mirror of
				https://github.com/privacyguides/i18n.git
				synced 2025-11-04 07:27:53 +00:00 
			
		
		
		
	New Crowdin translations by GitHub Action
This commit is contained in:
		@@ -99,13 +99,13 @@ The client software was independently [audited](https://briarproject.org/news/20
 | 
			
		||||
 | 
			
		||||
Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec).
 | 
			
		||||
 | 
			
		||||
Briar supports perfect forward secrecy by using the Bramble [Handshake](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BHP.md) and [Transport](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BTP.md) protocol.
 | 
			
		||||
Briar supports Forward Secrecy by using the Bramble [Handshake](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BHP.md) and [Transport](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BTP.md) protocol.
 | 
			
		||||
 | 
			
		||||
## Additional Options
 | 
			
		||||
 | 
			
		||||
!!! varning
 | 
			
		||||
 | 
			
		||||
    These messengers do not have Perfect [Forward Secrecy](https://en.wikipedia.org/wiki/Forward_secrecy) (PFS), and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of **all** past communications.
 | 
			
		||||
    These messengers do not have [Forward Secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of **all** past communications.
 | 
			
		||||
 | 
			
		||||
### Element
 | 
			
		||||
 | 
			
		||||
@@ -189,7 +189,7 @@ Session has a [whitepaper](https://arxiv.org/pdf/2002.04609.pdf) describing the
 | 
			
		||||
 | 
			
		||||
Våra kriterier för bästa fall representerar vad vi skulle vilja se av det perfekta projektet i denna kategori. Våra rekommendationer kanske inte innehåller alla eller några av dessa funktioner, men de som gör det kan vara högre rankade än andra på den här sidan.
 | 
			
		||||
 | 
			
		||||
- Should have Perfect Forward Secrecy.
 | 
			
		||||
- Should have Forward Secrecy.
 | 
			
		||||
- Should have open-source servers.
 | 
			
		||||
- Should be decentralized, i.e. federated or P2P.
 | 
			
		||||
- Should use E2EE for all messages by default.
 | 
			
		||||
 
 | 
			
		||||
@@ -279,13 +279,13 @@ A VPN is pointless if it can't even provide adequate security. We require all ou
 | 
			
		||||
**Minimum to Qualify:**
 | 
			
		||||
 | 
			
		||||
- Strong Encryption Schemes: OpenVPN with SHA-256 authentication; RSA-2048 or better handshake; AES-256-GCM or AES-256-CBC data encryption.
 | 
			
		||||
- Perfect Forward Secrecy (PFS).
 | 
			
		||||
- Forward Secrecy.
 | 
			
		||||
- Published security audits from a reputable third-party firm.
 | 
			
		||||
 | 
			
		||||
**Best Case:**
 | 
			
		||||
 | 
			
		||||
- Strongest Encryption: RSA-4096.
 | 
			
		||||
- Perfect Forward Secrecy (PFS).
 | 
			
		||||
- Forward Secrecy.
 | 
			
		||||
- Comprehensive published security audits from a reputable third-party firm.
 | 
			
		||||
- Bug-bounty programs and/or a coordinated vulnerability-disclosure process.
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user