Resources

Resources

This resources section provides curated tools, templates, community links, and a glossary to support your digital sovereignty journey. Our recommendations prioritize privacy, user control, and reduced dependency on surveillance-based ecosystems.

As we embrace the principle of progressive implementation, remember that digital sovereignty is a journey, not a destination. Start with the tools that meet your immediate needs, then gradually expand your sovereignty footprint as your confidence grows.

Curated Tools List with Ratings

Our Selection Criteria

We evaluate tools based on five key factors:

  • Sovereignty Impact: How effectively it reduces dependency on US-based tech giants
  • Usability: How accessible it is for the intended user level
  • Features: How comprehensive its capabilities are compared to mainstream alternatives
  • Support: How well maintained and documented it is
  • Community: How active and helpful the user community is

Rating Guide: ★☆☆☆☆ = Basic | ★★☆☆☆ = Good | ★★★☆☆ = Very Good | ★★★★☆ = Excellent | ★★★★★ = Outstanding

Essential Level

LibreOffice
★★★★☆

Free and open-source office suite with excellent compatibility with Microsoft Office formats. Includes word processing, spreadsheets, presentations, and more.

Key Features: Document compatibility, No telemetry, Offline usage, Regular updates

Best For: Everyday office tasks, Document creation, Spreadsheet analysis

Official Website
Joplin
★★★★☆

Open-source note-taking and organization application with end-to-end encryption. Synchronizes across devices and supports markdown formatting.

Key Features: End-to-end encryption, NextCloud sync, Markdown support, Web clipper

Best For: Note-taking, Knowledge management, Personal documentation

Official Website
NextCloud
★★★★★

Self-hosted productivity platform offering file storage, sharing, and collaboration. A comprehensive alternative to Google Drive and Microsoft 365.

Key Features: File storage, Calendar/contacts sync, Collaborative editing, App ecosystem

Best For: File storage, Team collaboration, Personal cloud

Official Website

Business Level

CryptPad
★★★★☆

Zero-knowledge collaborative editing platform with real-time collaboration on documents, spreadsheets, presentations, and more.

Key Features: Zero-knowledge encryption, Real-time collaboration, No account required

Best For: Team document editing, Secure collaboration, Sensitive documents

Official Website
NextCloud Hub
★★★★☆

Extended NextCloud platform with additional enterprise features including workflow management, advanced sharing, and administrative controls.

Key Features: Project management, Talk integration, Document workflow, Access control

Best For: Small-medium businesses, Team coordination, Integrated workflows

Official Website
OnlyOffice
★★★★☆

Open-source office suite with superior Microsoft Office compatibility and real-time collaborative editing. Integrates seamlessly with NextCloud.

Key Features: MS Office compatibility, Real-time co-editing, Document management

Best For: Business document needs, Team document collaboration

Official Website

Individual Level

Obsidian
★★★★☆

Knowledge base built on local Markdown files. Creates a network of interconnected notes for advanced personal knowledge management.

Key Features: Knowledge graph, Local files, Plugins ecosystem, Markdown support

Best For: Advanced note-taking, Knowledge networks, Research organization

Official Website
Syncthing
★★★★★

Open-source, peer-to-peer file synchronization tool that securely synchronizes files between devices without a central server.

Key Features: No central server, End-to-end encryption, Version control, Cross-platform

Best For: File synchronization between personal devices, Offline backup

Official Website
Standard Notes
★★★★☆

End-to-end encrypted note-taking application with extended features for knowledge organization and long-term data ownership.

Key Features: End-to-end encryption, Long-term data ownership, Simple interface

Best For: Secure note-taking, Sensitive information, Cross-platform notes

Official Website

Enhanced Level

Self-hosted NextCloud
★★★★★

Fully self-hosted NextCloud instance on your own hardware or VPS, giving complete control over your productivity ecosystem.

Key Features: Complete control, Custom apps, Integration options, Advanced configuration

Best For: Advanced users, Privacy enthusiasts, Custom integrations

Installation Guide
Logseq
★★★★☆

Open-source platform for knowledge management with local storage, advanced outlining, and knowledge graph visualization.

