diff --git a/i18n/ar/about/criteria.md b/i18n/ar/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/ar/about/criteria.md +++ b/i18n/ar/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/ar/about/index.md b/i18n/ar/about/index.md index 02032969..92aea46b 100644 --- a/i18n/ar/about/index.md +++ b/i18n/ar/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/ar/about/notices.md b/i18n/ar/about/notices.md index 9ccae1ae..d948a76a 100644 --- a/i18n/ar/about/notices.md +++ b/i18n/ar/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is not a law firm. As such, the Privacy Guides website and contri Running this website, like any human endeavor, involves uncertainty and trade-offs. We hope this website helps, but it may include mistakes and can’t address every situation. If you have any questions about your situation, we encourage you to do your own research, seek out other experts, and engage in discussions with the Privacy Guides community. If you have any legal questions, you should consult with your own legal counsel before moving forward. -Privacy Guides is an open source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Privacy Guides additionally does not warrant that this website will be constantly available, or available at all. diff --git a/i18n/ar/about/privacytools.md b/i18n/ar/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/ar/about/privacytools.md +++ b/i18n/ar/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/ar/android.md b/i18n/ar/android.md index 400d1a6c..1d498f09 100644 --- a/i18n/ar/android.md +++ b/i18n/ar/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/ar/basics/common-misconceptions.md b/i18n/ar/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/ar/basics/common-misconceptions.md +++ b/i18n/ar/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/ar/cloud.md b/i18n/ar/cloud.md index 080217e7..fcfec1c5 100644 --- a/i18n/ar/cloud.md +++ b/i18n/ar/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/ar/data-redaction.md b/i18n/ar/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/ar/data-redaction.md +++ b/i18n/ar/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/ar/desktop.md b/i18n/ar/desktop.md index 79c52e75..c2b5515a 100644 --- a/i18n/ar/desktop.md +++ b/i18n/ar/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/ar/email-clients.md b/i18n/ar/email-clients.md index c02dae71..955c824d 100644 --- a/i18n/ar/email-clients.md +++ b/i18n/ar/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/ar/encryption.md b/i18n/ar/encryption.md index 61fc1aa1..dcbacc03 100644 --- a/i18n/ar/encryption.md +++ b/i18n/ar/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/ar/frontends.md b/i18n/ar/frontends.md index 20c7c858..8e12809e 100644 --- a/i18n/ar/frontends.md +++ b/i18n/ar/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/ar/multi-factor-authentication.md b/i18n/ar/multi-factor-authentication.md index c10a310f..90cb34ce 100644 --- a/i18n/ar/multi-factor-authentication.md +++ b/i18n/ar/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/ar/notebooks.md b/i18n/ar/notebooks.md index fa318b5c..37448109 100644 --- a/i18n/ar/notebooks.md +++ b/i18n/ar/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/ar/os/android-overview.md b/i18n/ar/os/android-overview.md index bffa9e33..7a79c8c5 100644 --- a/i18n/ar/os/android-overview.md +++ b/i18n/ar/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/ar/os/linux-overview.md b/i18n/ar/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/ar/os/linux-overview.md +++ b/i18n/ar/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/ar/passwords.md b/i18n/ar/passwords.md index 3cc11265..db7c95d2 100644 --- a/i18n/ar/passwords.md +++ b/i18n/ar/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/ar/productivity.md b/i18n/ar/productivity.md index de2ce413..1d7c96de 100644 --- a/i18n/ar/productivity.md +++ b/i18n/ar/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/ar/router.md b/i18n/ar/router.md index bfa8d0a3..8b814e6e 100644 --- a/i18n/ar/router.md +++ b/i18n/ar/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/ar/vpn.md b/i18n/ar/vpn.md index 077f242e..5a747bf3 100644 --- a/i18n/ar/vpn.md +++ b/i18n/ar/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/bn-IN/about/criteria.md b/i18n/bn-IN/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/bn-IN/about/criteria.md +++ b/i18n/bn-IN/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/bn-IN/about/index.md b/i18n/bn-IN/about/index.md index 02032969..92aea46b 100644 --- a/i18n/bn-IN/about/index.md +++ b/i18n/bn-IN/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/bn-IN/about/notices.md b/i18n/bn-IN/about/notices.md index 9ccae1ae..d948a76a 100644 --- a/i18n/bn-IN/about/notices.md +++ b/i18n/bn-IN/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is not a law firm. As such, the Privacy Guides website and contri Running this website, like any human endeavor, involves uncertainty and trade-offs. We hope this website helps, but it may include mistakes and can’t address every situation. If you have any questions about your situation, we encourage you to do your own research, seek out other experts, and engage in discussions with the Privacy Guides community. If you have any legal questions, you should consult with your own legal counsel before moving forward. -Privacy Guides is an open source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Privacy Guides additionally does not warrant that this website will be constantly available, or available at all. diff --git a/i18n/bn-IN/about/privacytools.md b/i18n/bn-IN/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/bn-IN/about/privacytools.md +++ b/i18n/bn-IN/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/bn-IN/android.md b/i18n/bn-IN/android.md index 037e61ba..1c1d8b99 100644 --- a/i18n/bn-IN/android.md +++ b/i18n/bn-IN/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/bn-IN/basics/common-misconceptions.md b/i18n/bn-IN/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/bn-IN/basics/common-misconceptions.md +++ b/i18n/bn-IN/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/bn-IN/cloud.md b/i18n/bn-IN/cloud.md index 080217e7..fcfec1c5 100644 --- a/i18n/bn-IN/cloud.md +++ b/i18n/bn-IN/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/bn-IN/data-redaction.md b/i18n/bn-IN/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/bn-IN/data-redaction.md +++ b/i18n/bn-IN/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/bn-IN/desktop.md b/i18n/bn-IN/desktop.md index 79c52e75..c2b5515a 100644 --- a/i18n/bn-IN/desktop.md +++ b/i18n/bn-IN/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/bn-IN/email-clients.md b/i18n/bn-IN/email-clients.md index c02dae71..955c824d 100644 --- a/i18n/bn-IN/email-clients.md +++ b/i18n/bn-IN/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/bn-IN/encryption.md b/i18n/bn-IN/encryption.md index 61fc1aa1..dcbacc03 100644 --- a/i18n/bn-IN/encryption.md +++ b/i18n/bn-IN/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/bn-IN/frontends.md b/i18n/bn-IN/frontends.md index 20c7c858..8e12809e 100644 --- a/i18n/bn-IN/frontends.md +++ b/i18n/bn-IN/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/bn-IN/multi-factor-authentication.md b/i18n/bn-IN/multi-factor-authentication.md index c10a310f..90cb34ce 100644 --- a/i18n/bn-IN/multi-factor-authentication.md +++ b/i18n/bn-IN/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/bn-IN/notebooks.md b/i18n/bn-IN/notebooks.md index fa318b5c..37448109 100644 --- a/i18n/bn-IN/notebooks.md +++ b/i18n/bn-IN/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/bn-IN/os/android-overview.md b/i18n/bn-IN/os/android-overview.md index 84673306..eee959de 100644 --- a/i18n/bn-IN/os/android-overview.md +++ b/i18n/bn-IN/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/bn-IN/os/linux-overview.md b/i18n/bn-IN/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/bn-IN/os/linux-overview.md +++ b/i18n/bn-IN/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/bn-IN/passwords.md b/i18n/bn-IN/passwords.md index 7defe823..8a27cf69 100644 --- a/i18n/bn-IN/passwords.md +++ b/i18n/bn-IN/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/bn-IN/productivity.md b/i18n/bn-IN/productivity.md index de2ce413..1d7c96de 100644 --- a/i18n/bn-IN/productivity.md +++ b/i18n/bn-IN/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/bn-IN/router.md b/i18n/bn-IN/router.md index bfa8d0a3..8b814e6e 100644 --- a/i18n/bn-IN/router.md +++ b/i18n/bn-IN/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/bn-IN/vpn.md b/i18n/bn-IN/vpn.md index 6538a869..8a3fccf3 100644 --- a/i18n/bn-IN/vpn.md +++ b/i18n/bn-IN/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/bn/about/criteria.md b/i18n/bn/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/bn/about/criteria.md +++ b/i18n/bn/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/bn/about/index.md b/i18n/bn/about/index.md index 02032969..92aea46b 100644 --- a/i18n/bn/about/index.md +++ b/i18n/bn/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/bn/about/notices.md b/i18n/bn/about/notices.md index 9ccae1ae..d948a76a 100644 --- a/i18n/bn/about/notices.md +++ b/i18n/bn/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is not a law firm. As such, the Privacy Guides website and contri Running this website, like any human endeavor, involves uncertainty and trade-offs. We hope this website helps, but it may include mistakes and can’t address every situation. If you have any questions about your situation, we encourage you to do your own research, seek out other experts, and engage in discussions with the Privacy Guides community. If you have any legal questions, you should consult with your own legal counsel before moving forward. -Privacy Guides is an open source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Privacy Guides additionally does not warrant that this website will be constantly available, or available at all. diff --git a/i18n/bn/about/privacytools.md b/i18n/bn/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/bn/about/privacytools.md +++ b/i18n/bn/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/bn/android.md b/i18n/bn/android.md index 400d1a6c..1d498f09 100644 --- a/i18n/bn/android.md +++ b/i18n/bn/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/bn/basics/common-misconceptions.md b/i18n/bn/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/bn/basics/common-misconceptions.md +++ b/i18n/bn/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/bn/cloud.md b/i18n/bn/cloud.md index 080217e7..fcfec1c5 100644 --- a/i18n/bn/cloud.md +++ b/i18n/bn/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/bn/data-redaction.md b/i18n/bn/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/bn/data-redaction.md +++ b/i18n/bn/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/bn/desktop.md b/i18n/bn/desktop.md index 79c52e75..c2b5515a 100644 --- a/i18n/bn/desktop.md +++ b/i18n/bn/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/bn/email-clients.md b/i18n/bn/email-clients.md index c02dae71..955c824d 100644 --- a/i18n/bn/email-clients.md +++ b/i18n/bn/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/bn/encryption.md b/i18n/bn/encryption.md index 61fc1aa1..dcbacc03 100644 --- a/i18n/bn/encryption.md +++ b/i18n/bn/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/bn/frontends.md b/i18n/bn/frontends.md index 20c7c858..8e12809e 100644 --- a/i18n/bn/frontends.md +++ b/i18n/bn/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/bn/multi-factor-authentication.md b/i18n/bn/multi-factor-authentication.md index c10a310f..90cb34ce 100644 --- a/i18n/bn/multi-factor-authentication.md +++ b/i18n/bn/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/bn/notebooks.md b/i18n/bn/notebooks.md index fa318b5c..37448109 100644 --- a/i18n/bn/notebooks.md +++ b/i18n/bn/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/bn/os/android-overview.md b/i18n/bn/os/android-overview.md index bffa9e33..7a79c8c5 100644 --- a/i18n/bn/os/android-overview.md +++ b/i18n/bn/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/bn/os/linux-overview.md b/i18n/bn/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/bn/os/linux-overview.md +++ b/i18n/bn/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/bn/passwords.md b/i18n/bn/passwords.md index 3cc11265..db7c95d2 100644 --- a/i18n/bn/passwords.md +++ b/i18n/bn/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/bn/productivity.md b/i18n/bn/productivity.md index de2ce413..1d7c96de 100644 --- a/i18n/bn/productivity.md +++ b/i18n/bn/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/bn/router.md b/i18n/bn/router.md index bfa8d0a3..8b814e6e 100644 --- a/i18n/bn/router.md +++ b/i18n/bn/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/bn/vpn.md b/i18n/bn/vpn.md index 6538a869..8a3fccf3 100644 --- a/i18n/bn/vpn.md +++ b/i18n/bn/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/cs/about/criteria.md b/i18n/cs/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/cs/about/criteria.md +++ b/i18n/cs/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/cs/about/index.md b/i18n/cs/about/index.md index 02032969..92aea46b 100644 --- a/i18n/cs/about/index.md +++ b/i18n/cs/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/cs/about/notices.md b/i18n/cs/about/notices.md index 9ccae1ae..d948a76a 100644 --- a/i18n/cs/about/notices.md +++ b/i18n/cs/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is not a law firm. As such, the Privacy Guides website and contri Running this website, like any human endeavor, involves uncertainty and trade-offs. We hope this website helps, but it may include mistakes and can’t address every situation. If you have any questions about your situation, we encourage you to do your own research, seek out other experts, and engage in discussions with the Privacy Guides community. If you have any legal questions, you should consult with your own legal counsel before moving forward. -Privacy Guides is an open source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Privacy Guides additionally does not warrant that this website will be constantly available, or available at all. diff --git a/i18n/cs/about/privacytools.md b/i18n/cs/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/cs/about/privacytools.md +++ b/i18n/cs/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/cs/android.md b/i18n/cs/android.md index 400d1a6c..1d498f09 100644 --- a/i18n/cs/android.md +++ b/i18n/cs/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/cs/basics/common-misconceptions.md b/i18n/cs/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/cs/basics/common-misconceptions.md +++ b/i18n/cs/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/cs/cloud.md b/i18n/cs/cloud.md index 080217e7..fcfec1c5 100644 --- a/i18n/cs/cloud.md +++ b/i18n/cs/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/cs/data-redaction.md b/i18n/cs/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/cs/data-redaction.md +++ b/i18n/cs/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/cs/desktop.md b/i18n/cs/desktop.md index 79c52e75..c2b5515a 100644 --- a/i18n/cs/desktop.md +++ b/i18n/cs/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/cs/email-clients.md b/i18n/cs/email-clients.md index c02dae71..955c824d 100644 --- a/i18n/cs/email-clients.md +++ b/i18n/cs/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/cs/encryption.md b/i18n/cs/encryption.md index 61fc1aa1..dcbacc03 100644 --- a/i18n/cs/encryption.md +++ b/i18n/cs/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/cs/frontends.md b/i18n/cs/frontends.md index 20c7c858..8e12809e 100644 --- a/i18n/cs/frontends.md +++ b/i18n/cs/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/cs/multi-factor-authentication.md b/i18n/cs/multi-factor-authentication.md index c10a310f..90cb34ce 100644 --- a/i18n/cs/multi-factor-authentication.md +++ b/i18n/cs/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/cs/notebooks.md b/i18n/cs/notebooks.md index fa318b5c..37448109 100644 --- a/i18n/cs/notebooks.md +++ b/i18n/cs/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/cs/os/android-overview.md b/i18n/cs/os/android-overview.md index bffa9e33..7a79c8c5 100644 --- a/i18n/cs/os/android-overview.md +++ b/i18n/cs/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/cs/os/linux-overview.md b/i18n/cs/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/cs/os/linux-overview.md +++ b/i18n/cs/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/cs/passwords.md b/i18n/cs/passwords.md index 3cc11265..db7c95d2 100644 --- a/i18n/cs/passwords.md +++ b/i18n/cs/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/cs/productivity.md b/i18n/cs/productivity.md index de2ce413..1d7c96de 100644 --- a/i18n/cs/productivity.md +++ b/i18n/cs/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/cs/router.md b/i18n/cs/router.md index bfa8d0a3..8b814e6e 100644 --- a/i18n/cs/router.md +++ b/i18n/cs/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/cs/vpn.md b/i18n/cs/vpn.md index 6538a869..8a3fccf3 100644 --- a/i18n/cs/vpn.md +++ b/i18n/cs/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/de/about/criteria.md b/i18n/de/about/criteria.md index ef7b0a96..7c67f1a0 100644 --- a/i18n/de/about/criteria.md +++ b/i18n/de/about/criteria.md @@ -17,7 +17,7 @@ Wir verdienen kein Geld mit Empfehlungen bestimmter Produkte, wir verwenden kein Wir wenden diese Prioritäten beim Prüfen neuer Empfehlungen an: - **Sicher**: Tools sollten, wo möglich, bewährte Sicherheitspraktiken anwenden. -- **Verfügbarkeit der Quellen**: Open-Source-Projekte werden meist gegenüber gleichwertigen proprietären Alternativen bevorzugt. