Skip to content

Photo Management

Most cloud photo management solutions like Google Photos, Flickr, and Amazon Photos don't secure your photos against being accessed by the cloud storage provider themselves. These options keep your personal photos private, while allowing you to share them only with family and trusted people.

ente

ente logo ente logo

ente is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is self-hostable. It underwent an audit by Cure53 in March 2023 and by Fallible in April 2023. The free trial offers 1GB of storage, for a year.

Homepage

Downloads

Stingle

Stingle logo Stingle logo

Stingle is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence.

Homepage

Downloads

PhotoPrism

PhotoPrism logo

PhotoPrism is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other features. It does not include E2EE, so it's best hosted on a server that you trust and is under your control.

Homepage

Downloads

Criteria

Please note we are not affiliated with any of the projects we recommend. In addition to our standard criteria, we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.

Minimum Requirements

  • Cloud-hosted providers must enforce end-to-end encryption.
  • Must offer a free plan or trial period for testing.
  • Must support TOTP or FIDO2 multi-factor authentication, or Passkey logins.
  • Must offer a web interface which supports basic file management functionality.
  • Must allow for easy exports of all files/documents.
  • Must use standard, audited encryption.
  • Must be open source.

Best Case

  • Should have a published audit from a reputable, independent third-party.

Share this website and spread privacy knowledge

Copy this text to easily share Privacy Guides with your friends and family on any social network!