Privacy Tools We've Found Useful
The Ludlow Institute has long explored ways to help people strengthen their privacy and reduce their digital footprints in an era of shrinking personal privacy. On this page, we’ve gathered a selection of privacy tools and services we’ve found useful over the years. These are shared for informational purposes only and are not formal recommendations. Tools and services can evolve, so we encourage you to review them carefully and make your own decisions about what best fits your needs or threat model.
2FA apps
Open-source TOTP app for Android. Offline, encrypted vault, no network access.
Privacy-respecting open-source TOTP app for Android.
Red Hat's open-source authenticator, available on Android and iOS.
Books
A non-technical introduction to digital privacy for those just starting out.
Comprehensive, regularly updated guide to achieving serious personal privacy and anonymity.
Snowden's firsthand account of mass surveillance programs.
Documents the NSA surveillance revelations through Greenwald's involvement in the Snowden story.
Browsers
Blocks ads and trackers by default with no configuration required. A straightforward Chrome replacement.
Hardened Firefox-based browser focused on minimizing fingerprinting.
Calendar apps
End-to-end encrypted calendar integrated with ProtonMail.
Encrypted calendar from Tuta, paired with their email service.
Cloud storage
Free, open-source tool that encrypts files before uploading to any cloud provider — adds privacy to services you already use.
End-to-end encrypted cloud storage; files are encrypted before they leave your device.
Swiss-based cloud storage with an optional client-side encryption add-on.
Canadian zero-knowledge storage — even Sync cannot read your files.
Enterprise-grade zero-knowledge encrypted storage based in Switzerland.
Email services
End-to-end encrypted email from a Switzerland-based provider. One-click import from Gmail makes migration easy.
Email alias service that generates unique forwarding addresses for every service you use. Owned by Proton.
German-based encrypted email with strong end-to-end encryption, including password-protected messages to outside recipients.
Firewall (Mac)
macOS outbound firewall that shows exactly what data is leaving your machine and lets you block it.
Keyboard apps
Open-source Android keyboard with no network permissions.
Modern open-source Android keyboard with a privacy-first design.
Fork of the AOSP keyboard. Open source, no internet permission, available on F-Droid.
Minimal keyboard with no internet access and no data collection. Available on F-Droid.
Masked cards
Generates single-use or merchant-locked virtual card numbers linked to your real bank account. Cards carry no identifying details and can be closed instantly.
Messaging apps
End-to-end encrypted by default for all messages, calls, and video. Open source and non-profit. See also securemessagingapps.com for a full comparison.
Decentralized messenger with no user IDs — not even a phone number.
Swiss-based encrypted messenger that doesn't require a phone number to register.
Mobile OS
Hardened, privacy-focused Android OS that removes Google tracking. Compatible with Google Pixel devices. Best installed yourself to ensure integrity.
Network & DNS
Office tools
Encrypted, open-source alternative to Google Docs. Documents are end-to-end encrypted — even CryptPad's servers can't read them.
Free, open-source offline office suite. No subscription, no phoning home.
Password managers
Physical products
Signal-blocking pouch that prevents a device from sending or receiving GPS, cellular, Bluetooth, NFC, or WiFi signals.
Micro-louver filter that narrows viewing angles so nearby people can't see your display.
Pass-through adapter that allows power but blocks data pins — prevents juice jacking at public charging ports.
Enables a wired connection, eliminating WiFi-based location tracking and reducing your wireless attack surface.
Physical sliding cover for laptop and phone cameras.
Podcasts & resources
Real-world stories covering hacks, breaches, cybercrime, and digital espionage.
Comparison resource for evaluating private messaging apps across encryption, metadata protection, open-source status, and more.
Search engines
Independent search engine that doesn't track queries or build user profiles.
Returns Google-quality results without passing your identity to Google.
VoIP & phone numbers
VPNs
Accepts cash and crypto, no email required to sign up, strict no-logs policy.
Open-source, audited VPN from the makers of ProtonMail. Transparent no-logs policy.