Key Features: Local-first approach, Bidirectional linking, Outliner interface

Best For: Advanced knowledge management, Research organization, Visual thinking

Official Website
Joplin + NextCloud + Obsidian
★★★★★

Integrated system combining Joplin’s mobile support, NextCloud’s synchronization, and Obsidian’s knowledge management capabilities.

Key Features: Integrated workflow, Cross-application compatibility, Advanced organization

Best For: Power users, Complex knowledge management needs

Integration Tutorial (Coming Soon)

Essential Level

Signal
★★★★☆

Secure messaging app with end-to-end encryption, offering private messaging, calling, and group chats with enhanced privacy features.

Key Features: End-to-end encryption, Disappearing messages, Minimal metadata

Best For: Private messaging, Secure calls, Group coordination

Official Website
Proton Mail
★★★★☆

Encrypted email service based in Switzerland with end-to-end encryption and zero-access encryption for your mailbox.

Key Features: End-to-end encryption, Swiss privacy laws, Custom domains, Mobile apps

Best For: Secure email, Privacy-conscious users, Custom domain setup

Official Website
Jitsi Meet
★★★★☆

Free, open-source video conferencing solution that you can use directly in your browser without creating an account or installing software.

Key Features: No account needed, End-to-end encryption option, Screen sharing

Best For: Quick meetings, Privacy-focused video calls, Group conferences

Official Website

Business Level

Element (Matrix)
★★★★☆

Secure messenger built on the decentralized Matrix protocol, offering team chat, video calls, and integrations for businesses.

Key Features: End-to-end encryption, Federation, Bridging to other platforms

Best For: Team communication, Organizational chat, Alternative to Slack/Teams

Official Website
OVHcloud Email
★★★★☆

Professional email hosting based in France with business features like shared calendars, contacts, and custom domain support.

Key Features: European hosting, Custom domains, Collaborative features

Best For: Business email, Team coordination, European sovereignty

Official Website
NextCloud Talk
★★★☆☆

Integrated video conferencing solution within NextCloud, offering private communication directly from your file sharing platform.

Key Features: Integration with NextCloud, File sharing during calls, Chat persistence

Best For: Teams already using NextCloud, Internal meetings

Official Website

Individual Level

Thunderbird
★★★★☆

Free, open-source email client with calendar and chat features. Supports multiple email accounts and offers powerful customization.

Key Features: Open-source, Multiple account management, Calendar integration

Best For: Desktop email management, Calendar/contacts integration

Official Website
Mailbox.org
★★★★☆

German email provider with strong privacy focus, offering email, calendar, and cloud storage with integrated encryption.

Key Features: German privacy laws, Office features, PGP encryption support

Best For: Integrated email/calendar/contacts, European hosting

Official Website
Session
★★★★☆

Decentralized, end-to-end encrypted messenger that minimizes sensitive metadata and doesn’t require a phone number or email to register.

Key Features: No phone number required, Minimized metadata, Onion routing

Best For: Maximum privacy messaging, Anonymous communication

Official Website

Enhanced Level

Mailcow
★★★★★

Self-hosted email server solution with Docker that provides full control over your email infrastructure with modern administration interface.

Key Features: Complete control, Docker-based, Web administration, Anti-spam

Best For: Self-hosted email, Technical users, Complete email sovereignty

Official Website
Self-hosted Matrix
★★★★★

Run your own Matrix server for complete control over your messaging infrastructure while maintaining federation with the wider Matrix network.

Key Features: Full control of data, Federation options, Customizable policies

Best For: Advanced users, Organizations needing complete messaging control

Installation Guide
Delta Chat
★★★★☆

Chat application that works over email, providing a messenger-like interface while using the existing email infrastructure for maximum compatibility.

Key Features: Works over email, No new account needed, Decentralized architecture

Best For: Unified messaging, Communication with non-technical users

Official Website

Essential Level

Linux Mint
★★★★★

User-friendly Linux distribution with a familiar interface, perfect for those transitioning from Windows. Comes with essential software pre-installed.

Key Features: Windows-like interface, Software Manager, Long-term support

Best For: Windows users transitioning to Linux, General desktop use

Official Website
Minisforum HX99G
★★★★☆

Compact mini PC with AMD Ryzen 9 processor, ideal for running Linux with excellent performance in a small form factor.