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Plattformübergreifend**: Wir bevorzugen Empfehlungen die plattformübergreifend sind, um eine Herstellerbindung zu vermeiden. - **Aktive Entwicklung**: Die von uns empfohlenen Tools sollten aktiv weiterentwickelt werden, nicht gewartete Projekte werden in den meisten Fällen entfernt. - **Benutzerfreundlichkeit**: Die Tools sollten für die meisten Computerbenutzer zugänglich sein, ein übermäßig technischer Hintergrund sollte nicht erforderlich sein. diff --git a/i18n/de/about/index.md b/i18n/de/about/index.md index da414da6..b2f36f1f 100644 --- a/i18n/de/about/index.md +++ b/i18n/de/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/de/about/notices.md b/i18n/de/about/notices.md index b186861a..ba2e0ea6 100644 --- a/i18n/de/about/notices.md +++ b/i18n/de/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides ist keine Anwaltskanzlei. Die Privacy Guides-Webseite und die Mit Der Betrieb dieser Webseite ist wie jedes menschliche Unterfangen mit Ungewissheit und Abwägungen verbunden. Wir hoffen, dass diese Webseite hilfreich ist, aber sie kann Fehler enthalten und nicht alle Situationen abdecken. Wenn du Fragen zu deiner Situation hast, ermutigen wir dich, deine eigenen Nachforschungen anzustellen, andere Experten zu befragen und dich an Diskussionen mit der Privacy Guides Community zu beteiligen. Wenn du rechtliche Fragen hast, solltest du einen Rechtsanwalt konsultieren, ehe du fortfährst. -Privacy Guides ist ein Open-Source-Projekt, bei dem Beiträge im Rahmen von Lizenzen bereitgestellt werden, die Bedingungen zum Schutz der Webseite und ihrer Mitwirkenden enthalten, die klarstellen, dass das Privacy-Guides-Projekt und die Website "so wie sie sind" angeboten werden, ohne Garantie und unter Ausschluss der Haftung für Schäden, die aus der Nutzung der Website oder der darin enthaltenen Empfehlungen entstehen. Privacy Guides übernimmt keine Gewährleistung für die Richtigkeit, die wahrscheinlichen Ergebnisse oder die Verlässlichkeit der Nutzung des Materials auf der Webseite oder in sonstiger Weise in Bezug auf dieses Material auf der Webseite oder auf den Webseiten Dritter, die auf dieser Webseite verlinkt sind, und macht auch keine diesbezüglichen Zusicherungen. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides übernimmt keine Gewährleistung für die Richtigkeit, die wahrscheinlichen Ergebnisse oder die Verlässlichkeit der Nutzung des Materials auf der Webseite oder in sonstiger Weise in Bezug auf dieses Material auf der Webseite oder auf den Webseiten Dritter, die auf dieser Webseite verlinkt sind, und macht auch keine diesbezüglichen Zusicherungen. Privacy Guides garantiert außerdem nicht, dass diese Webseite ständig oder überhaupt verfügbar sein wird. diff --git a/i18n/de/about/privacytools.md b/i18n/de/about/privacytools.md index c75d8941..d848eee1 100644 --- a/i18n/de/about/privacytools.md +++ b/i18n/de/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu veröffentlichte zudem einen [Twitter-Beitrag](https://twitter.com/p Seit dem 25. September 2022 sehen wir, wie die Pläne von BurungHantu auf privacytools.io in die Tat umgesetzt werden, und das ist der Grund, warum wir uns entschieden haben, heute diese Erklärungsseite zu erstellen. Bei der von ihm betriebenen Webseite scheint es sich um eine stark SEO-optimierte Version der Website zu handeln, auf der Tools gegen eine finanzielle Vergütung empfohlen werden. Vor kurzem wurden IVPN und Mullvad, zwei VPN-Anbieter, die von der Datenschutz-Community nahezu universell [empfohlen](../vpn.md) werden und sich durch ihre Ablehnung von Partnerprogrammen auszeichnen, von PrivacyTools entfernt. An ihrer Stelle? NordVPN, Surfshark, ExpressVPN und hide.me: Riesige VPN-Unternehmen mit unseriösen Plattformen und Geschäftspraktiken, berüchtigt für ihr aggressives Marketing und ihre Partnerprogramme. -==**PrivacyTools ist genau die Art von Website geworden, vor der wir 2019 im PrivacyTools-Blog [gewarnt haben](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/).**==Wir haben versucht, uns seit der Umstellung von PrivacyTools zu distanzieren, aber ihre anhaltenden Attacken auf unser Projekt und ihr absurder Missbrauch der Glaubwürdigkeit ihrer Marke, die sie in sechs Jahren Open-Source-Beiträgen erlangt haben, beunruhigen uns sehr. Diejenigen von uns, die tatsächlich für den Schutz der Privatsphäre kämpfen, kämpfen nicht gegeneinander und holen sich ihre Ratschläge nicht vom Meistbietenden. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Diejenigen von uns, die tatsächlich für den Schutz der Privatsphäre kämpfen, kämpfen nicht gegeneinander und holen sich ihre Ratschläge nicht vom Meistbietenden. ## r/privacytoolsIO heute diff --git a/i18n/de/android.md b/i18n/de/android.md index 262d5586..da8461e8 100644 --- a/i18n/de/android.md +++ b/i18n/de/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/de/basics/common-misconceptions.md b/i18n/de/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/de/basics/common-misconceptions.md +++ b/i18n/de/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/de/cloud.md b/i18n/de/cloud.md index 080217e7..fcfec1c5 100644 --- a/i18n/de/cloud.md +++ b/i18n/de/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/de/data-redaction.md b/i18n/de/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/de/data-redaction.md +++ b/i18n/de/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/de/desktop.md b/i18n/de/desktop.md index 79c52e75..c2b5515a 100644 --- a/i18n/de/desktop.md +++ b/i18n/de/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/de/email-clients.md b/i18n/de/email-clients.md index 916ed4ce..8cdf4d6f 100644 --- a/i18n/de/email-clients.md +++ b/i18n/de/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/de/encryption.md b/i18n/de/encryption.md index 61fc1aa1..dcbacc03 100644 --- a/i18n/de/encryption.md +++ b/i18n/de/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/de/frontends.md b/i18n/de/frontends.md index 20c7c858..8e12809e 100644 --- a/i18n/de/frontends.md +++ b/i18n/de/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/de/multi-factor-authentication.md b/i18n/de/multi-factor-authentication.md index c10a310f..90cb34ce 100644 --- a/i18n/de/multi-factor-authentication.md +++ b/i18n/de/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/de/notebooks.md b/i18n/de/notebooks.md index fa318b5c..37448109 100644 --- a/i18n/de/notebooks.md +++ b/i18n/de/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/de/os/android-overview.md b/i18n/de/os/android-overview.md index bffa9e33..7a79c8c5 100644 --- a/i18n/de/os/android-overview.md +++ b/i18n/de/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/de/os/linux-overview.md b/i18n/de/os/linux-overview.md index 0a242a52..de7a9c52 100644 --- a/i18n/de/os/linux-overview.md +++ b/i18n/de/os/linux-overview.md @@ -18,7 +18,7 @@ Es gibt einige Datenschutzprobleme bei Linux, die Sie beachten sollten. Trotz di - [Freie Software](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) bevorzugen - Datenschutzfreundliche Systeme wie [Whonix](https://www.whonix.org) oder [Tails](https://tails.boum.org/) verwenden -### Open-Source Sicherheit +### Open-Source Security Es ist ein [verbreiteter Irrglaube](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure), dass Linux und andere Open-Source-Software von Natur aus sicher ist, nur weil der Quellcode verfügbar ist. Es wird erwartet, dass eine regelmäßige Überprüfung durch die Community erfolgt, aber das ist nicht immer der Fall. diff --git a/i18n/de/passwords.md b/i18n/de/passwords.md index 3cc11265..db7c95d2 100644 --- a/i18n/de/passwords.md +++ b/i18n/de/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/de/productivity.md b/i18n/de/productivity.md index de2ce413..1d7c96de 100644 --- a/i18n/de/productivity.md +++ b/i18n/de/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/de/router.md b/i18n/de/router.md index 7806baf3..2a31ddca 100644 --- a/i18n/de/router.md +++ b/i18n/de/router.md @@ -29,7 +29,7 @@ Sie können in der [table of hardware](https://openwrt.org/toh/start) von OpenWr ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense* ist eine FreeBSD-basierte Open-Source-Firewall- und Routing-Plattform, die viele erweiterte Funktionen wie Traffic Shaping, Load Balancing und VPN-Funktionen enthält, wobei viele weitere Funktionen in Form von Plugins verfügbar sind. OPNsense wird in der Regel als Perimeter-Firewall, Router, Wireless Access Point, DHCP-Server, DNS-Server und VPN-Endpunkt eingesetzt. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense wird in der Regel als Perimeter-Firewall, Router, Wireless Access Point, DHCP-Server, DNS-Server und VPN-Endpunkt eingesetzt. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/de/vpn.md b/i18n/de/vpn.md index 34cc00d8..e137ffde 100644 --- a/i18n/de/vpn.md +++ b/i18n/de/vpn.md @@ -133,7 +133,7 @@ IVPN hat sich einem [No-Logging-Audit von Cure53](https://cure53.de/audit-report #### :material-check:{ .pg-green } Open-Source Anwendungen -Ab Februar 2020 sind [IVPN-Anwendungen quelloffen](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Der Quellcode kann von ihrer [GitHub Organisation](https://github.com/ivpn) bezogen werden. +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Der Quellcode kann von ihrer [GitHub Organisation](https://github.com/ivpn) bezogen werden. #### :material-check:{ .pg-green } Akzeptiert Bargeld und Monero @@ -248,7 +248,7 @@ Wir setzen von allen von uns empfohlenen VPN-Anbietern voraus, dass sie OpenVPN- - Unterstützung von starken Protokollen wie WireGuard & OpenVPN. - Notaus ist in den Clients integriert. - Multihop-Unterstützung. Multihopping ist wichtig, um Daten im Falle einer Kompromittierung eines einzelnen Knotens geheim zu halten. -- Wenn VPN-Clients zur Verfügung gestellt werden, sollten sie [Open Source](https://de.wikipedia.org/wiki/Open_Source)sein, wie die VPN-Software, die in der Regel in sie integriert ist. Wir sind der Meinung, dass [Quellcode](https://de.wikipedia.org/wiki/Quelltext) mehr Transparenz darüber bietet, was dein Gerät tatsächlich tut. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. Wir sind der Meinung, dass [Quellcode](https://de.wikipedia.org/wiki/Quelltext) mehr Transparenz darüber bietet, was dein Gerät tatsächlich tut. **Im besten Fall:** diff --git a/i18n/el/about/criteria.md b/i18n/el/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/el/about/criteria.md +++ b/i18n/el/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/el/about/index.md b/i18n/el/about/index.md index 02032969..92aea46b 100644 --- a/i18n/el/about/index.md +++ b/i18n/el/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/el/about/notices.md b/i18n/el/about/notices.md index 9ccae1ae..d948a76a 100644 --- a/i18n/el/about/notices.md +++ b/i18n/el/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is not a law firm. As such, the Privacy Guides website and contri Running this website, like any human endeavor, involves uncertainty and trade-offs. We hope this website helps, but it may include mistakes and can’t address every situation. If you have any questions about your situation, we encourage you to do your own research, seek out other experts, and engage in discussions with the Privacy Guides community. If you have any legal questions, you should consult with your own legal counsel before moving forward. -Privacy Guides is an open source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Privacy Guides additionally does not warrant that this website will be constantly available, or available at all. diff --git a/i18n/el/about/privacytools.md b/i18n/el/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/el/about/privacytools.md +++ b/i18n/el/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/el/android.md b/i18n/el/android.md index 400d1a6c..1d498f09 100644 --- a/i18n/el/android.md +++ b/i18n/el/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/el/basics/common-misconceptions.md b/i18n/el/basics/common-misconceptions.md index 716aaf8a..5fbb5235 100644 --- a/i18n/el/basics/common-misconceptions.md +++ b/i18n/el/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/el/cloud.md b/i18n/el/cloud.md index 080217e7..fcfec1c5 100644 --- a/i18n/el/cloud.md +++ b/i18n/el/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/el/data-redaction.md b/i18n/el/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/el/data-redaction.md +++ b/i18n/el/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/el/desktop.md b/i18n/el/desktop.md index 79c52e75..c2b5515a 100644 --- a/i18n/el/desktop.md +++ b/i18n/el/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/el/email-clients.md b/i18n/el/email-clients.md index c02dae71..955c824d 100644 --- a/i18n/el/email-clients.md +++ b/i18n/el/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/el/encryption.md b/i18n/el/encryption.md index 61fc1aa1..dcbacc03 100644 --- a/i18n/el/encryption.md +++ b/i18n/el/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/el/frontends.md b/i18n/el/frontends.md index 20c7c858..8e12809e 100644 --- a/i18n/el/frontends.md +++ b/i18n/el/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/el/multi-factor-authentication.md b/i18n/el/multi-factor-authentication.md index c10a310f..90cb34ce 100644 --- a/i18n/el/multi-factor-authentication.md +++ b/i18n/el/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/el/notebooks.md b/i18n/el/notebooks.md index fa318b5c..37448109 100644 --- a/i18n/el/notebooks.md +++ b/i18n/el/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/el/os/android-overview.md b/i18n/el/os/android-overview.md index bffa9e33..7a79c8c5 100644 --- a/i18n/el/os/android-overview.md +++ b/i18n/el/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/el/os/linux-overview.md b/i18n/el/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/el/os/linux-overview.md +++ b/i18n/el/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/el/passwords.md b/i18n/el/passwords.md index 3cc11265..db7c95d2 100644 --- a/i18n/el/passwords.md +++ b/i18n/el/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/el/productivity.md b/i18n/el/productivity.md index de2ce413..1d7c96de 100644 --- a/i18n/el/productivity.md +++ b/i18n/el/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/el/router.md b/i18n/el/router.md index ffdab028..f53fddde 100644 --- a/i18n/el/router.md +++ b/i18n/el/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/el/vpn.md b/i18n/el/vpn.md index 2defd0df..6df29a61 100644 --- a/i18n/el/vpn.md +++ b/i18n/el/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/eo/about/criteria.md b/i18n/eo/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/eo/about/criteria.md +++ b/i18n/eo/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/eo/about/index.md b/i18n/eo/about/index.md index 02032969..92aea46b 100644 --- a/i18n/eo/about/index.md +++ b/i18n/eo/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/eo/about/notices.md b/i18n/eo/about/notices.md index 9ccae1ae..d948a76a 100644 --- a/i18n/eo/about/notices.md +++ b/i18n/eo/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is not a law firm. As such, the Privacy Guides website and contri Running this website, like any human endeavor, involves uncertainty and trade-offs. We hope this website helps, but it may include mistakes and can’t address every situation. If you have any questions about your situation, we encourage you to do your own research, seek out other experts, and engage in discussions with the Privacy Guides community. If you have any legal questions, you should consult with your own legal counsel before moving forward. -Privacy Guides is an open source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Privacy Guides additionally does not warrant that this website will be constantly available, or available at all. diff --git a/i18n/eo/about/privacytools.md b/i18n/eo/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/eo/about/privacytools.md +++ b/i18n/eo/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/eo/android.md b/i18n/eo/android.md index 400d1a6c..1d498f09 100644 --- a/i18n/eo/android.md +++ b/i18n/eo/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/eo/basics/common-misconceptions.md b/i18n/eo/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/eo/basics/common-misconceptions.md +++ b/i18n/eo/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/eo/cloud.md b/i18n/eo/cloud.md index 080217e7..fcfec1c5 100644 --- a/i18n/eo/cloud.md +++ b/i18n/eo/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/eo/data-redaction.md b/i18n/eo/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/eo/data-redaction.md +++ b/i18n/eo/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/eo/desktop.md b/i18n/eo/desktop.md index 79c52e75..c2b5515a 100644 --- a/i18n/eo/desktop.md +++ b/i18n/eo/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/eo/email-clients.md b/i18n/eo/email-clients.md index c02dae71..955c824d 100644 --- a/i18n/eo/email-clients.md +++ b/i18n/eo/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/eo/encryption.md b/i18n/eo/encryption.md index 61fc1aa1..dcbacc03 100644 --- a/i18n/eo/encryption.md +++ b/i18n/eo/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/eo/frontends.md b/i18n/eo/frontends.md index 20c7c858..8e12809e 100644 --- a/i18n/eo/frontends.md +++ b/i18n/eo/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/eo/multi-factor-authentication.md b/i18n/eo/multi-factor-authentication.md index c10a310f..90cb34ce 100644 --- a/i18n/eo/multi-factor-authentication.md +++ b/i18n/eo/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/eo/notebooks.md b/i18n/eo/notebooks.md index fa318b5c..37448109 100644 --- a/i18n/eo/notebooks.md +++ b/i18n/eo/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/eo/os/android-overview.md b/i18n/eo/os/android-overview.md index bffa9e33..7a79c8c5 100644 --- a/i18n/eo/os/android-overview.md +++ b/i18n/eo/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/eo/os/linux-overview.md b/i18n/eo/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/eo/os/linux-overview.md +++ b/i18n/eo/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/eo/passwords.md b/i18n/eo/passwords.md index 3cc11265..db7c95d2 100644 --- a/i18n/eo/passwords.md +++ b/i18n/eo/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/eo/productivity.md b/i18n/eo/productivity.md index de2ce413..1d7c96de 100644 --- a/i18n/eo/productivity.md +++ b/i18n/eo/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/eo/router.md b/i18n/eo/router.md index bfa8d0a3..8b814e6e 100644 --- a/i18n/eo/router.md +++ b/i18n/eo/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/eo/vpn.md b/i18n/eo/vpn.md index 6538a869..8a3fccf3 100644 --- a/i18n/eo/vpn.md +++ b/i18n/eo/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/es/about/criteria.md b/i18n/es/about/criteria.md index 3f1cc3c7..ce11006f 100644 --- a/i18n/es/about/criteria.md +++ b/i18n/es/about/criteria.md @@ -17,7 +17,7 @@ No obtenemos dinero al recomendar ciertos productos, nosotros no utilizamos enla Aplicamos estas prioridades al considerar nuevas recomendaciones: - Herramientas **seguras**: Las herramientas deben seguir las mejores prácticas de seguridad cuando sea necesario. -- **Disponibilidad del código**: Proyectos de código abierto son preferidos sobre alternativas similares de código cerrado. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Multiplataforma**: Preferimos que las recomendaciones sean multiplataforma para evitar la dependencia de un sistema. - **Desarrollo activo**: Las herramientas que recomendamos deben ser desarrolladas activamente, los proyectos no mantenidos serán eliminados en la mayoría de los casos. - **Usabilidad**: Las herramientas deben ser accesibles para la mayoría de los usuarios de ordenador, no debe exigirse una formación demasiado técnica. diff --git a/i18n/es/about/index.md b/i18n/es/about/index.md index b561e1e8..1e6750cf 100644 --- a/i18n/es/about/index.md +++ b/i18n/es/about/index.md @@ -81,7 +81,7 @@ En lo que va de 2023 hemos lanzado traducciones internacionales de nuestro sitio - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Además, [muchas personas](https://github.com/privacyguides/privacyguides.org/graphs/contributors) han hecho contribuciones al proyecto. Tú también puedes, estamos en código abierto en GitHub y aceptamos sugerencias de traducción en [Crowdin](https://crowdin.com/project/privacyguides). +Además, [muchas personas](https://github.com/privacyguides/privacyguides.org/graphs/contributors) han hecho contribuciones al proyecto. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Los miembros de nuestro equipo revisan todos los cambios realizados en el sitio web y se encargan de las tareas administrativas, como el web hosting y las finanzas, pero no se benefician personalmente de las donaciones hechas a este sitio. Nuestras finanzas están alojadas de forma transparente en el Open Collective Foundation 501(c)(3) en [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Las donaciones a Privacy Guides son generalmente deducibles de impuestos en los Estados Unidos. diff --git a/i18n/es/about/notices.md b/i18n/es/about/notices.md index d5706c79..3050654d 100644 --- a/i18n/es/about/notices.md +++ b/i18n/es/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides no es un bufete de abogados. Como tal, el sitio web de Privacy Gu Dirigir este sitio web, como cualquier empresa humana, implica incertidumbre y compromisos. Esperamos que este sitio web ayude, pero puede incluir errores y no puede abordar todas las situaciones. Si tiene alguna duda sobre su situación, le animamos a que investigue por su cuenta, busque a otros expertos y participe en debates con la comunidad de Privacy Guides. Si tienes alguna pregunta legal, deberías consultar con tu propio asesor jurídico antes de seguir adelante. -Privacy Guides es un proyecto de código abierto al que se ha contribuido bajo licencias que incluyen términos que, para la protección del sitio web y sus contribuyentes, dejan claro que el proyecto Privacy Guides y el sitio web se ofrece "tal cual", sin garantía, y renunciando a la responsabilidad por los daños resultantes del uso del sitio web o de cualquier recomendación contenida en él. Privacy Guides no garantiza ni hace ninguna declaración sobre la exactitud, los resultados probables o la fiabilidad del uso de los materiales en el sitio web o de cualquier otro modo relacionado con dichos materiales en el sitio web o en cualquier sitio de terceros vinculado en este sitio. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides no garantiza ni hace ninguna declaración sobre la exactitud, los resultados probables o la fiabilidad del uso de los materiales en el sitio web o de cualquier otro modo relacionado con dichos materiales en el sitio web o en cualquier sitio de terceros vinculado en este sitio. Además, Privacy Guides no garantiza que este sitio web esté disponible, de forma constante o en absoluto. diff --git a/i18n/es/about/privacytools.md b/i18n/es/about/privacytools.md index 6bf4a801..4f6db418 100644 --- a/i18n/es/about/privacytools.md +++ b/i18n/es/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu también hizo una [publicación en Twitter](https://twitter.com/priv A partir del 25 de septiembre de 2022 estamos viendo cómo los planes generales de BurungHantu se hacen realidad en privacytools.io, y esta es la razón por la que hemos decidido crear esta página explicativa hoy. El sitio web que está operando parece ser una versión altamente optimizada para SEO del sitio que recomienda herramientas a cambio de una compensación financiera. Recientemente, IVPN y Mullvad, dos proveedores de VPN [recomendados](../vpn.md) casi universalmente por la comunidad de la privacidad y notables por su postura contra los programas de afiliación, fueron eliminados de PrivacyTools. ¿En su lugar? NordVPN, Surfshark, ExpressVPN y hide.me; gigantescas corporaciones de VPN con plataformas y prácticas comerciales poco fiables, famosas por sus agresivos programas de marketing y afiliación. -==**PrivacyTools se ha convertido exactamente en el tipo de sitio que [advertimos](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) en el blog de PrivacyTools en 2019.**== Hemos intentado mantener las distancias con PrivacyTools desde la transición, pero su continuo acoso hacia nuestro proyecto y ahora su absurdo abuso de la credibilidad que su marca ha ganado a lo largo de 6 años de contribuciones de código abierto es extremadamente preocupante para nosotros. Los que realmente luchamos por la privacidad no estamos luchando entre nosotros, y no estamos recibiendo nuestro consejo del mejor postor. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Los que realmente luchamos por la privacidad no estamos luchando entre nosotros, y no estamos recibiendo nuestro consejo del mejor postor. ## r/privacytoolsIO Ahora diff --git a/i18n/es/android.md b/i18n/es/android.md index 7ea2ff8d..a07cd9b6 100644 --- a/i18n/es/android.md +++ b/i18n/es/android.md @@ -180,7 +180,7 @@ Los teléfonos Google Pixel son los **únicos **dispositivos que recomendamos co Los elementos seguros como el Titan M2 son más limitados que el entorno de ejecución confiable del procesador utilizado por la mayoría de los otros teléfonos, ya que solo se utilizan para el almacenamiento secreto, la certificación de hardware y la limitación de velocidad, no para ejecutar programas "confiables". Los teléfonos sin un Elemento Seguro tienen que utilizar el TEE para *todas* esas funciones, lo que resulta en una mayor superficie de ataque. -Los teléfonos Google Pixel utilizan un SO TEE llamado Trusty que es [de código abierto](https://source.android.com/security/trusty#whyTrusty), a diferencia de muchos otros teléfonos. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. La instalación de GrapheneOS en un teléfono Pixel es fácil con su [instalador web](https://grapheneos.org/install/web). Si no te sientes cómodo haciéndolo tu mismo y estás dispuesto a gastar un poco más de dinero, échale un vistazo a [NitroPhone](https://shop.nitrokey.com/shop), ya que vienen con GrapheneOS, de la reputada empresa [Nitrokey](https://www.nitrokey.com/about). diff --git a/i18n/es/basics/common-misconceptions.md b/i18n/es/basics/common-misconceptions.md index 3d7e03f9..6477a634 100644 --- a/i18n/es/basics/common-misconceptions.md +++ b/i18n/es/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: '¿Es el software de código abierto intrínsecamente seguro?' + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md index 032c64cb..d91d8838 100644 --- a/i18n/es/cloud.md +++ b/i18n/es/cloud.md @@ -93,7 +93,7 @@ También han recibido el Sello de Confianza Digital, una certificación de la [I Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto perfecto en esta categoría. Es posible que nuestras recomendaciones no incluyan todas o algunas de estas funciones, pero las que sí las incluyan pueden estar mejor clasificadas que otras en esta página. -- Los clientes deben ser de código abierto. +- Clients should be open source. - Los clientes deben ser auditados en su totalidad por un tercero independiente. - Debe ofrecer clientes nativos para Linux, Android, Windows, macOS e iOS. - Estos clientes deben integrarse con las herramientas nativas del sistema operativo para los proveedores de almacenamiento en la nube, como la integración de la aplicación Files en iOS, o la funcionalidad DocumentsProvider en Android. diff --git a/i18n/es/data-redaction.md b/i18n/es/data-redaction.md index 7ccfc860..2a0a700f 100644 --- a/i18n/es/data-redaction.md +++ b/i18n/es/data-redaction.md @@ -55,19 +55,19 @@ Cuando compartas archivos, asegúrate de remover los metadatos asociados. Archiv Los metadatos que son eliminados dependen del tipo de archivo de la imagen: -* **JPEG**: Los metadatos ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP serán eliminados si existen. -* **PNG**: Los metadatos ICC Profile, Exif y XMP serán eliminados si existen. -* **WebP**: Los metadatos ICC Profile, Exif y XMP serán eliminados si existen. +- **JPEG**: Los metadatos ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP serán eliminados si existen. +- **PNG**: Los metadatos ICC Profile, Exif y XMP serán eliminados si existen. +- **WebP**: Los metadatos ICC Profile, Exif y XMP serán eliminados si existen. Tras procesar las imágenes, ExifEraser te proporciona un informe completo sobre lo que se ha eliminado exactamente de cada imagen. La aplicación ofrece múltiples formas de borrar los metadatos de las imágenes. Estas son: -* Puede compartir una imagen de otra aplicación con ExifEraser. -* A través de la propia aplicación, puedes seleccionar una sola imagen, varias imágenes a la vez o incluso un directorio entero. -* Cuenta con una opción de "Cámara", que utiliza la aplicación de cámara de tu sistema operativo para tomar una foto, y luego elimina los metadatos de la misma. -* Te permite arrastrar fotos desde otra aplicación a ExifEraser cuando ambas están abiertas en modo de pantalla dividida. -* Por último, te permite pegar una