Vetted & Trusted
Recommended Tools
Privacy-respecting tools we've personally evaluated and recommend to our clients.
Some links on this page are affiliate links. We may earn a small commission if you purchase through these links, at no extra cost to you. We only recommend tools we personally use and trust. Open-source and free tools link to our consultation page where we can help you set them up.
VPN
Proton VPN
Swiss-based VPN with a strong focus on privacy and open-source transparency. No-logs policy verified by independent audits.
Why we recommend it
- Open source
- No-logs verified
- Free tier available
- Based in Switzerland
Considerations
- Slower free servers
- Fewer server locations than some competitors
Mullvad VPN
Privacy-first VPN that accepts anonymous payments and requires no personal information to create an account.
Why we recommend it
- Anonymous accounts
- Flat pricing
- WireGuard support
- No-logs policy
Considerations
- No free tier
- Smaller server network
NordVPN
One of the most popular VPN services with a massive server network, strong encryption, and Threat Protection features.
Why we recommend it
- 5,000+ servers worldwide
- Threat Protection (malware blocking)
- Double VPN
- Meshnet (peer-to-peer)
Considerations
- Subscription required
- Past security incident (2018, since audited)
Password Manager
Keeper
Enterprise-grade password manager with zero-knowledge security architecture, dark web monitoring, and secure file storage.
Why we recommend it
- Zero-knowledge encryption
- BreachWatch dark web scanner
- Secure file vault
- MSP/enterprise support
Considerations
- Add-ons cost extra
- No free tier for full features
Bitwarden
Open-source password manager offering secure cross-platform credential storage with a generous free tier.
Why we recommend it
- Open source
- Free tier
- Cross-platform
- Self-host option
Considerations
- UI less polished than premium alternatives
1Password
Premium password manager with excellent family and team sharing features, plus Watchtower breach monitoring.
Why we recommend it
- Excellent UX
- Travel mode
- Family sharing
- Watchtower alerts
Considerations
- No free tier
- Subscription only
Data Removal
DeleteMe
Data removal service that finds and removes your personal information from data broker websites.
Why we recommend it
- Automated removal
- Regular reports
- Covers major brokers
Considerations
- Annual subscription required
- Some brokers re-list data
Incogni
Surfshark-backed data removal service that automatically contacts data brokers to delete your personal information.
Why we recommend it
- Automated opt-out requests
- Progress dashboard
- GDPR/CCPA leverage
- Affordable pricing
Considerations
- Newer service (less track record)
- Limited broker coverage vs. DeleteMe
Identity Protection
LifeLock
Comprehensive identity theft protection with credit monitoring, dark web surveillance, and up to $1M in stolen funds reimbursement.
Why we recommend it
- Credit monitoring (all 3 bureaus)
- Dark web alerts
- Stolen funds reimbursement
- Norton 360 included
Considerations
- Expensive at higher tiers
- Norton bundling may be unwanted
Aura
All-in-one digital safety platform combining identity theft protection, credit monitoring, VPN, antivirus, and parental controls.
Why we recommend it
- All-in-one platform
- Family plans
- $1M identity theft insurance
- AI-powered fraud alerts
Considerations
- Higher price point
- Some features overlap with other tools
Cloud Backup
MEGA
End-to-end encrypted cloud storage with generous free storage and zero-knowledge encryption for all files.
Why we recommend it
- End-to-end encrypted
- 20 GB free storage
- Zero-knowledge encryption
- Cross-platform sync
Considerations
- Transfer quotas on free tier
- Less enterprise-focused
Backblaze
Unlimited cloud backup for personal computers with straightforward pricing and easy file recovery.
Why we recommend it
- Unlimited backup
- Simple pricing
- Physical drive recovery option
Considerations
- Single computer per license
- No folder sync
Local Storage
Synology NAS
Industry-leading network attached storage solutions for home data sovereignty and local AI workloads.
Why we recommend it
- Excellent DSM software
- Docker support
- Active community
- Surveillance Station
Considerations
- Hardware investment required
- Learning curve
Nextcloud
Open-source, self-hosted cloud platform offering file sync, collaboration, and communication — a full Google/Dropbox alternative you control.
Why we recommend it
- Fully open source
- Self-hosted (total data control)
- Office suite, calendar, contacts built-in
- Large app ecosystem
Considerations
- Requires server setup
- Performance tuning needed at scale
Security Software
Malwarebytes
Lightweight anti-malware solution that excels at detecting and removing threats that traditional antivirus misses.
Why we recommend it
- Excellent malware detection
- Lightweight
- Free scanner available
- Browser Guard extension
Considerations
- Premium required for real-time protection
- Limited firewall features
Bitdefender
Consistently top-rated antivirus and internet security suite with advanced threat detection, ransomware remediation, and minimal performance impact.
Why we recommend it
- Top-tier malware detection rates
- Ransomware remediation
- VPN included
- Low system impact
Considerations
- Free version limited to Windows
- VPN capped on basic plans
Browsers
Firefox
Mozilla's open-source browser with industry-leading fingerprint resistance and built-in Enhanced Tracking Protection. The best privacy-focused browser for everyday use.
Why we recommend it
- Built-in fingerprint resistance
- Enhanced Tracking Protection (Strict mode)
- Open source & Mozilla-backed
- Works with most websites
Considerations
- Slightly slower than Chrome on some benchmarks
- Fewer built-in ad-block features than Brave
Brave Browser
Chromium-based browser with aggressive ad and tracker blocking built in, plus fingerprint randomization to frustrate cross-site tracking.
Why we recommend it
- Fingerprint randomization by default
- Blocks ads & trackers without extensions
- Fast (Chromium engine)
- Built-in Tor tab support
Considerations
- Crypto/BAT features may feel intrusive
- Chromium base means Google influence on web standards
Tor Browser
Routes traffic through the Tor anonymity network and makes all users look identical, providing the strongest available fingerprint resistance for high-stakes browsing.
Why we recommend it
- Maximum fingerprint resistance
- Anonymizes IP via Tor network
- All users share the same fingerprint
- Essential for sensitive research
Considerations
- Significantly slower due to Tor routing
- Some websites block Tor exit nodes
- Not practical for everyday use
Secure Email
Proton Mail
End-to-end encrypted email service based in Switzerland with zero-access encryption.
Why we recommend it
- End-to-end encrypted
- Zero-access encryption
- Free tier
- Calendar & Drive included
Considerations
- Search limited to headers
- Limited free storage
Tuta (Tutanota)
German-based encrypted email provider with built-in encryption for all messages, contacts, and calendars.
Why we recommend it
- End-to-end encrypted
- Open source
- Free tier (1 GB)
- No tracking, no ads
Considerations
- No IMAP/SMTP (dedicated apps only)
- Smaller ecosystem than Proton
Need Help Setting These Up?
We don't just recommend tools — we help you implement them. Whether it's migrating to a new password manager, configuring a VPN on all your devices, or setting up a home NAS, we'll walk you through every step.
Schedule a Consultation