Key Features: AMD Ryzen 9, Small form factor, High performance, Energy efficient

Best For: Everyday computing, Home desktop replacement

Official Website
Lenovo AMD Laptops
★★★☆☆

Laptops with AMD processors offering good Linux compatibility, performance, and battery life without Intel Management Engine concerns.

Key Features: AMD processors, Good Linux compatibility, Widely available

Best For: Mobile computing, Business use, Students

Official Website

Business Level

OVHcloud VPS
★★★★☆

European virtual private servers for hosting websites, email services, and other business applications with European data sovereignty.

Key Features: European hosting, Scalable resources, SSD storage

Best For: Business hosting, Email servers, Web applications

Official Website
Synology NAS
★★★★☆

Network Attached Storage solutions for businesses to store, back up, and share data on-premises with sophisticated management tools.

Key Features: On-premises storage, RAID support, App ecosystem

Best For: Business file storage, Team collaboration, Data backup

Official Website
Infomaniak
★★★★★

Swiss hosting provider offering managed services including web hosting, email, and cloud solutions with strong privacy commitments.

Key Features: Swiss privacy, Renewable energy powered, Managed services

Best For: Business hosting, Managed infrastructure, Swiss data residency

Official Website

Individual Level

Framework Laptop
★★★★★

Modular, repairable laptop designed for longevity with user-replaceable components and excellent Linux compatibility.

Key Features: Repairable design, Modular expansion, AMD/Intel options

Best For: Long-term investment, Right-to-repair advocates, Linux users

Official Website
Debian
★★★★☆

Highly stable and secure Linux distribution with strong commitment to free software principles and excellent package management.

Key Features: Rock-solid stability, Huge software repository, Long-term support

Best For: Stability-focused users, Servers, Older hardware

Official Website
Raspberry Pi
★★★★☆

Low-cost, low-power single-board computer perfect for self-hosting applications, learning Linux, and creating custom infrastructure solutions.

Key Features: Low cost, Low power consumption, Versatile applications

Best For: Self-hosting experiments, Learning projects, Simple servers

Official Website

Enhanced Level

Minisforum UM890 Pro
★★★★★

High-performance mini PC with AMD Ryzen 9, 64GB RAM capacity, and expandable storage ideal for running virtual machines and local AI models.

Key Features: Powerful AMD CPU, Expandable memory, Multi-display support

Best For: Virtualization, AI workloads, Content creation

Official Website
Proxmox VE
★★★★★

Open-source virtualization platform that combines KVM hypervisor and LXC containers with web-based management interface.

Key Features: VM and container support, Web interface, Live migration

Best For: Home lab, Self-hosted services, Advanced infrastructure

Official Website
QubesOS
★★★☆☆

Security-focused operating system that uses virtualization to provide strong isolation between different activities and trust domains.

Key Features: Security by compartmentalization, VM isolation, Template-based approach

Best For: Security-focused users, Threat isolation, Advanced privacy

Official Website

Essential Level

Bitwarden
★★★★★

Open-source password manager with end-to-end encryption that works across all devices and platforms. Free for personal use with premium features available.

Key Features: End-to-end encryption, Cross-platform, Browser extensions

Best For: Password management, Secure notes, Credit card storage

Official Website
uBlock Origin
★★★★★

Efficient and effective content blocker for browsers that blocks ads, trackers, and malware domains to enhance privacy and security.

Key Features: Ad blocking, Tracker blocking, Low resource usage

Best For: Everyday browsing, Privacy enhancement, Malware protection

Official Repository
SimpleLogin
★★★★☆

Email alias service that allows you to create unlimited email aliases to protect your real email address and reduce spam.

Key Features: Unlimited aliases, Reply functionality, Custom domains

Best For: Email privacy, Spam reduction, Account segregation

Official Website

Business Level

Bitwarden Organizations
★★★★★

Team and business version of Bitwarden with password sharing, role-based access control, and audit capabilities.

Key Features: Secure sharing, User management, Directory integration

Best For: Team password management, Secure credential sharing

Official Website
Borg Backup
★★★★☆

Deduplicating backup program that supports compression and authenticated encryption for efficient and secure backups.

