encryption app it can cryptographically protect files before upload. Syncthing is a pure P2P sync tool that uses encrypted TLS channels between your own devices, so no third party sees the data. Proton Drive and Tresorit are commercial E2EE cloud storage: both encrypt files on-device so even service operators or hackers cannot read them. CryptPad provides end-to-end encrypted collaborative documents (like an encrypted Google Docs) – data is encrypted in the browser, and shared without revealing contents to the host. These solutions protect against ISP or server breaches and ensure only you control the decryption keys.


Appendix: Niche & Advanced Tools

Decentralized Social Media

  • Mastodon – A federated microblogging platform (ActivityPub) where users join independent servers. Each instance can enforce its own privacy; posts can be public, unlisted, or followers-only. Mastodon is open-source, with no central company; it resists censorship and server-side profiling by design.
  • Nostr – A decentralized "Notes and Other Stuff" protocol using cryptographic keys as identities. Users publish signed messages to a network of relays. Nostr is public by default (no hidden posts), but there is no central authority. It is fully open (protocol and clients) and censorship-resistant; however content is not encrypted end-to-end, so privacy relies on anonymity (pseudonymous keys) and private keys.

Private DNS & Network Tools

  • NextDNS – A cloud DNS resolver with privacy filters (blocks trackers/ads) and support for DNS-over-HTTPS/TLS. NextDNS does link queries to user profiles for filtering, but it encrypts queries in transit and offers "zero-logging" promises. It protects against ISP DNS spying and can prevent malware.
  • DNSCrypt / DNS-over-HTTPS – Protocols that encrypt DNS queries between you and a resolver. This prevents on-path observers (local network/ISP) from reading your DNS lookups. (Note: an ISP may still infer visited domains via IP addresses or SNI, but cannot easily see raw DNS requests.) These tools harden against passive surveillance of your DNS traffic.
  • Tor Snowflake – A "pluggable transport" for Tor. It runs in a web browser (using WebRTC) to act as a bridge for censored users. Snowflake disguises Tor traffic (often as random web traffic) so that national firewalls and ISPs cannot easily block it. It fights censorship by adding anonymous proxy nodes without requiring volunteer infrastructure.

Self-Hosted Cloud & Collaboration

  • Nextcloud – (see above) A fully open FOSS cloud suite (storage, calendar, video, office, etc.) you host yourself. It supports strong TLS, optional file E2EE, and two-factor auth. Because you control the server, it avoids trusting third-party providers and is resistant to data-snooping.
  • Syncthing – (see above) A background service that securely syncs files peer-to-peer. Every connection is authenticated and encrypted (TLS), and no central server is needed. This eliminates cloud-trust issues: your data only lives on devices you authorize.
  • CryptPad – (see above) An open-source, web-based office suite (documents, spreadsheets, whiteboard, etc.) that is end-to-end encrypted. CryptPad requires no account for sharing; data is encrypted in the browser before upload. This provides a private alternative to Google Workspace, protecting contents from the host and advertisers.
  • Other FOSS alternatives – There are many self-hosted privacy-friendly tools (e.g. Jitsi Meet for calls, PeerTube for video, Matrix/Synapse for chat, Nextcloud Talk, etc.), each offering end-to-end encryption and user-controlled data. These empower power-users to build an independent, privacy-respecting cloud ecosystem.

Sources: Official documentation and trusted privacy guides for each tool. Each item above is actively maintained and widely used in privacy communities.

References

  1. Tor (network) - Wikipedia
  2. Privacy Protection & Security Features | Brave
  3. Enhanced Tracking Protection in Firefox for desktop | Firefox Help
  4. Privacy and security | Firefox Help
  5. The Best Private Instant Messengers - Privacy Guides
  6. Session | Send Messages, Not Metadata. | Private Messenger
  7. Matrix.org - FAQ
  8. What is zero-access encryption and why is it important for security? | Proton
  9. Get free private, secure & encrypted email with Tuta Mail | Tuta
  10. Secure and private email | Mailfence encrypted email service
  11. Titan Security Key | Google Cloud
  12. SoloKeys | Built with Trussed®
  13. Open Source Password Manager | Bitwarden
  14. Self-hosted cloud collaboration platform for home users - Nextcloud
  15. How Syncthing provides secure file syncing without sharing your files with a third party
  16. Proton Drive: Free secure cloud storage | Proton
  17. Cloud Storage Security - Secure Cloud Storage from Tresorit
  18. CryptPad.org
  19. How is a NextDNS account private? - Privacy Guides Community
  20. What exactly ISP can see when someone use DNSCrypt-proxy with dnscrypt-enabled public DNS resolver?
  21. Snowflake Makes It Easy For Anyone to Fight Censorship | Electronic Frontier Foundation

Share this research