Key Features: Deduplication, Encryption, Compression, Remote backups

Best For: Business data backups, Server backups, Efficient storage

Official Website
Tailscale
★★★☆☆

Zero-configuration VPN for building secure networks between devices and teams, making private services accessible securely from anywhere.

Key Features: Zero config, NAT traversal, End-to-end encryption

Best For: Team access to services, Remote work security

Official Website

Individual Level

Mullvad VPN
★★★★★

Privacy-focused VPN service that accepts cash, doesn’t require personal information, and maintains a strict no-logging policy.

Key Features: No account required, Anonymous payment, WireGuard support

Best For: Maximum privacy VPN, Anonymous browsing

Official Website
LUKS Disk Encryption
★★★★★

Linux disk encryption standard that provides strong security for protecting data on your device, even if it’s lost or stolen.

Key Features: Full disk encryption, Multiple key slots, Linux integration

Best For: Device security, Data protection, Anti-theft measures

Official Repository
KeePassXC
★★★★★

Offline, open-source password manager with strong encryption and advanced features like TOTP generation and hardware key support.

Key Features: Offline storage, Cross-platform, TOTP integration

Best For: Offline password storage, Air-gapped security

Official Website

Enhanced Level

pfSense
★★★★★

Open-source network firewall distribution based on FreeBSD, offering advanced routing, firewall, and VPN capabilities for network security.

Key Features: Advanced firewall, VPN server, Traffic shaping

Best For: Network security, Custom routing, Home/office protection

Official Website
Pi-hole
★★★★★

Network-level advertisement and tracking blocker that acts as a DNS sinkhole to block unwanted content before it reaches any of your devices.

Key Features: Network-wide blocking, DNS cache, Detailed statistics

Best For: Whole network ad blocking, IoT device protection

Official Website
YubiKey
★★★★★

Hardware authentication device that provides strong two-factor authentication through various protocols, including FIDO2, U2F, and PIV.

Key Features: Physical security key, Multiple protocols, Phishing resistance

Best For: Two-factor authentication, Advanced account security

Official Website

Essential Level

Claude AI
★★★★☆

Advanced AI assistant with strong privacy commitments, useful for writing, research, creative tasks, and technical problem-solving.

Key Features: Strong privacy policies, Helpful and harmless design, File uploads

Best For: Writing assistance, Research, Technical questions

Official Website
Perplexity
★★★☆☆

AI-powered search engine that provides sourced answers to questions while maintaining stronger privacy practices than traditional search engines.

Key Features: Citation-based answers, Conversational interface, Pro version

Best For: Research queries, Learning topics, Quick information

Official Website
Brave Leo
★★★☆☆

Privacy-focused AI assistant built into the Brave browser, designed to provide help without compromising your data.

Key Features: Integrated with Brave, Privacy focus, On-device processing options

Best For: Quick questions, Brave browser users, Privacy-conscious AI use

Official Website

Business Level

Claude for Teams
★★★★☆

Team-oriented version of Claude AI with enhanced document processing, larger context windows, and enterprise security features.

Key Features: Document analysis, Team workspace, API access

Best For: Business document processing, Team collaboration

Official Website
Aleph Alpha
★★★☆☆

European AI company offering large language models with EU data compliance and multilingual capabilities for business applications.

Key Features: European AI, Data sovereignty, Multilingual support

Best For: European businesses, Regulated industries

Official Website
Mistral Large
★★★★☆

European AI model with competitive capabilities, strong privacy commitments, and GDPR compliance for business use cases.

Key Features: French-based company, API access, Strong capabilities

Best For: European business applications, Custom AI implementations

Official Website

Individual Level

Jan
★★★★☆

Desktop AI assistant from Taiwan that runs completely locally on your computer, ensuring your data never leaves your device.

Key Features: Fully local, No data transmission, Open-source

Best For: Privacy-conscious AI users, Offline assistance

Official Website
LocalAI
★★★★☆

Self-hosted, offline AI server that can run various local models including LLMs, stable diffusion, and audio recognition models.

Key Features: Self-hosted, API compatible, Multiple model support

Best For: Local API deployment, Multiple AI capabilities

Official Website
LM Studio
★★★★☆

Desktop application that allows you to discover, download, and run local LLMs on your computer without sending data to external services.

Key Features: Model discovery, Local execution, Easy interface

Best For: Exploring different AI models, Local chat interface

Official Website

Enhanced Level

Ollama
★★★★★

Framework for running, managing and creating large language models locally on your device with simple commands and API access.

Key Features: Easy model installation, API server, Resource optimization

Best For: Local AI deployment, Custom applications, Developers

Official Website
Stable Diffusion XL
★★★★☆

Open-source image generation model that can run locally on your hardware, allowing creative image generation without sending data externally.

Key Features: Local image generation, High quality output, Customizable

Best For: Creative projects, Visual content creation, Privacy-conscious artists

Official Website
DeepSeek R2+
★★★★☆

Advanced compact language model optimized for local execution on consumer hardware with impressive capabilities despite its smaller size.

Key Features: Efficient model size, Strong reasoning, Local execution

Best For: Advanced users, Local AI development, Resource-efficient LLM

Official Website

Downloadable Templates and Checklists

These resources are designed to help you plan and track your digital sovereignty journey. Download and use these templates to organize your migration process, document your systems, and share knowledge with your team or family.

📋

Essential Migration Checklist

Comprehensive checklist for casual users implementing the Essential migration path.

Download PDF
🏢

Small Business Migration Planner

Planning document with timeline, responsibility assignments, and progress tracking for business implementations.

Download PDF
🧩

Individual Setup Worksheet

Detailed worksheet for technically inclined individuals implementing more advanced sovereignty solutions.

Download PDF
🚀

Enhanced Migration Roadmap

Advanced planning document for implementing AI-augmented sovereignty with infrastructure documentation.

Download PDF
📊

Sovereignty Assessment Tool

Spreadsheet for evaluating your current digital sovereignty status and identifying improvement opportunities.

Coming Soon
🔄

Email Migration Tracker

Template for managing the transition from corporate email providers to sovereign alternatives.

Coming Soon

Community and Support Resources

Digital sovereignty is a collaborative journey. These community resources provide support, knowledge sharing, and opportunities to connect with others on similar paths.

We welcome community input on all aspects of digital sovereignty. If you have suggestions for tools, resources, or improvements to our guides, please get in touch using the form below.

Contribute to the Digital Sovereignty Project

Share your knowledge, tools, or resources to help others on their sovereignty journey.

Forums & Discussion Groups

Educational Resources

Local User Groups

Digital Sovereignty Glossary

Explore key concepts and terminology related to digital sovereignty, privacy, and technology independence. Click on categories to expand and discover terms at different complexity levels.

Basic Concepts

Digital Sovereignty
Beginner

The ability to have autonomy and control over your digital presence, data, and technology choices, reducing dependency on corporate tech ecosystems and surveillance-based business models.

Digital sovereignty encompasses both individual and collective control over technology and data. It involves making conscious choices about which digital tools to use, how data is stored and processed, and ensuring technology serves user interests rather than corporate profit motives.

At a national level, digital sovereignty refers to a country’s ability to control its digital infrastructure and citizen data, reducing dependency on foreign technologies and services.

Open Source
Beginner

Software whose source code is publicly available, allowing anyone to view, modify, and distribute it. This transparency enables community verification of security and privacy claims.

Open source software is developed in a collaborative, public manner. Its open nature means security flaws are more likely to be discovered and fixed quickly, while malicious code is harder to hide.

Open source projects are typically governed by licenses that ensure they remain free and open, such as the GNU General Public License (GPL) or the MIT License.

Major examples include Linux, Firefox, LibreOffice, and thousands of other applications that form the foundation of a sovereign digital ecosystem.

End-to-End Encryption (E2EE)
Beginner

A communication system where only the communicating users can read the messages. Messages are encrypted on the sender’s device and can only be decrypted on the recipient’s device.

E2EE ensures that no third party, including the service provider, can access the content of communications. This contrasts with traditional encryption methods where the service provider holds the decryption keys.

Popular implementations include Signal Protocol (used by Signal, WhatsApp), Matrix’s Olm and Megolm protocols, and PGP for email.

E2EE is crucial for private communications but doesn’t protect metadata (like who is talking to whom, when, and how often).

Data Sovereignty
Intermediate

The concept that data is subject to the laws and governance structures of the nation where it is stored. Increasingly important with cloud computing and international data transfers.

Data sovereignty has significant implications for privacy, as data stored in different jurisdictions is subject to different legal protections. For example, data stored in the EU is protected by GDPR, while data stored in the US may be subject to access by intelligence agencies under laws like FISA.

Organizations increasingly choose where to store data based on legal protections and requirements, with some countries (like Switzerland) positioning themselves as secure data havens with strong privacy laws.

Vendor Lock-in
Advanced

A situation where a customer becomes dependent on a vendor’s products or services and cannot easily switch to a competitor without substantial costs or technical barriers.

Vendor lock-in is achieved through various mechanisms including proprietary file formats, closed APIs, network effects, and data capture. It creates power imbalances between vendors and users, leading to reduced innovation, higher prices, and reduced user control.

Strategies to avoid vendor lock-in include using open standards, ensuring data portability, using interoperable software, and supporting open-source alternatives that prevent monopolistic behavior.

Examples include Microsoft Office file formats, Apple’s ecosystem, Google’s integrated services, and cloud providers with proprietary APIs and services.

AI & Computing Concepts

Large Language Model (LLM)
Beginner

A type of AI model trained on vast amounts of text data to understand and generate human-like text. Examples include GPT-4, Claude, and Llama.

LLMs work by predicting the next word in a sequence based on patterns learned from training data. Their capabilities include drafting content, answering questions, summarizing information, translation, and code generation.

LLMs raise sovereignty concerns because they’re typically accessed as cloud services where user queries are sent to company servers, potentially exposing sensitive information. Local LLMs run directly on user devices, offering greater privacy but typically with reduced capabilities due to hardware constraints.

Common sovereignty-respecting approaches include using European AI companies (Mistral, Aleph Alpha), running smaller models locally (Ollama), or using privacy-focused commercial services (Claude).

Federated Learning
Intermediate

A machine learning approach where models are trained across multiple devices or servers holding local data samples, without exchanging the data itself—only model updates.

Federated learning addresses privacy concerns by keeping sensitive data on user devices while still allowing model improvement. It’s particularly valuable for applications involving personal data like health records, messages, or photos.

The process involves distributing a base model to devices, learning from local data, sending only parameter updates back to a central server, aggregating these updates, and redistributing the improved model.

Companies like Google use federated learning for keyboard prediction and other features, allowing personalization without sending raw user data to their servers.

Quantization
Advanced

A technique to reduce the precision of the numbers used in AI models, decreasing memory and computational requirements with some trade-off in accuracy.

Quantization is crucial for enabling large AI models to run on consumer hardware, supporting digital sovereignty by making local execution possible. Models are typically trained with 32-bit floating-point precision (FP32) but can be reduced to 16-bit (FP16), 8-bit integers (INT8), or even 4-bit (INT4) for inference.

Different quantization methods include post-training quantization (applied after training), quantization-aware training (incorporating quantization during training), and dynamic quantization (applying quantization at runtime).

Projects like llama.cpp and Ollama heavily utilize quantization to run models like Llama 2 and Mistral on standard consumer hardware, enabling sovereign AI use without cloud dependencies.

Homomorphic Encryption
Advanced

A form of encryption that allows computation on encrypted data without decryption. The results, when decrypted, match the results of operations performed on unencrypted data.

Homomorphic encryption enables privacy-preserving cloud computing and AI analysis, where sensitive data can be processed by third parties without exposing the actual content. This allows organizations to leverage cloud computing resources while maintaining data confidentiality.

There are three main types: Partially Homomorphic Encryption (supports either addition or multiplication), Somewhat Homomorphic Encryption (supports limited operations), and Fully Homomorphic Encryption (supports arbitrary computations).

Current implementations face performance challenges, with computations on encrypted data being significantly slower than on plaintext data. Active research continues to improve efficiency for practical applications.

Under Development

The Resources section is actively expanding. We’re currently working on:

  • More comprehensive tool evaluations with detailed comparison charts
  • Additional downloadable templates and checklists for specific migration scenarios
  • Expanded glossary with technical diagram visualizations
  • Interactive decision trees to help you select the right tools for your needs
  • Case studies of successful digital sovereignty implementations

We welcome your contributions and feedback to make this resource more valuable for everyone. Please use the contribution form above to share your suggestions.