imagen desde el portapapeles. +- Puede compartir una imagen de otra aplicación con ExifEraser. +- A través de la propia aplicación, puedes seleccionar una sola imagen, varias imágenes a la vez o incluso un directorio entero. +- Cuenta con una opción de "Cámara", que utiliza la aplicación de cámara de tu sistema operativo para tomar una foto, y luego elimina los metadatos de la misma. +- Te permite arrastrar fotos desde otra aplicación a ExifEraser cuando ambas están abiertas en modo de pantalla dividida. +- Por último, te permite pegar una imagen desde el portapapeles. ### Metapho (iOS) @@ -143,5 +143,5 @@ La aplicación ofrece múltiples formas de borrar los metadatos de las imágenes Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso. -- Las aplicaciones desarrolladas para sistemas operativos de código abierto deben ser de código abierto. +- Apps developed for open-source operating systems must be open source. - Las aplicaciones deben ser gratuitas y no incluir anuncios ni otras limitaciones. diff --git a/i18n/es/desktop.md b/i18n/es/desktop.md index d1f9ef01..06e66655 100644 --- a/i18n/es/desktop.md +++ b/i18n/es/desktop.md @@ -185,7 +185,7 @@ Aunque [desaconsejamos](os/linux-overview.md#release-cycle) distribuciones "perp La elección de una distribución Linux adecuada para usted dependerá de una gran variedad de preferencias personales, y esta página **no** pretende ser una lista exhaustiva de todas las distribuciones viables. En nuestra página de información general sobre Linux encontrará algunos consejos sobre [elegir una distribución](os/linux-overview.md#choosing-your-distribution) con más detalle. Todas las distribuciones que se encuentran en *esta* página siguen, en general, las directrices que cubrimos allí, y todas cumplen estas normas: -- Gratis y de código abierto. +- Free and open source. - Recibe actualizaciones periódicas del software y del kernel. - [Evita X11](os/linux-overview.md#wayland). - La excepción notable aquí es Qubes, pero los problemas de aislamiento que X11 suele tener se evitan con la virtualización. Este aislamiento sólo se aplica a las aplicaciones *que se ejecutan en qubes diferentes* (máquinas virtuales), las aplicaciones que se ejecutan en el *mismo* qube no están protegidas entre sí. diff --git a/i18n/es/email-clients.md b/i18n/es/email-clients.md index 837e5958..8dd92f1f 100644 --- a/i18n/es/email-clients.md +++ b/i18n/es/email-clients.md @@ -226,7 +226,7 @@ Canary Mail es de código cerrado. Lo recomendamos debido a las pocas opciones q ### Requisitos Mínimos -- Las aplicaciones desarrolladas para sistemas operativos de código abierto deben ser de código abierto. +- Apps developed for open-source operating systems must be open source. - No debe recolectar telemetría, o debe tener una manera fácil de deshabilitar toda la telemetría. - Debe soportar el cifrado de mensajes OpenPGP. @@ -234,7 +234,7 @@ Canary Mail es de código cerrado. Lo recomendamos debido a las pocas opciones q Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto perfecto en esta categoría. Es posible que nuestras recomendaciones no incluyan todas o algunas de estas funciones, pero las que sí las incluyan pueden estar mejor clasificadas que otras en esta página. -- Debe ser de código abierto. +- Should be open source. - Debe ser multiplataforma. - No debe recopilar ninguna telemetría por defecto. - Debe soportar OpenPGP de forma nativa, es decir, sin extensiones. diff --git a/i18n/es/encryption.md b/i18n/es/encryption.md index 3da798f2..929933e8 100644 --- a/i18n/es/encryption.md +++ b/i18n/es/encryption.md @@ -345,7 +345,7 @@ Al cifrar con PGP, tiene la opción de configurar diferentes opciones en su arch ### Requisitos Mínimos -- Las aplicaciones de cifrado multiplataforma deben ser de código abierto. +- Cross-platform encryption apps must be open source. - Las aplicaciones de cifrado de archivos deben permitir el descifrado en Linux, macOS y Windows. - Las aplicaciones de cifrado de discos externos deben permitir el descifrado en Linux, macOS y Windows. - Las aplicaciones de cifrado de disco interno (OS) deben ser multiplataforma o estar integradas en el sistema operativo de forma nativa. diff --git a/i18n/es/frontends.md b/i18n/es/frontends.md index df4c8e4d..7bad1f2f 100644 --- a/i18n/es/frontends.md +++ b/i18n/es/frontends.md @@ -41,7 +41,7 @@ Cuando utilices una instancia gestionada por otra persona, asegúrate de leer la ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - *ProxiTok** es una interfaz gratuita y de código abierto para el sitio web [TikTok](https://www.tiktok.com) que también es autoalojable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. Existen varias instancias públicas, algunas de las cuales disponen de soporte para servicios onion [Tor](https://www.torproject.org). diff --git a/i18n/es/multi-factor-authentication.md b/i18n/es/multi-factor-authentication.md index 125a6018..849edabd 100644 --- a/i18n/es/multi-factor-authentication.md +++ b/i18n/es/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp La [tabla de comparación](https://www.yubico.com/store/compare/) muestra las características y cómo se comparan las YubiKeys. Le recomendamos que seleccione las llaves de las YubiKey 5 Series. -Las YubiKeys se pueden programar utilizando [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) o [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Para gestionar los códigos TOTP, puede utilizar [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Todos los clientes de Yubico son de código abierto. +Las YubiKeys se pueden programar utilizando [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) o [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Para gestionar los códigos TOTP, puede utilizar [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. Para los modelos que soportan HOTP y TOTP, hay 2 ranuras en la interfaz OTP que pueden utilizarse para HOTP y 32 ranuras para almacenar secretos TOTP. Estos secretos se almacenan cifrados en la llave y nunca se exponen a los dispositivos a los que se conectan. Una vez que se ha proporcionado una semilla (secreto compartido) a Yubico Authenticator, éste sólo proporcionará los códigos de seis dígitos, pero nunca la semilla. Este modelo de seguridad ayuda a limitar lo que un atacante puede hacer si compromete uno de los dispositivos que ejecutan Yubico Authenticator y hace que la YubiKey sea resistente a un atacante físico. -!!! advertencia - El firmware de YubiKey no es de código abierto y no es actualizable. Si desea características en versiones de firmware más nuevas, o si hay una vulnerabilidad en la versión de firmware que está utilizando, tendría que comprar una nueva llave. +!!! warning + The firmware of YubiKey is not open source and is not updatable. Si desea características en versiones de firmware más nuevas, o si hay una vulnerabilidad en la versión de firmware que está utilizando, tendría que comprar una nueva llave. ### Nitrokey @@ -58,7 +58,7 @@ Para los modelos que admiten HOTP y TOTP, hay 3 ranuras para HOTP y 15 para TOTP La Nitrokey Pro 2, la Nitrokey Storage 2 y la próxima Nitrokey 3 admiten la verificación de la integridad del sistema para portátiles con el firmware [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/). -El firmware de Nitrokey es de código abierto, a diferencia del de YubiKey. El firmware de los modelos NitroKey modernos (excepto el de la **NitroKey Pro 2**) se puede actualizar. +Nitrokey's firmware is open source, unlike the YubiKey. El firmware de los modelos NitroKey modernos (excepto el de la **NitroKey Pro 2**) se puede actualizar. ### Criterios diff --git a/i18n/es/notebooks.md b/i18n/es/notebooks.md index d017b595..c96e11a5 100644 --- a/i18n/es/notebooks.md +++ b/i18n/es/notebooks.md @@ -132,7 +132,7 @@ Cryptee ofrece 100MB de almacenamiento gratuito, con opciones de pago si necesit Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso. -- Los clientes deben ser de código abierto. +- Clients must be open source. - Cualquier funcionalidad de sincronización en la nube debe ser E2EE. - Debe permitir exportar documentos a un formato estándar. diff --git a/i18n/es/os/android-overview.md b/i18n/es/os/android-overview.md index e84a73db..6c5edfcc 100644 --- a/i18n/es/os/android-overview.md +++ b/i18n/es/os/android-overview.md @@ -12,7 +12,7 @@ description: Android es un sistema operativo de código abierto con fuertes medi ### Elegir una distribución de Android -Cuando compras un celular Android, el sistema operativo por defecto suele venir con una integración invasiva con aplicaciones y servicios que no son parte del [Android Open Source Project](https://source.android.com/). Un ejemplo de ello son los servicios de Google Play, el cual tiene permisos irrevocables a tus archivos, almacenamiento de contactos, registros de llamadas, mensajes SMS, ubicación, cámara, micrófono, identificadores de hardware, etc. Estas aplicaciones y servicios aumentan la superficie de ataque de tu dispositivo y son la fuente de varios problemas de privacidad en Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). Un ejemplo de ello son los servicios de Google Play, el cual tiene permisos irrevocables a tus archivos, almacenamiento de contactos, registros de llamadas, mensajes SMS, ubicación, cámara, micrófono, identificadores de hardware, etc. Estas aplicaciones y servicios aumentan la superficie de ataque de tu dispositivo y son la fuente de varios problemas de privacidad en Android. Este problema puede ser solucionado al usar una distribución modificada de Android la cual no contenga tal integración invasiva. Desafortunadamente, varias distribuciones modificadas de Android suelen violar el modelo de seguridad de Android al no soportar características críticas de seguridad como el AVB, protección de reversión, actualizaciones del firmware, etc. Algunas distribuciones también incluyen compilaciones [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) las cuales exponen root vía [ADB](https://developer.android.com/studio/command-line/adb) y requieren políticas [más permisivas](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) de SELinux para acomodar las características de depuración, lo que resulta en una superficie de ataque aún más grande y un modelo de seguridad debilitado. diff --git a/i18n/es/os/linux-overview.md b/i18n/es/os/linux-overview.md index 2b399545..b4d37027 100644 --- a/i18n/es/os/linux-overview.md +++ b/i18n/es/os/linux-overview.md @@ -18,7 +18,7 @@ Linux plantea algunos problemas de privacidad importantes que debes tener en cue - Mantener la ['libertad del software'](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Utilizar sistemas centrados en la privacidad como [Whonix](https://www.whonix.org) o [Tails](https://tails.boum.org/) -### Seguridad de Código Abierto +### Open-Source Security Es un [error común](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) pensar que Linux y otros programas de código abierto son intrínsecamente seguros simplemente porque el código fuente está disponible. Se espera que la verificación comunitaria se realice con regularidad, pero este no siempre es [el caso](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index 3815977d..fa236c44 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -161,7 +161,7 @@ Bitwarden también cuenta con [Bitwarden Send](https://bitwarden.com/products/se Necesita el [Plan Premium](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) para poder compartir archivos. El plan gratuito sólo permite compartir texto. -El código del lado del servidor de Bitwarden es [de código abierto](https://github.com/bitwarden/server), por lo que si no desea utilizar la nube de Bitwarden, puede alojar fácilmente su propio servidor de sincronización Bitwarden. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** es una implementación alternativa del servidor de sincronización de Bitwarden escrito en Rust y compatible con los clientes oficiales de Bitwarden, perfecto para la implementación autoalojada donde ejecutar el servicio oficial de recursos pesados podría no ser ideal. Si usted está buscando autoalojar Bitwarden en su propio servidor, es casi seguro que desee utilizar Vaultwarden en lugar del código del servidor oficial de Bitwarden. @@ -239,7 +239,7 @@ Psono proporciona una amplia documentación para su producto. El cliente web par Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto perfecto en esta categoría. Es posible que nuestras recomendaciones no incluyan todas o algunas de estas funciones, pero las que sí las incluyan pueden estar mejor clasificadas que otras en esta página. - La telemetría debe ser opcional (desactivada por defecto) o no recopilarse en absoluto. -- Debe ser de código abierto y razonablemente autoalojable. +- Should be open source and reasonably self-hostable. ## Almacenamiento Local diff --git a/i18n/es/productivity.md b/i18n/es/productivity.md index fa1921d4..51622460 100644 --- a/i18n/es/productivity.md +++ b/i18n/es/productivity.md @@ -60,7 +60,7 @@ La mayoría de las paquetes de ofimática en línea no admiten E2EE, lo que sign En general, definimos las plataformas de colaboración como paquetes completos que podrían actuar razonablemente como un sustituto de plataformas de colaboración como Google Drive. -- De Código Abierto. +- Open source. - Hace que los archivos sean accesibles a través de WebDAV a menos que sea imposible debido al E2EE. - Dispone de clientes de sincronización para Linux, macOS y Windows. - Admite la edición de documentos y hojas de cálculo. @@ -162,11 +162,10 @@ En general, definimos las paquetes ofimáticos como aplicaciones que podrían su #### Requisitos Mínimos -- Deben ser de código abierto. +- Debe ser de código abierto. - Debe implementar el cifrado de extremo a extremo de "confianza cero". - Debe admitir archivos protegidos por contraseña. - #### Mejor Caso Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto perfecto en esta categoría. Es posible que nuestras recomendaciones no incluyan todas o algunas de estas funciones, pero las que sí las incluyan pueden estar mejor clasificadas que otras en esta página. diff --git a/i18n/es/router.md b/i18n/es/router.md index 98fcabc9..4947b26f 100644 --- a/i18n/es/router.md +++ b/i18n/es/router.md @@ -29,7 +29,7 @@ Puedes consultar [ la tabla de hardware](https://openwrt.org/toh/start) de OpenW ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** es una plataforma de enrutamiento y cortafuegos de código abierto basada en FreeBSD que incorpora muchas características avanzadas, como la conformación del tráfico, el equilibrio de carga y las capacidades de VPN, con muchas más características disponibles en forma de plugins. OPNsense se implementa habitualmente como cortafuegos perimetral, router, punto de acceso inalámbrico, servidor DHCP, servidor DNS y punto final VPN. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense se implementa habitualmente como cortafuegos perimetral, router, punto de acceso inalámbrico, servidor DHCP, servidor DNS y punto final VPN. [:octicons-home-16: Página Principal](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentación} diff --git a/i18n/es/vpn.md b/i18n/es/vpn.md index 974b3c24..c5708d24 100644 --- a/i18n/es/vpn.md +++ b/i18n/es/vpn.md @@ -135,7 +135,7 @@ IVPN se ha sometido a una auditoría de no-registrar en [por parte de Cure53](ht #### :material-check:{ .pg-green } Clientes de Código Abierto -A partir de febrero de 2020 [Las aplicaciones IVPN ya son de código abierto](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). El código fuente puede ser obtenido en su [organización GitHub](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). El código fuente puede ser obtenido en su [organización GitHub](https://github.com/ivpn). #### :material-check:{ .pg-green } Acepta Efectivo y Monero @@ -250,7 +250,7 @@ Requerimos que todos nuestros proveedores de VPN recomendados proporcionen archi - Soporte para protocolos fuertes como WireGuard & OpenVPN. - Killswitch integrado en los clientes. - Soporte de multisaltos. El multihopping es importante para mantener la privacidad de los datos en caso de que un solo nodo se vea comprometido. -- Si se proporciona clientes VPN, deben ser [de código abierto](https://en.wikipedia.org/wiki/Open_source), como el software VPN que generalmente llevan incorporado. Creemos que la disponibilidad de [código fuente](https://en.wikipedia.org/wiki/Source_code) proporciona una mayor transparencia sobre lo que su dispositivo está haciendo realmente. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. Creemos que la disponibilidad de [código fuente](https://en.wikipedia.org/wiki/Source_code) proporciona una mayor transparencia sobre lo que su dispositivo está haciendo realmente. **Mejor Caso:** diff --git a/i18n/fa/about/criteria.md b/i18n/fa/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/fa/about/criteria.md +++ b/i18n/fa/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/fa/about/index.md b/i18n/fa/about/index.md index c3ebc0b5..ba1c877b 100644 --- a/i18n/fa/about/index.md +++ b/i18n/fa/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/fa/about/notices.md b/i18n/fa/about/notices.md index f6466785..19ab8f60 100644 --- a/i18n/fa/about/notices.md +++ b/i18n/fa/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides(راهنمای حفظ حریم خصوصی) یک شرکت حقوق راه اندازی این وب سایت، مانند هر تلاش انسانی، مستلزم عدم اطمینان و مبادله است. امیدواریم این وب سایت به شما کمک کند، اما ممکن است شامل اشتباهاتی باشد و نتواند به هر موقعیتی رسیدگی کند. اگر در مورد وضعیت خود سؤالی دارید، ما شما را تشویق می‌کنیم که تحقیقات خود را انجام دهید، کارشناسان دیگر را جستجو کنید و با انجمن راهنماهای حریم خصوصی وارد بحث شوید. اگر سؤالات قانونی دارید، قبل از ادامه کار باید با وکیل قانونی خود مشاوره کنید. -"Privacy Guides" یک پروژه منبع باز است که با مجوزهایی که شامل شرایطی برای حفاظت از وب سایت و مشارکت کنندگان آن است، به آن کمک می‌کند. این پروژه و وب سایت "Privacy Guides" به همان شکلی که می‌بینید ارائه شده است، بدون هیچ گونه ضمانتی ارائه می‌شود و هیچ مسئولیتی در قبال آسیب‌های ناشی از استفاده از وب سایت یا هر گونه توصیه موجود در آن ندارد. "Privacy Guides" هیچ گونه ضمانتی درباره دقت، نتایج محتمل یا قابلیت اعتماد استفاده از محتوای موجود در وب سایت و یا در مورد هر گونه محتوای دیگری مرتبط با محتوای موجود در وب سایت یا در هر سایت شخص ثالثی که در این سایت لینک شده است، ارائه نمی‌دهد و هیچ گونه تضمینی نیز ندارد. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. "Privacy Guides" هیچ گونه ضمانتی درباره دقت، نتایج محتمل یا قابلیت اعتماد استفاده از محتوای موجود در وب سایت و یا در مورد هر گونه محتوای دیگری مرتبط با محتوای موجود در وب سایت یا در هر سایت شخص ثالثی که در این سایت لینک شده است، ارائه نمی‌دهد و هیچ گونه تضمینی نیز ندارد. همچنین "Privacy Guides" هیچ ضمانتی درباره دسترسی مداوم یا کلی به این وب سایت ارائه نمی‌دهد. diff --git a/i18n/fa/about/privacytools.md b/i18n/fa/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/fa/about/privacytools.md +++ b/i18n/fa/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/fa/android.md b/i18n/fa/android.md index 400d1a6c..1d498f09 100644 --- a/i18n/fa/android.md +++ b/i18n/fa/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/fa/basics/common-misconceptions.md b/i18n/fa/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/fa/basics/common-misconceptions.md +++ b/i18n/fa/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/fa/cloud.md b/i18n/fa/cloud.md index 43f340d5..0e0bd6ad 100644 --- a/i18n/fa/cloud.md +++ b/i18n/fa/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/fa/data-redaction.md b/i18n/fa/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/fa/data-redaction.md +++ b/i18n/fa/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/fa/desktop.md b/i18n/fa/desktop.md index 79c52e75..c2b5515a 100644 --- a/i18n/fa/desktop.md +++ b/i18n/fa/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/fa/email-clients.md b/i18n/fa/email-clients.md index 7c932a12..167a6d14 100644 --- a/i18n/fa/email-clients.md +++ b/i18n/fa/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/fa/encryption.md b/i18n/fa/encryption.md index 61fc1aa1..dcbacc03 100644 --- a/i18n/fa/encryption.md +++ b/i18n/fa/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/fa/frontends.md b/i18n/fa/frontends.md index 20c7c858..8e12809e 100644 --- a/i18n/fa/frontends.md +++ b/i18n/fa/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/fa/multi-factor-authentication.md b/i18n/fa/multi-factor-authentication.md index c10a310f..90cb34ce 100644 --- a/i18n/fa/multi-factor-authentication.md +++ b/i18n/fa/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/fa/notebooks.md b/i18n/fa/notebooks.md index ab8b3f4f..5f48d27d 100644 --- a/i18n/fa/notebooks.md +++ b/i18n/fa/notebooks.md @@ -130,7 +130,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/fa/os/android-overview.md b/i18n/fa/os/android-overview.md index bffa9e33..7a79c8c5 100644 --- a/i18n/fa/os/android-overview.md +++ b/i18n/fa/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/fa/os/linux-overview.md b/i18n/fa/os/linux-overview.md index 861e5bcd..40adb418 100644 --- a/i18n/fa/os/linux-overview.md +++ b/i18n/fa/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/fa/passwords.md b/i18n/fa/passwords.md index 3cc11265..db7c95d2 100644 --- a/i18n/fa/passwords.md +++ b/i18n/fa/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/fa/productivity.md b/i18n/fa/productivity.md index de2ce413..1d7c96de 100644 --- a/i18n/fa/productivity.md +++ b/i18n/fa/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/fa/router.md b/i18n/fa/router.md index bfa8d0a3..8b814e6e 100644 --- a/i18n/fa/router.md +++ b/i18n/fa/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/fa/vpn.md b/i18n/fa/vpn.md index 4c923228..0edf2d4c 100644 --- a/i18n/fa/vpn.md +++ b/i18n/fa/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/fr/about/criteria.md b/i18n/fr/about/criteria.md index 3381fa50..d5ef2251 100644 --- a/i18n/fr/about/criteria.md +++ b/i18n/fr/about/criteria.md @@ -17,7 +17,7 @@ Nous ne gagnons pas d'argent en recommandant certains produits, nous n'utilisons Nous appliquons ces priorités lorsque nous envisageons de nouvelles recommandations : - **Sécurisé** : les outils doivent respecter les bonnes pratiques en matière de sécurité, le cas échéant. -- **Disponibilité des sources** : les projets à source ouverte sont généralement préférés aux solutions propriétaires équivalentes. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Multiplateforme** : nous préférons généralement que les recommandations soient multiplateformes, afin d'éviter d'être coincé chez un fournisseur. - **Développement actif** : les outils que nous recommandons doivent être activement maintenus. Les projets non maintenus seront, dans la plupart des cas, supprimés. - **Facilité d'utilisation** : les outils doivent être accessibles à la plupart des utilisateurs d'ordinateurs, sans qu'un bagage trop technique soit nécessaire. diff --git a/i18n/fr/about/index.md b/i18n/fr/about/index.md index 39127c38..db0d3ea6 100644 --- a/i18n/fr/about/index.md +++ b/i18n/fr/about/index.md @@ -81,7 +81,7 @@ Jusqu'à présent en 2023, nous avons lancé des traductions internationales de - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -De plus, [de nombreuses personnes](https://github.com/privacyguides/privacyguides.org/graphs/contributors) ont apporté des contributions au projet. Vous pouvez aussi, nous sommes open source sur GitHub, et acceptons les suggestions de traduction sur [Crowdin](https://crowdin.com/project/privacyguides). +De plus, [de nombreuses personnes](https://github.com/privacyguides/privacyguides.org/graphs/contributors) ont apporté des contributions au projet. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Les membres de notre équipe examinent toutes les modifications apportées au site et s'occupent des tâches administratives telles que l'hébergement et les finances, mais ils ne profitent pas personnellement des contributions apportées à ce site. Nos finances sont hébergées de manière transparente par la Fondation Open Collective 501(c)(3) sur [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Les dons à Privacy Guides sont généralement déductibles des impôts aux États-Unis. diff --git a/i18n/fr/about/notices.md b/i18n/fr/about/notices.md index 94412d24..d9a09542 100644 --- a/i18n/fr/about/notices.md +++ b/i18n/fr/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides n'est pas un cabinet d'avocats. À ce titre, le site web Privacy La gestion de ce site web, comme toute entreprise humaine, comporte des incertitudes et des compromis. Nous espérons que ce site web vous aidera, mais il peut comporter des erreurs et ne peut pas répondre à toutes les situations. Si vous avez des questions sur votre situation, nous vous encourageons à faire vos propres recherches, à consulter d'autres experts et à participer à des discussions avec la communauté Privacy Guides. Si vous avez des questions d'ordre juridique, vous devez consulter votre propre conseiller juridique avant de poursuivre. -Privacy Guides est un projet open-source dont la contribution est soumise à des licences comprenant des conditions qui, pour la protection du site web et de ses contributeurs, précisent que le projet et le site Privacy Guides sont proposés "en l'état", sans garantie, et déclinent toute responsabilité pour les dommages résultant de l'utilisation du site web ou des recommandations qu'il contient. Privacy Guides ne garantit en aucun cas et ne fait aucune déclaration concernant l'exactitude, les résultats probables ou la fiabilité de l'utilisation des éléments sur le site web ou autrement liés sur le site web ou sur tout autre site tiers lié à ce site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides ne garantit en aucun cas et ne fait aucune déclaration concernant l'exactitude, les résultats probables ou la fiabilité de l'utilisation des éléments sur le site web ou autrement liés sur le site web ou sur tout autre site tiers lié à ce site. En outre, Privacy Guides ne garantit pas que ce site web sera constamment disponible, ou disponible tout court. diff --git a/i18n/fr/about/privacytools.md b/i18n/fr/about/privacytools.md index 3475ffd6..73d6c416 100644 --- a/i18n/fr/about/privacytools.md +++ b/i18n/fr/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu a également publié [un message sur Twitter](https://twitter.com/pr Depuis le 25 septembre 2022, nous voyons les plans de BurungHantu se dessiner sur privacytools.io, et c'est la raison pour laquelle nous avons décidé de créer cette page explicative aujourd'hui. Le site qu'il exploite semble être une version fortement optimisée pour le référencement du site qui recommande des outils en échange d'une compensation financière. Très récemment, IVPN et Mullvad, deux fournisseurs de VPN presque universellement [recommandés](../vpn.md) par la communauté de la protection de la vie privée et remarquables pour leur position contre les programmes d'affiliation ont été retirés de PrivacyTools. A leur place ? NordVPN, Surfshark, ExpressVPN, et hide.me; Des géantes sociétés de VPN avec des plateformes et des pratiques commerciales peu fiables, connues pour leur marketing agressif et leurs programmes d'affiliation. -==**PrivacyTools est devenu exactement le type de site contre lequel nous [avons mis en garde](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) sur le blog PrivacyTools en 2019.**== Nous avons essayé de garder notre distance avec PrivacyTools depuis la transition, mais leur harcèlement continu à l'égard de notre projet et maintenant leur abus absurde de la crédibilité que leur marque a gagné depuis plus de 6 ans de contributions open source est extrêmement troublant à nos yeux. Ceux d'entre nous qui luttent vraiment pour la protection de la vie privée ne se battent pas les uns contre les autres et ne reçoivent pas leurs conseils des plus offrant. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Ceux d'entre nous qui luttent vraiment pour la protection de la vie privée ne se battent pas les uns contre les autres et ne reçoivent pas leurs conseils des plus offrant. ## r/privacytoolsIO maintenant diff --git a/i18n/fr/android.md b/i18n/fr/android.md index 41ae0383..990ec740 100644 --- a/i18n/fr/android.md +++ b/i18n/fr/android.md @@ -180,7 +180,7 @@ Les téléphones Google Pixel sont les **seuls** appareils dont nous recommandon Les Eléments Sécurisés comme le Titan M2 sont plus limités que le Trusted Execution Environment du processeur utilisé par la plupart des autres téléphones, car ils ne sont utilisés que pour le stockage des secrets, l'attestation matérielle et la limitation du débit, et non pour exécuter des programmes "de confiance". Les téléphones dépourvus d'un Elément Sécurisé doivent utiliser le TEE pour *toutes* ces fonctions, ce qui élargit la surface d'attaque. -Les téléphones Google Pixel utilisent un OS TEE appelé Trusty qui est [open source](https://source.android.com/security/trusty#whyTrusty), contrairement à de nombreux autres téléphones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. L'installation de GrapheneOS sur un téléphone Pixel est facile avec leur [installateur web](https://grapheneos.org/install/web). Si vous ne vous sentez pas à l'aise pour le faire vous-même et que vous êtes prêt à dépenser un peu plus d'argent, consultez le site [NitroPhone](https://shop.nitrokey.com/shop) car ils sont préchargés avec GrapheneOS et viennent de la société réputée [Nitrokey](https://www.nitrokey.com/about). diff --git a/i18n/fr/basics/common-misconceptions.md b/i18n/fr/basics/common-misconceptions.md index c67adb86..5c2a39bb 100644 --- a/i18n/fr/basics/common-misconceptions.md +++ b/i18n/fr/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Les logiciels libres sont-ils intrinsèquement sûrs ? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md index af3d9a12..adbd20af 100644 --- a/i18n/fr/cloud.md +++ b/i18n/fr/cloud.md @@ -92,7 +92,7 @@ Ils ont également reçu le Digital Trust Label, une certification de la [Swiss Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet parfait dans cette catégorie. Nos recommandations peuvent ne pas inclure tout ou partie de cette fonctionnalité, mais celles qui l'inclus peuvent être mieux classées que les autres sur cette page. -- Les clients doivent être open-source. +- Clients should be open source. - Les clients doivent être audités dans leur intégralité par un tiers indépendant. - Doit offrir des clients natifs pour Linux, Android, Windows, macOS et iOS. - Ces clients doivent s'intégrer aux outils natifs du système d'exploitation pour les fournisseurs de stockage cloud, comme l'intégration de l'application Fichiers sur iOS, ou la fonctionnalité DocumentsProvider sur Android. diff --git a/i18n/fr/data-redaction.md b/i18n/fr/data-redaction.md index d9773f00..3d64afa2 100644 --- a/i18n/fr/data-redaction.md +++ b/i18n/fr/data-redaction.md @@ -55,19 +55,19 @@ Lorsque vous partagez des fichiers, veillez à supprimer les métadonnées assoc Les métadonnées qui sont effacées dépendent du type de fichier de l'image : -* **JPEG**: Les métadonnées ICC Profile, Exif, Photoshop Image Resources et XMP/ExtendedXMP seront effacées si elles existent. -* **PNG**: Les métadonnées ICC Profile, Exif et XMP seront effacées si elles existent. -* **WebP**: les métadonnées ICC Profile, Exif et XMP seront effacées si elles existent. +- **JPEG**: Les métadonnées ICC Profile, Exif, Photoshop Image Resources et XMP/ExtendedXMP seront effacées si elles existent. +- **PNG**: Les métadonnées ICC Profile, Exif et XMP seront effacées si elles existent. +- **WebP**: les métadonnées ICC Profile, Exif et XMP seront effacées si elles existent. Après avoir traité les images, ExifEraser vous fournit un rapport complet sur ce qui a été exactement supprimé de chaque image. L'application offre plusieurs façons d'effacer les métadonnées des images. À savoir : -* Vous pouvez partager une image depuis une autre application avec ExifEraser. -* Par l'intermédiaire de l'application elle-même, vous pouvez sélectionner une seule image, plusieurs images à la fois, ou même un répertoire entier. -* Elle comporte une option "Appareil photo", qui utilise l'application appareil photo de votre système d'exploitation pour prendre une photo, puis en supprime les métadonnées. -* Elle vous permet de faire glisser des photos d'une autre application dans ExifEraser lorsque les deux sont ouvertes en mode écran partagé. -* Enfin, elle vous permet de coller une image à partir de votre presse-papiers. +- Vous pouvez partager une image depuis une autre application avec ExifEraser. +- Par l'intermédiaire de l'application elle-même, vous pouvez sélectionner une seule image, plusieurs images à la fois, ou même un répertoire entier. +- Elle comporte une option "Appareil photo", qui utilise l'application appareil photo de votre système d'exploitation pour prendre une photo, puis en supprime les métadonnées. +- Elle vous permet de faire glisser des photos d'une autre application dans ExifEraser lorsque les deux sont ouvertes en mode écran partagé. +- Enfin, elle vous permet de coller une image à partir de votre presse-papiers. ### Metapho (iOS) @@ -143,5 +143,5 @@ L'application offre plusieurs façons d'effacer les métadonnées des images. À Nous travaillons à l'établissement de critères définis pour chaque section de notre site, et celles-ci peuvent être sujet à changement. Si vous avez des questions sur nos critères, veuillez [poser la question sur notre forum](https://discuss.privacyguides.net/latest) et ne supposez pas que nous n'avons pas pris en compte un élément dans nos recommandations s'il ne figure pas dans la liste. De nombreux facteurs sont pris en compte et discutés lorsque nous recommandons un projet, et la documentation de chacun d'entre eux est en cours. -- Les applications développées pour les systèmes d'exploitation open source doivent être open source. +- Apps developed for open-source operating systems must be open source. - Les applications doivent être gratuites et ne doivent pas comporter de publicités ou d'autres limitations. diff --git a/i18n/fr/desktop.md b/i18n/fr/desktop.md index 94d77e01..8bb9d9ff 100644 --- a/i18n/fr/desktop.md +++ b/i18n/fr/desktop.md @@ -184,7 +184,7 @@ Bien que nous [déconseillions](os/linux-overview.md#release-cycle) d'utiliser d Le choix d'une distribution Linux qui vous convient dépend d'une grande variété de préférences personnelles, et cette page n'est **pas** une liste exhaustive de toutes les distributions viables. Notre page de présentation de Linux contient des conseils sur [le choix d'une distribution](os/linux-overview.md#choosing-your-distribution). Les distributions sur *cette page* suivent généralement les lignes directrices que nous avons abordées dans cette page, et respectent toutes ces normes : -- Gratuit et open source. +- Free and open source. - Reçoivent régulièrement des mises à jour des logiciels et du noyau. - [Évitent X11](os/linux-overview.md#wayland). - L'exception notable est Qubes, mais la virtualisation permet d'éviter les problèmes d'isolation que rencontre généralement X11. Cette isolation ne s'applique qu'aux applications *fonctionnant dans différents qubes* (machines virtuelles), les applications fonctionnant dans le *même* qube ne sont pas protégées les unes des autres. diff --git a/i18n/fr/email-clients.md b/i18n/fr/email-clients.md index fc96a3e7..58f70487 100644 --- a/i18n/fr/email-clients.md +++ b/i18n/fr/email-clients.md @@ -226,7 +226,7 @@ Canary Mail est à source fermée. Nous le recommandons en raison du peu de choi ### Qualifications minimales -- Les applications développées pour les systèmes d'exploitation open source doivent être open source. +- Apps developed for open-source operating systems must be open source. - Ne doit pas collecter de télémétrie, ou disposer d'un moyen facile de désactiver toute télémétrie. - Doit prendre en charge le chiffrement des messages OpenPGP. @@ -234,7 +234,7 @@ Canary Mail est à source fermée. Nous le recommandons en raison du peu de choi Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet parfait dans cette catégorie. Nos recommandations peuvent ne pas inclure tout ou partie de cette fonctionnalité, mais celles qui l'inclus peuvent être mieux classées que les autres sur cette page. -- Doit être open-source. +- Should be open source. - Doit être multiplateforme. - Ne doit pas collecter de télémétrie par défaut. - Doit prendre en charge OpenPGP nativement, c'est-à-dire sans extensions. diff --git a/i18n/fr/encryption.md b/i18n/fr/encryption.md index 48c50f2a..680f0e73 100644 --- a/i18n/fr/encryption.md +++ b/i18n/fr/encryption.md @@ -345,7 +345,7 @@ Lorsque vous chiffrez avec PGP, vous avez la possibilité de configurer différe ### Qualifications minimales -- Les applications de chiffrement multiplateforme doivent être open-source. +- Cross-platform encryption apps must be open source. - Les applications de chiffrement de fichiers doivent prendre en charge le déchiffrement sur Linux, macOS et Windows. - Les applications de chiffrement de disques externes doivent prendre en charge le déchiffrement sur Linux, macOS et Windows. - Les applications de chiffrement de disques internes (OS) doivent être multiplateforme ou intégrées nativement au système d'exploitation. diff --git a/i18n/fr/frontends.md b/i18n/fr/frontends.md index 818c3826..f4d8455e 100644 --- a/i18n/fr/frontends.md +++ b/i18n/fr/frontends.md @@ -39,9 +39,9 @@ Lorsque vous utilisez une instance gérée par quelqu'un d'autre, veillez à lir !!! recommendation - ![Logo ProxiTok](assets/img/frontends/proxitok.svg){ align=right } + ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** est une interface client open source du site [TikTok](https://www.tiktok.com) qui est également auto-hébergeable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. Il existe un certain nombre d'instances publiques, dont certaines bénéficient de la prise en charge des services oignon [Tor](https://www.torproject.org). diff --git a/i18n/fr/multi-factor-authentication.md b/i18n/fr/multi-factor-authentication.md index 9060c920..60891173 100644 --- a/i18n/fr/multi-factor-authentication.md +++ b/i18n/fr/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp Le [tableau de comparaison](https://www.yubico.com/store/compare/) montre les fonctionnalités de chaque YubiKeys et leurs différences. Nous vous recommandons vivement de choisir des clés de la série YubiKey 5. -Les YubiKeys peuvent être programmées à l'aide du [Gestionnaire YubiKey](https://www.yubico.com/support/download/yubikey-manager/) ou de l'[Outil de Personnalisation YubiKey](https://www.yubico.com/support/download/yubikey-personalization-tools/). Pour gérer les codes TOTP, vous pouvez utiliser le [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Tous les clients de Yubico sont open source. +Les YubiKeys peuvent être programmées à l'aide du [Gestionnaire YubiKey](https://www.yubico.com/support/download/yubikey-manager/) ou de l'[Outil de Personnalisation YubiKey](https://www.yubico.com/support/download/yubikey-personalization-tools/). Pour gérer les codes TOTP, vous pouvez utiliser le [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. Pour les modèles qui supportent HOTP et TOTP, il y a 2 emplacements dans l'interface OTP qui peuvent être utilisés pour HOTP et 32 emplacements pour stocker les secrets TOTP. Ces secrets sont stockés et chiffrés sur la clé et ne sont jamais exposés aux appareils sur lesquels elle est branchée. Une fois qu'une graine (secret partagé) est donnée à l'authentificateur Yubico, celui-ci ne donnera que les codes à six chiffres, mais jamais la graine. Ce modèle de sécurité permet de limiter ce qu'un attaquant peut faire s'il compromet l'un des appareils exécutant le Yubico Authenticator et rend la YubiKey résistante à un attaquant physique. -!!! warning "Avertissement" - Le micrologiciel des YubiKeys n'est pas open source et ne peut pas être mis à jour. Si vous souhaitez obtenir des fonctionnalités dans des versions plus récentes du firmware, ou si la version du firmware que vous utilisez présente une vulnérabilité, vous devrez acheter une nouvelle clé. +!!! warning + The firmware of YubiKey is not open source and is not updatable. Si vous souhaitez obtenir des fonctionnalités dans des versions plus récentes du firmware, ou si la version du firmware que vous utilisez présente une vulnérabilité, vous devrez acheter une nouvelle clé. ### Nitrokey @@ -58,7 +58,7 @@ Pour les modèles qui supportent HOTP et TOTP, il y a 3 emplacements pour HOTP e La Nitrokey Pro 2, la Nitrokey Storage 2 et la Nitrokey 3 à venir prennent en charge la vérification de l'intégrité du système pour les ordinateurs portables dotés du micrologiciel [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) . -Le micrologiciel de la Nitrokey est open-source, contrairement à la YubiKey. Le micrologiciel des modèles NitroKey modernes (à l'exception de la **NitroKey Pro 2**) peut être mis à jour. +Nitrokey's firmware is open source, unlike the YubiKey. Le micrologiciel des modèles NitroKey modernes (à l'exception de la **NitroKey Pro 2**) peut être mis à jour. ### Critères diff --git a/i18n/fr/notebooks.md b/i18n/fr/notebooks.md index 5253355d..13380c08 100644 --- a/i18n/fr/notebooks.md +++ b/i18n/fr/notebooks.md @@ -132,7 +132,7 @@ Cryptee offre 100 Mo de stockage gratuit, avec des options payantes si vous avez Nous travaillons à l'établissement de critères définis pour chaque section de notre site, et celles-ci peuvent être sujet à changement. Si vous avez des questions sur nos critères, veuillez [poser la question sur notre forum](https://discuss.privacyguides.net/latest) et ne supposez pas que nous n'avons pas pris en compte un élément dans nos recommandations s'il ne figure pas dans la liste. De nombreux facteurs sont pris en compte et discutés lorsque nous recommandons un projet, et la documentation de chacun d'entre eux est en cours. -- Les clients doivent être open-source. +- Clients must be open source. - Toute fonctionnalité de synchronisation cloud doit être E2EE. - Doit permettre l'export de documents dans un format standard. diff --git a/i18n/fr/os/android-overview.md b/i18n/fr/os/android-overview.md index da7114c8..92755e1d 100644 --- a/i18n/fr/os/android-overview.md +++ b/i18n/fr/os/android-overview.md @@ -12,7 +12,7 @@ description: Android est un système d'exploitation open source doté de solides ### Choisir une distribution Android -Lorsque vous achetez un téléphone Android, le système d'exploitation par défaut de l'appareil s'accompagne souvent d'une intégration envahissante des applications et des services qui ne font pas partie de l'[Android Open-Source Project](https://source.android.com/). C'est le cas par exemple de l'application Services Google Play, qui dispose de privilèges irrévocables pour accéder à vos fichiers, au stockage de vos contacts, aux journaux d'appels, aux SMS, à votre localisation, à votre appareil photo, à votre microphone, aux identifiants matériels, etc. Ces applications et ces services augmentent la surface d'attaque de votre appareil et sont à l'origine de divers problèmes d'invasion de la vie privée sur Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). C'est le cas par exemple de l'application Services Google Play, qui dispose de privilèges irrévocables pour accéder à vos fichiers, au stockage de vos contacts, aux journaux d'appels, aux SMS, à votre localisation, à votre appareil photo, à votre microphone, aux identifiants matériels, etc. Ces applications et ces services augmentent la surface d'attaque de votre appareil et sont à l'origine de divers problèmes d'invasion de la vie privée sur Android. Ce problème pourrait être résolu en utilisant une distribution Android qui n'est pas fournie avec une intégration de ces applications invasives. Malheureusement, de nombreuses distributions d'Android enfreignent souvent le modèle de sécurité d'Android en ne prenant pas en charge les fonctions de sécurité essentielles telles que l'AVB, le rollback protection, les mises à jour du firmware, etc. Certaines distributions fournissent également des builds [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) qui permettent le root via [ADB](https://developer.android.com/studio/command-line/adb) et nécessitent [des politiques SELinux plus permissives](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) pour prendre en compte les fonctionnalités de débogage, ce qui augmente encore plus la surface d'attaque et affaiblit grandement le modèle de sécurité. diff --git a/i18n/fr/os/linux-overview.md b/i18n/fr/os/linux-overview.md index 286c3df8..2f9cb559 100644 --- a/i18n/fr/os/linux-overview.md +++ b/i18n/fr/os/linux-overview.md @@ -18,7 +18,7 @@ Linux pose quelques problèmes importants en matière de protection de la vie pr - Maintenir [la liberté des logiciels](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Utiliser des systèmes axés sur la protection de la vie privée tels que [Whonix](https://www.whonix.org) ou [Tails](https://tails.boum.org/) -### Sécurité de l'open source +### Open-Source Security C'est une [idée fausse très répandue](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) que Linux et d'autres logiciels open-source sont intrinsèquement sûrs simplement parce que le code source est disponible. On s'attend à ce que la communauté effectue des vérifications régulièrement, mais ce n'est pas toujours [le cas](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/fr/passwords.md b/i18n/fr/passwords.md index 33c266e8..a58a6b0a 100644 --- a/i18n/fr/passwords.md +++ b/i18n/fr/passwords.md @@ -161,7 +161,7 @@ Bitwarden propose également [Bitwarden Send](https://bitwarden.com/products/sen Vous devez disposer de [l'offre Premium](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) pour pouvoir partager des fichiers. L'offre gratuite ne permet que le partage de texte. -Le code côté serveur de Bitwarden est [open-source](https://github.com/bitwarden/server), donc si vous ne voulez pas utiliser le cloud Bitwarden, vous pouvez facilement héberger votre propre serveur de synchronisation Bitwarden. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** est une implémentation alternative du serveur de synchronisation de Bitwarden écrite en Rust et compatible avec les clients officiels de Bitwarden. Elle est parfaite pour les déploiements auto-hébergés où l'utilisation du service officiel, lourd en ressources, n'est pas idéale. Si vous cherchez à héberger Bitwarden sur votre propre serveur, vous voudrez certainement utiliser Vaultwarden plutôt que le code serveur officiel de Bitwarden. @@ -239,7 +239,7 @@ Psono fournit une documentation complète pour son produit. Le client web de Pso Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet parfait dans cette catégorie. Nos recommandations peuvent ne pas inclure tout ou partie de cette fonctionnalité, mais celles qui l'inclus peuvent être mieux classées que les autres sur cette page. - La télémétrie devrait être optionnelle (désactivée par défaut) ou ne pas être collectée du tout. -- Devrait être open-source et raisonnablement auto-hébergeable. +- Should be open source and reasonably self-hostable. ## Stockage local diff --git a/i18n/fr/productivity.md b/i18n/fr/productivity.md index 3de39bec..984b8eff 100644 --- a/i18n/fr/productivity.md +++ b/i18n/fr/productivity.md @@ -60,7 +60,7 @@ La plupart des suites bureautiques en ligne ne prennent pas en charge l'E2EE, ce En général, nous définissons les plateformes de collaboration comme des suites complètes qui pourraient raisonnablement remplacer des plateformes de collaboration comme Google Drive. -- Open-source. +- Open source. - Rend les fichiers accessibles via WebDAV, sauf si cela est impossible en raison de l'E2EE. - Possède des clients de synchronisation pour Linux, macOS et Windows. - Prend en charge l'édition de documents et de feuilles de calcul. @@ -162,11 +162,10 @@ En général, nous définissons les suites bureautiques comme des applications q #### Exigences minimales -- Doivent être open-source. +- Doit être open-source. - Doit implémenter le chiffrement de bout en bout "à confiance zéro". - Doit prendre en charge les fichiers protégés par un mot de passe. - #### Dans le meilleur des cas Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet parfait dans cette catégorie. Nos recommandations peuvent ne pas inclure tout ou partie de cette fonctionnalité, mais celles qui l'inclus peuvent être mieux classées que les autres sur cette page. diff --git a/i18n/fr/router.md b/i18n/fr/router.md index 086cf9a1..ef419348 100644 --- a/i18n/fr/router.md +++ b/i18n/fr/router.md @@ -27,9 +27,9 @@ Vous pouvez consulter le [tableau de matériel](https://openwrt.org/toh/start) d !!! recommendation - ![logo OPNsense](assets/img/router/opnsense.svg){ align=right } + ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** est une plateforme de routage et de pare-feu open source basée sur FreeBSD qui intègre de nombreuses fonctionnalités avancées telles que la mise en forme du trafic, l'équilibrage de charge et des capacités VPN, avec de nombreuses autres fonctionnalités disponibles sous forme de plugins. OPNsense est généralement déployé comme pare-feu de périmètre, routeur, point d'accès sans fil, serveur DHCP, serveur DNS et point de terminaison VPN. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense est généralement déployé comme pare-feu de périmètre, routeur, point d'accès sans fil, serveur DHCP, serveur DNS et point de terminaison VPN. [:octicons-home-16: Page d'accueil](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/fr/vpn.md b/i18n/fr/vpn.md index f1a7d385..3a3890c4 100644 --- a/i18n/fr/vpn.md +++ b/i18n/fr/vpn.md @@ -133,7 +133,7 @@ IVPN a fait l'objet d'un [audit de non-journalisation par Cure53](https://cure53 #### :material-check:{ .pg-green } Clients open source -Depuis février 2020, [les applications IVPN sont désormais open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Le code source peut être obtenu auprès de leur [organisation GitHub](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Le code source peut être obtenu auprès de leur [organisation GitHub](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepte l'argent liquide et le Monero @@ -248,7 +248,7 @@ Nous exigeons de tous nos fournisseurs VPN recommandés qu'ils fournissent des f - Prise en charge de protocoles forts tels que WireGuard & OpenVPN. - Arrêt d'urgence intégré dans les clients. - Prise en charge du multi-sauts. Le multi-sauts est important pour garder les données privées en cas de compromission d'un seul noeud. -- Si des clients VPN sont fournis, ils doivent être [open source](https://en.wikipedia.org/wiki/Open_source), comme le logiciel VPN qui y est généralement intégré. Nous pensons que la disponibilité du [code source](https://en.wikipedia.org/wiki/Source_code) offre une plus grande transparence sur ce que fait réellement votre appareil. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. Nous pensons que la disponibilité du [code source](https://en.wikipedia.org/wiki/Source_code) offre une plus grande transparence sur ce que fait réellement votre appareil. **Dans le meilleur des cas :** diff --git a/i18n/he/about/criteria.md b/i18n/he/about/criteria.md index 9d538441..a22034dd 100644 --- a/i18n/he/about/criteria.md +++ b/i18n/he/about/criteria.md @@ -17,7 +17,7 @@ title: קריטריונים כלליים אנו מיישמים את סדרי העדיפויות הבאים כאשר אנו שוקלים המלצות חדשות: - **מאובטח**: על הכלים לפעול לפי שיטות אבטחה מומלצות בכל מקום שניתן. -- **זמינות מקור**: פרויקטי קוד פתוח מועדפים בדרך כלל על פני חלופות קנייניות שוות. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **חוצה פלטפורמות**: בדרך כלל אנו מעדיפים שההמלצות יהיו חוצות פלטפורמות, כדי למנוע נעילת ספקים. - **פיתוח פעיל**: את הכלים שאנו ממליצים עליהם לפתח באופן פעיל, פרויקטים לא מתוחזקים יוסרו ברוב המקרים. - **שימושיות**: כלים צריכים להיות נגישים לרוב משתמשי המחשב, אין צורך ברקע טכני יתר על המידה. diff --git a/i18n/he/about/index.md b/i18n/he/about/index.md index 9430b85d..d983ff99 100644 --- a/i18n/he/about/index.md +++ b/i18n/he/about/index.md @@ -81,7 +81,7 @@ schema: - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -בנוסף, [אנשים רבים](https://github.com/privacyguides/privacyguides.org/graphs/contributors) תרמו לפרויקט. גם אתה יכול, אנחנו בקוד פתוח ב-GitHub ומקבלים הצעות תרגום ב-[Crowdin](https://crowdin.com/project/privacyguides). +בנוסף, [אנשים רבים](https://github.com/privacyguides/privacyguides.org/graphs/contributors) תרמו לפרויקט. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). חברי הצוות שלנו בודקים את כל השינויים שבוצעו באתר ומטפלים בתפקידים אדמיניסטרטיביים כגון אירוח אתרים ופיננסים, אולם הם אינם מרוויחים באופן אישי מכל תרומה כלשהי לאתר זה. הדוחות הכספיים שלנו מתארחים באופן שקוף על ידי Open Collective Foundation 501(c)( 3) בכתובת [opencollective.com/privacyguides](https://opencollective.com/privacyguides). תרומות ל-Privacy Guides ניתנות לניכוי מס בדרך כלל בארצות הברית. diff --git a/i18n/he/about/notices.md b/i18n/he/about/notices.md index 3261902f..bba25026 100644 --- a/i18n/he/about/notices.md +++ b/i18n/he/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides אינו משרד עורכי דין. ככזה, אתר Privacy Gui הפעלת אתר זה, כמו כל מאמץ אנושי, כרוכה בחוסר ודאות ובפשרות. אנו מקווים שהאתר הזה יעזור, אבל הוא עשוי לכלול טעויות ולא יכול לטפל בכל מצב. אם יש לך שאלות כלשהן לגבי מצבך, אנו ממליצים לך לעשות מחקר משלך, לחפש מומחים אחרים ולהשתתף בדיונים עם קהילת Privacy Guides. אם יש לך שאלות משפטיות, עליך להתייעץ עם היועץ המשפטי שלך לפני שתמשיך הלאה. -Privacy Guides הוא פרויקט קוד פתוח שנתרם לו תחת רישיונות הכוללים תנאים שלצורך הגנה על האתר והתורמים לו, מבהירים שהפרויקט ואתר מדריכי הפרטיות מוצעים "כפי שהם", ללא אחריות, ומתנערים מאחריות עבור נזקים הנובעים משימוש באתר או כל המלצות הכלולות בו. Privacy Guides אינם מתחייבים או מציגים מצגים כלשהם בנוגע לדיוק, התוצאות הסבירות או המהימנות של השימוש בחומרים באתר או הקשורים אחרת לחומרים כאלה באתר או באתרי צד שלישי כלשהם המקושרים באתר זה. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides אינם מתחייבים או מציגים מצגים כלשהם בנוגע לדיוק, התוצאות הסבירות או המהימנות של השימוש בחומרים באתר או הקשורים אחרת לחומרים כאלה באתר או באתרי צד שלישי כלשהם המקושרים באתר זה. Privacy Guides בנוסף אינם מתחייבים כי אתר זה יהיה זמין כל הזמן, או זמין בכלל. diff --git a/i18n/he/about/privacytools.md b/i18n/he/about/privacytools.md index a63dfb96..f211a78f 100644 --- a/i18n/he/about/privacytools.md +++ b/i18n/he/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu גם עשה פוסט טוויטר בטענה כי "עורך דין" נכון ל -25 בספטמבר 2022, אנו רואים שהתוכניות הכוללות של BurungHantu מתגשמות ב - privacytools.io, וזו בדיוק הסיבה שהחלטנו ליצור את הדף המסביר את זה היום. האתר שהוא מפעיל נראה כגרסה מותאמת SEO של האתר שממליצה על כלים בתמורה לפיצוי כספי. לאחרונה, IVPN ו - Mullvad, שני ספקי VPN כמעט - באופן אוניברסלי [המומלצים](../vpn.md) על ידי קהילת הפרטיות וראוי לציון על עמדתם נגד תוכניות שותפים הוסרו מ PrivacyTools. במקומם? NordVPN, ‏ Surfshark, ‏ Express_end} ו - hide.me; תאגידי VPN ענקיים עם פלטפורמות ונהלים עסקיים לא אמינים, הידועים לשמצה בזכות השיווק האגרסיבי שלהם ותוכניות השותפים שלהם. -==**PrivacyTools הפך בדיוק לסוג האתר [שהזהרנו מפניו](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) בבלוג PrivacyTools ב-2019 blog in 2019.**== ניסינו לשמור על מרחק מ-PrivacyTools מאז המעבר, אבל ההטרדה המתמשכת שלהם כלפי הפרויקט שלנו ועכשיו הניצול האבסורדי שלהם את האמינות שהמותג שלהם זכה לה במשך 6 שנים של תרומות קוד פתוח מטריד אותנו מאוד. אלה מאיתנו שנלחמים למען הפרטיות לא נלחמים אחד נגד השני, ולא מקבלים את עצתנו מהמציע הגבוה ביותר. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. אלה מאיתנו שנלחמים למען הפרטיות לא נלחמים אחד נגד השני, ולא מקבלים את עצתנו מהמציע הגבוה ביותר. ## r/privacytoolsIO עכשיו diff --git a/i18n/he/android.md b/i18n/he/android.md index b6482052..a28cd6c2 100644 --- a/i18n/he/android.md +++ b/i18n/he/android.md @@ -180,7 +180,7 @@ DivestOS משתמשת ב-F-Droid כחנות האפליקציות המוגדרת רכיבים מאובטחים כמו Titan M2 מוגבלים יותר מסביבת הביצוע המהימנה של המעבד המשמשת את רוב הטלפונים האחרים מכיוון שהם משמשים רק לאחסון סודות, הוכחת חומרה והגבלת קצב, לא להפעלת תוכניות "מהימנות". טלפונים ללא Secure Element חייבים להשתמש ב-TEE עבור *כל* הפונקציות הללו, וכתוצאה מכך משטח התקפה גדול יותר. -טלפונים של גוגל פיקסל משתמשים ב-TEE OS בשם Trusty שהיא [קוד פתוח](https://source.android.com/security/trusty#whyTrusty), בניגוד לטלפונים רבים אחרים. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. ההתקנה של GrapheneOS בטלפון Pixel קלה עם [מתקין האינטרנט שלהם](https://grapheneos.org/install/web). אם אתה לא מרגיש בנוח לעשות את זה בעצמך ומוכן להוציא קצת כסף נוסף, בדוק את ה-[NitroPhone](https://shop.nitrokey.com/shop) מכיוון שהם נטענים מראש עם GrapheneOS של חברת [Nitrokey](https://www.nitrokey.com/about) המכובדת. diff --git a/i18n/he/basics/common-misconceptions.md b/i18n/he/basics/common-misconceptions.md index c6ce6cf9..a118a6b4 100644 --- a/i18n/he/basics/common-misconceptions.md +++ b/i18n/he/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: האם תוכנת קוד פתוח מאובטחת מטבעה? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/he/cloud.md b/i18n/he/cloud.md index 618dcb7f..76c99998 100644 --- a/i18n/he/cloud.md +++ b/i18n/he/cloud.md @@ -92,7 +92,7 @@ Tresorit קיבלה מספר ביקורות אבטחה עצמאיות: הקריטריונים הטובים ביותר שלנו מייצגים את מה שהיינו רוצים לראות מהפרויקט המושלם בקטגוריה זו. ייתכן שההמלצות שלנו לא יכללו חלק מהפונקציונליות הזו או את כולה, אך אלו שכן כן עשויות לדרג גבוה יותר מאחרות בדף זה. -- הלקוחות צריכים להיות בקוד פתוח. +- Clients should be open source. - לקוחות צריכים להיות מבוקרים במלואם על ידי צד שלישי עצמאי. - צריך להציע ללקוחות מקומיים עבור לינוקס, אנדרואיד, Windows, macOS ו - iOS. - לקוחות אלה צריכים להשתלב עם כלי מערכת הפעלה מקוריים עבור ספקי אחסון בענן, כגון שילוב אפליקציות קבצים ב- iOS, או פונקציונליות DocumentsProvider באנדרואיד. diff --git a/i18n/he/data-redaction.md b/i18n/he/data-redaction.md index 3657bab6..d9b60767 100644 --- a/i18n/he/data-redaction.md +++ b/i18n/he/data-redaction.md @@ -54,19 +54,19 @@ cover: data-redaction.webp המטא נתונים שנמחקים תלויים בסוג הקובץ של התמונה: -* **JPEG**: פרופיל ICC, Exif, משאבי תמונה בפוטושופ ומטא-נתונים של XMP/ExtendedXMP יימחקו אם הם קיימים. -* **PNG**: פרופיל ICC, מטא נתונים של Exif ו - XMP יימחקו אם הם קיימים. -* **WebP**: פרופיל ICC, מטא נתונים של Exif ו - XMP יימחקו אם הם קיימים. +- **JPEG**: פרופיל ICC, Exif, משאבי תמונה בפוטושופ ומטא-נתונים של XMP/ExtendedXMP יימחקו אם הם קיימים. +- **PNG**: פרופיל ICC, מטא נתונים של Exif ו - XMP יימחקו אם הם קיימים. +- **WebP**: פרופיל ICC, מטא נתונים של Exif ו - XMP יימחקו אם הם קיימים. לאחר עיבוד התמונות, ExifEraser מספק לך דוח מלא על מה בדיוק הוסר מכל תמונה. האפליקציה מציעה מספר דרכים למחיקת מטא - נתונים מתמונות. כלומר: -* באפשרותך לשתף תמונה מיישום אחר עם ExifEraser. -* דרך האפליקציה עצמה, אתה יכול לבחור תמונה אחת, תמונות מרובות בבת אחת, או אפילו ספריה שלמה. -* הוא כולל אפשרות "מצלמה ", המשתמשת באפליקציית המצלמה של מערכת ההפעלה כדי לצלם תמונה, ולאחר מכן מסירה ממנה את המטא נתונים. -* זה מאפשר לך לגרור תמונות מיישום אחר לתוך ExifEraser כאשר שניהם פתוחים במצב מסך מפוצל. -* לבסוף, הוא מאפשר לך להדביק תמונה מהלוח שלך. +- באפשרותך לשתף תמונה מיישום אחר עם ExifEraser. +- דרך האפליקציה עצמה, אתה יכול לבחור תמונה אחת, תמונות מרובות בבת אחת, או אפילו ספריה שלמה. +- הוא כולל אפשרות "מצלמה ", המשתמשת באפליקציית המצלמה של מערכת ההפעלה כדי לצלם תמונה, ולאחר מכן מסירה ממנה את המטא נתונים. +- זה מאפשר לך לגרור תמונות מיישום אחר לתוך ExifEraser כאשר שניהם פתוחים במצב מסך מפוצל. +- לבסוף, הוא מאפשר לך להדביק תמונה מהלוח שלך. ### Metapho (iOS) @@ -142,5 +142,5 @@ cover: data-redaction.webp אנו עובדים על קביעת קריטריונים מוגדרים לכל קטע באתר שלנו, והדבר עשוי להשתנות. אם יש לך שאלות כלשהן לגבי הקריטריונים שלנו, אנא [שאל בפורום שלנו](https://discuss.privacyguides.net/latest) ואל תניח שלא שקלנו משהו כשהצענו את ההמלצות שלנו אם הוא לא רשום כאן. ישנם גורמים רבים שנחשבים ונדונים כאשר אנו ממליצים על פרויקט, ותיעוד כל אחד מהם הוא עבודה בתהליך. -- יישומים שפותחו עבור מערכות הפעלה בקוד פתוח חייבים להיות קוד פתוח. +- Apps developed for open-source operating systems must be open source. - יישומים חייבים להיות חינמיים ולא לכלול מודעות או מגבלות אחרות. diff --git a/i18n/he/desktop.md b/i18n/he/desktop.md index b7df2f5f..c678419f 100644 --- a/i18n/he/desktop.md +++ b/i18n/he/desktop.md @@ -185,7 +185,7 @@ Qubes OS מאבטחת את המחשב על ידי בידוד תת-מערכות ( בחירת הפצת לינוקס המתאימה לך תסתכם במגוון עצום של העדפות אישיות, ודף זה **לא** נועד להיות רשימה ממצה של כל הפצה בת קיימא. בדף הסקירה הכללית של לינוקס שלנו יש כמה עצות לגבי [בחירת הפצה](os/linux-overview.md#choosing-your-distribution) ביתר פירוט. ההפצות ב*דף זה* עוקבות בדרך כלל אחר ההנחיות שסיקרנו שם, וכולן עומדות בסטנדרטים הבאים: -- חינם וקוד פתוח. +- Free and open source. - מקבל עדכוני תוכנה וליבה קבועים. - [נמנע מ-X11](os/linux-overview.md#wayland). - החריג הבולט כאן הוא Qubes, אבל בעיות הבידוד שיש ל-X11 בדרך כלל נמנעות על ידי וירטואליזציה. בידוד זה חל רק על אפליקציות * פועל ב- qubes שונים * (מכונות וירטואליות), אפליקציות הפועלות ב- * אותם * qube הם לא מוגנים זה מזה. diff --git a/i18n/he/email-clients.md b/i18n/he/email-clients.md index 8612cf2a..da5e9dbd 100644 --- a/i18n/he/email-clients.md +++ b/i18n/he/email-clients.md @@ -226,7 +226,7 @@ Canary Mail הוא קוד סגור. אנו ממליצים על זה בגלל ה ### כישורים מינימליים -- יישומים שפותחו עבור מערכות הפעלה בקוד פתוח חייבים להיות קוד פתוח. +- Apps developed for open-source operating systems must be open source. - לא יכול לאסוף טלמטריה, או שיש דרך קלה להפוך את כל הטלמטריה ללא זמינה. - חייב לתמוך בהצפנת הודעות OpenPGP. @@ -234,7 +234,7 @@ Canary Mail הוא קוד סגור. אנו ממליצים על זה בגלל ה הקריטריונים הטובים ביותר שלנו מייצגים את מה שהיינו רוצים לראות מהפרויקט המושלם בקטגוריה זו. ייתכן שההמלצות שלנו לא יכללו חלק מהפונקציונליות הזו או את כולה, אך אלו שכן כן עשויות לדרג גבוה יותר מאחרות בדף זה. -- זה צריך להיות קוד פתוח. +- Should be open source. - צריך להיות חוצה פלטפורמות. - אינו אוסף טלמטריה כברירת מחדל. - צריך לתמוך ב - OpenPGP באופן מקורי, כלומר ללא הרחבות. diff --git a/i18n/he/encryption.md b/i18n/he/encryption.md index e0184c0e..2632cf40 100644 --- a/i18n/he/encryption.md +++ b/i18n/he/encryption.md @@ -346,7 +346,7 @@ BitLocker [ נתמך רק](https://support.microsoft.com/en-us/windows/turn-on-d ### כישורים מינימליים -- אפליקציות הצפנה חוצות פלטפורמות חייבות להיות בקוד פתוח. +- Cross-platform encryption apps must be open source. - אפליקציות להצפנת קבצים חייבות לתמוך בפענוח ב-Linux, macOS ו-Windows. - אפליקציות להצפנת דיסק חיצוני חייבות לתמוך בפענוח ב-Linux, macOS ו-Windows. - אפליקציות להצפנת דיסק פנימי (OS) חייבות להיות חוצות פלטפורמות או מובנות במערכת ההפעלה באופן מקורי. diff --git a/i18n/he/frontends.md b/i18n/he/frontends.md index c61f05b0..072f127f 100644 --- a/i18n/he/frontends.md +++ b/i18n/he/frontends.md @@ -39,9 +39,9 @@ cover: frontends.webp !!! recommendation - ![ProxiTok לוגו](assets/img/frontends/proxitok.svg){ align=right } + ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** הוא ממשק קוד פתוח לאתר [TikTok](https://www.tiktok.com) שגם הוא ניתן לאירוח עצמי. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. ישנם מספר מופעים ציבוריים, כאשר בחלק מהמקרים יש תמיכה בשירותי בצל [Tor](https://www.torproject.org). diff --git a/i18n/he/multi-factor-authentication.md b/i18n/he/multi-factor-authentication.md index a19bc014..a19f3847 100644 --- a/i18n/he/multi-factor-authentication.md +++ b/i18n/he/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp [טבלת ההשוואה](https://www.yubico.com/store/compare/) מציגה את התכונות ואת אופן ההשוואה של YubiKeys. אנו ממליצים בחום לבחור במפתחות מסדרת YubiKey 5. -ניתן לתכנת את [YubiKey מנהל](https://www.yubico.com/support/download/yubikey-manager/) או [YubiKey כלי התאמה אישית](https://www.yubico.com/support/download/yubikey-personalization-tools/). לניהול קודי TOTP, תוכל להשתמש ב - [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). כל הקליינטים של Yubico הם בקוד פתוח. +ניתן לתכנת את [YubiKey מנהל](https://www.yubico.com/support/download/yubikey-manager/) או [YubiKey כלי התאמה אישית](https://www.yubico.com/support/download/yubikey-personalization-tools/). לניהול קודי TOTP, תוכל להשתמש ב - [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. עבור דגמים התומכים ב - HOTP וב - TOTP, ישנם 2 חריצים בממשק ה - OTP שניתן להשתמש בהם עבור HOTP ו -32 חריצים לאחסון סודות TOTP. סודות אלה מאוחסנים מוצפנים על המפתח ואף פעם לא לחשוף אותם למכשירים הם מחוברים. ברגע שזרע (סוד משותף) ניתן למאמת Yubico, הוא ייתן רק את הקודים בני שש הספרות, אך לעולם לא את הזרע. מודל אבטחה זה עוזר להגביל את מה שתוקף יכול לעשות אם הוא מסכן את אחד המכשירים המריצים את המאמת של Yubico והופך את ה - YubiKey לעמיד בפני תוקף פיזי. -!!! warning "אזהרה" - הקושחה של YubiKey אינה קוד פתוח ואינה ניתנת לעדכון. אם אתה רוצה תכונות בגרסאות קושחה חדשות יותר, או אם ישנה פגיעות בגרסת הקושחה שבה אתה משתמש, תצטרך לרכוש מפתח חדש. +!!! warning + The firmware of YubiKey is not open source and is not updatable. אם אתה רוצה תכונות בגרסאות קושחה חדשות יותר, או אם ישנה פגיעות בגרסת הקושחה שבה אתה משתמש, תצטרך לרכוש מפתח חדש. ### Nitrokey @@ -58,7 +58,7 @@ cover: multi-factor-authentication.webp ה-Nitrokey Pro 2, Nitrokey Storage 2 וה-Nitrokey 3 הקרובים תומכים באימות שלמות המערכת עבור מחשבים ניידים עם קושחת [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/). -הקושחה של Nitrokey היא קוד פתוח, שלא כמו YubiKey. הקושחה בדגמי NitroKey המודרניים (למעט ה**NitroKey Pro 2**) ניתנת לעדכון. +Nitrokey's firmware is open source, unlike the YubiKey. הקושחה בדגמי NitroKey המודרניים (למעט ה**NitroKey Pro 2**) ניתנת לעדכון. ### קריטריונים diff --git a/i18n/he/notebooks.md b/i18n/he/notebooks.md index 4e723130..ee14b0b0 100644 --- a/i18n/he/notebooks.md +++ b/i18n/he/notebooks.md @@ -132,7 +132,7 @@ Cryptee מציע 100MB של אחסון בחינם, עם אפשרויות בתש אנו עובדים על קביעת קריטריונים מוגדרים לכל קטע באתר שלנו, והדבר עשוי להשתנות. אם יש לך שאלות כלשהן לגבי הקריטריונים שלנו, אנא [שאל בפורום שלנו](https://discuss.privacyguides.net/latest) ואל תניח שלא שקלנו משהו כשהצענו את ההמלצות שלנו אם הוא לא רשום כאן. ישנם גורמים רבים שנחשבים ונדונים כאשר אנו ממליצים על פרויקט, ותיעוד כל אחד מהם הוא עבודה בתהליך. -- הלקוחות צריכים להיות בקוד פתוח. +- Clients must be open source. - כל פונקציונליות של סנכרון ענן חייבת להיות E2EE. - חייב לתמוך בייצוא מסמכים לפורמט סטנדרטי. diff --git a/i18n/he/os/android-overview.md b/i18n/he/os/android-overview.md index 070b46de..00cee0a7 100644 --- a/i18n/he/os/android-overview.md +++ b/i18n/he/os/android-overview.md @@ -12,7 +12,7 @@ description: אנדרואיד היא מערכת הפעלה בקוד פתוח ע ### בחירת הפצת אנדרואיד -כאשר אתה קונה טלפון אנדרואיד, מערכת ההפעלה המוגדרת כברירת מחדל של המכשיר מגיעה לרוב עם אינטגרציה פולשנית עם אפליקציות ושירותים שאינם חלק מ[פרויקט הקוד הפתוח של אנדרואיד](https://source.android.com/). דוגמה כזו היא שירותי Google Play, שיש לו הרשאות בלתי חוזרות לגשת לקבצים שלך, אחסון אנשי הקשר, יומני שיחות, הודעות SMS, מיקום, מצלמה, מיקרופון, מזהי חומרה וכו'. אפליקציות ושירותים אלו מגדילים את משטח ההתקפה של המכשיר שלך ומהווים מקור לחששות פרטיות שונים עם אנדרואיד. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). דוגמה כזו היא שירותי Google Play, שיש לו הרשאות בלתי חוזרות לגשת לקבצים שלך, אחסון אנשי הקשר, יומני שיחות, הודעות SMS, מיקום, מצלמה, מיקרופון, מזהי חומרה וכו'. אפליקציות ושירותים אלו מגדילים את משטח ההתקפה של המכשיר שלך ומהווים מקור לחששות פרטיות שונים עם אנדרואיד. ניתן לפתור בעיה זו באמצעות הפצת אנדרואיד מותאמת אישית שאינה מגיעה עם אינטגרציה פולשנית כזו. לרוע המזל, הפצות רבות של אנדרואיד מותאמות אישית מפרות לעתים קרובות את מודל האבטחה של אנדרואיד בכך שאינן תומכות בתכונות אבטחה קריטיות כגון AVB, הגנה לאחור, עדכוני קושחה וכן הלאה. חלק מההפצות מספקות גם רכיבי [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) אשר חושפים שורש באמצעות [ADB](https://developer.android.com/studio/command-line/adb) ודורשים [מדיניות](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux מתירנית יותר כדי להתאים לתכונות ניפוי באגים, וכתוצאה מכך משטח התקפה מוגדל נוסף ומודל אבטחה מוחלש. diff --git a/i18n/he/os/linux-overview.md b/i18n/he/os/linux-overview.md index d72fdf63..2ddab60d 100644 --- a/i18n/he/os/linux-overview.md +++ b/i18n/he/os/linux-overview.md @@ -18,7 +18,7 @@ description: לינוקס היא חלופה למערכת הפעלה שולחני - לשמור על [חופש תוכנה](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - השתמש במערכות ממוקדות פרטיות כגון [Whonix](https://www.whonix.org) או [Tails](https://tails.boum.org/) -### אבטחת קוד פתוח +### Open-Source Security זוהי [תפיסה שגויה נפוצה](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) שלינוקס ותוכנות קוד פתוח אחרות מאובטחות מטבען פשוט בגלל שקוד המקור זמין. יש ציפייה שאימות קהילה מתרחש באופן קבוע, אבל זה לא תמיד [המקרה](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/he/passwords.md b/i18n/he/passwords.md index 7898c5ce..6b575546 100644 --- a/i18n/he/passwords.md +++ b/i18n/he/passwords.md @@ -161,7 +161,7 @@ Bitwarden כולל גם [Bitwarden Send](https://bitwarden.com/products/send/), אתה צריך [תוכנית פרימיום](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) כדי להיות מסוגל לשתף קבצים. התוכנית החינמית מאפשרת שיתוף טקסט בלבד. -הקוד בצד השרת של Bitwarden הוא [קוד-פתוח](https://github.com/bitwarden/server), כך שאם אינכם רוצים להשתמש בענן Bitwarden, תוכלו לארח בקלות שרת סינכרון Bitwarden משלכם. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** הוא יישום חלופי של שרת הסנכרון של Bitwarden שנכתב ב-Rust ותואם ללקוחות רשמיים של Bitwarden, מושלם לפריסה באירוח עצמי שבו הפעלת השירות הרשמי עתיר המשאבים עשויה להיות לא אידיאלית. אם אתם מחפשים לארח את Bitwarden באופן עצמאי בשרת שלכם, קרוב לוודאי שתרצו להשתמש ב-Vaultwarden על פני קוד השרת הרשמי של Bitwarden. @@ -239,7 +239,7 @@ Psono מספקת תיעוד נרחב עבור המוצר שלהם. לקוח הא הקריטריונים הטובים ביותר שלנו מייצגים את מה שהיינו רוצים לראות מהפרויקט המושלם בקטגוריה זו. ייתכן שההמלצות שלנו לא יכללו חלק מהפונקציונליות הזו או את כולה, אך אלו שכן כן עשויות לדרג גבוה יותר מאחרות בדף זה. - יש להצטרף לטלמטריה (מושבת כברירת מחדל) או לא לאסוף כלל. -- צריך להיות קוד פתוח וניתן לאירוח עצמי סביר. +- Should be open source and reasonably self-hostable. ## אחסון מקומי diff --git a/i18n/he/productivity.md b/i18n/he/productivity.md index e11a00d8..92b53370 100644 --- a/i18n/he/productivity.md +++ b/i18n/he/productivity.md @@ -60,7 +60,7 @@ cover: productivity.webp באופן כללי, אנו מגדירים פלטפורמות שיתוף פעולה כחבילות מן המניין שיכולות לשמש באופן סביר כתחליף לפלטפורמות שיתוף פעולה כמו Google Drive. -- קוד פתוח. +- Open source. - הופך קבצים לנגישים דרך WebDAV אלא אם זה בלתי אפשרי בגלל E2EE. - יש לו לקוחות סנכרון עבור לינוקס, macOS ו-Windows. - תומך בעריכת מסמכים וגיליון אלקטרוני. @@ -162,11 +162,10 @@ cover: productivity.webp #### דרישות מינימליות -- זה חייב להיות קוד פתוח. +- חייב להיות קוד פתוח. - חייב ליישם הצפנה "אפס אמון" מקצה לקצה. - חייב לתמוך בקבצים המוגנים בסיסמה. - #### המקרה הטוב ביותר הקריטריונים הטובים ביותר שלנו מייצגים את מה שהיינו רוצים לראות מהפרויקט המושלם בקטגוריה זו. ייתכן שההמלצות שלנו לא יכללו חלק מהפונקציונליות הזו או את כולה, אך אלו שכן כן עשויות לדרג גבוה יותר מאחרות בדף זה. diff --git a/i18n/he/router.md b/i18n/he/router.md index d11ef552..70abec90 100644 --- a/i18n/he/router.md +++ b/i18n/he/router.md @@ -27,9 +27,9 @@ cover: router.webp !!! recommendation - ![OPNsense לוגו](assets/img/router/opnsense.svg){ align=right } + ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** היא חומת אש ופלטפורמת ניתוב מבוססת קוד פתוח, מבוססת FreeBSD, המשלבת תכונות מתקדמות רבות כגון עיצוב תעבורה, איזון עומסים ויכולות VPN, עם תכונות רבות נוספות הזמינות בצורה של תוספים. OPNsense נפוץ כחומת אש היקפית, נתב, נקודת גישה אלחוטית, שרת DHCP, שרת DNS ונקודת קצה VPN. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense נפוץ כחומת אש היקפית, נתב, נקודת גישה אלחוטית, שרת DHCP, שרת DNS ונקודת קצה VPN. [:octicons-home-16: דף הבית](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=תיעוד} diff --git a/i18n/he/vpn.md b/i18n/he/vpn.md index 9555a842..1d019751 100644 --- a/i18n/he/vpn.md +++ b/i18n/he/vpn.md @@ -133,7 +133,7 @@ IVPN [עבר ביקורת ללא רישום מ-](https://cure53.de/audit-report_ #### :material-check:{ .pg-green } לקוחות קוד פתוח -החל מפברואר 2020 [יישומי IVPN הם כעת בקוד פתוח](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). קוד המקור ניתן לקבל מ[ארגון GitHub שלהם](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). קוד המקור ניתן לקבל מ[ארגון GitHub שלהם](https://github.com/ivpn). #### :material-check:{ .pg-green } מקבל מזומן ומונרו @@ -248,7 +248,7 @@ Mullvad מאוד שקוף לגבי אילו צמתים הם [בעלים או ש - תמיכה בפרוטוקולים חזקים כגון WireGuard & OpenVPN. - Killswitch מובנה בקליינטים. - תמיכה Multihop. Multihopping חשוב לשמור על נתונים פרטיים במקרה של פשרה צומת אחת. -- אם לקוחות VPN מסופקים, הם צריכים להיות [קוד פתוח](https://en.wikipedia.org/wiki/Open_source), כמו תוכנת ה - VPN שהם בדרך כלל בנו לתוכם. אנחנו מאמינים שזמינות של [קוד מקור](https://en.wikipedia.org/wiki/Source_code) מספקת שקיפות רבה יותר לגבי מה שהמכשיר שלך עושה בפועל. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. אנחנו מאמינים שזמינות של [קוד מקור](https://en.wikipedia.org/wiki/Source_code) מספקת שקיפות רבה יותר לגבי מה שהמכשיר שלך עושה בפועל. **המקרה הטוב ביותר:** diff --git a/i18n/hi/about/criteria.md b/i18n/hi/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/hi/about/criteria.md +++ b/i18n/hi/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/hi/about/index.md b/i18n/hi/about/index.md index 02032969..92aea46b 100644 --- a/i18n/hi/about/index.md +++ b/i18n/hi/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/hi/about/notices.md b/i18n/hi/about/notices.md index 9ccae1ae..d948a76a 100644 --- a/i18n/hi/about/notices.md +++ b/i18n/hi/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is not a law firm. As such, the Privacy Guides website and contri Running this website, like any human endeavor, involves uncertainty and trade-offs. We hope this website helps, but it may include mistakes and can’t address every situation. If you have any questions about your situation, we encourage you to do your own research, seek out other experts, and engage in discussions with the Privacy Guides community. If you have any legal questions, you should consult with your own legal counsel before moving forward. -Privacy Guides is an open source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Privacy Guides additionally does not warrant that this website will be constantly available, or available at all. diff --git a/i18n/hi/about/privacytools.md b/i18n/hi/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/hi/about/privacytools.md +++ b/i18n/hi/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/hi/android.md b/i18n/hi/android.md index 400d1a6c..1d498f09 100644 --- a/i18n/hi/android.md +++ b/i18n/hi/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/hi/basics/common-misconceptions.md b/i18n/hi/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/hi/basics/common-misconceptions.md +++ b/i18n/hi/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/hi/cloud.md b/i18n/hi/cloud.md index 080217e7..fcfec1c5 100644 --- a/i18n/hi/cloud.md +++ b/i18n/hi/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/hi/data-redaction.md b/i18n/hi/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/hi/data-redaction.md +++ b/i18n/hi/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/hi/desktop.md b/i18n/hi/desktop.md index 79c52e75..c2b5515a 100644 --- a/i18n/hi/desktop.md +++ b/i18n/hi/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/hi/email-clients.md b/i18n/hi/email-clients.md index c02dae71..955c824d 100644 --- a/i18n/hi/email-clients.md +++ b/i18n/hi/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/hi/encryption.md b/i18n/hi/encryption.md index 61fc1aa1..dcbacc03 100644 --- a/i18n/hi/encryption.md +++ b/i18n/hi/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/hi/frontends.md b/i18n/hi/frontends.md index 20c7c858..8e12809e 100644 --- a/i18n/hi/frontends.md +++ b/i18n/hi/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/hi/multi-factor-authentication.md b/i18n/hi/multi-factor-authentication.md index c10a310f..90cb34ce 100644 --- a/i18n/hi/multi-factor-authentication.md +++ b/i18n/hi/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/hi/notebooks.md b/i18n/hi/notebooks.md index fa318b5c..37448109 100644 --- a/i18n/hi/notebooks.md +++ b/i18n/hi/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/hi/os/android-overview.md b/i18n/hi/os/android-overview.md index bffa9e33..7a79c8c5 100644 --- a/i18n/hi/os/android-overview.md +++ b/i18n/hi/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/hi/os/linux-overview.md b/i18n/hi/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/hi/os/linux-overview.md +++ b/i18n/hi/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/hi/passwords.md b/i18n/hi/passwords.md index 3cc11265..db7c95d2 100644 --- a/i18n/hi/passwords.md +++ b/i18n/hi/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/hi/productivity.md b/i18n/hi/productivity.md index de2ce413..1d7c96de 100644 --- a/i18n/hi/productivity.md +++ b/i18n/hi/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/hi/router.md b/i18n/hi/router.md index bfa8d0a3..8b814e6e 100644 --- a/i18n/hi/router.md +++ b/i18n/hi/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/hi/vpn.md b/i18n/hi/vpn.md index 6538a869..8a3fccf3 100644 --- a/i18n/hi/vpn.md +++ b/i18n/hi/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/hu/about/criteria.md b/i18n/hu/about/criteria.md index b9a14529..238ed72b 100644 --- a/i18n/hu/about/criteria.md +++ b/i18n/hu/about/criteria.md @@ -17,7 +17,7 @@ Nem keresünk pénzt bizonyos termékek ajánlásával, nem használunk affiliat We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/hu/about/index.md b/i18n/hu/about/index.md index b500c6ec..376276d4 100644 --- a/i18n/hu/about/index.md +++ b/i18n/hu/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/hu/about/notices.md b/i18n/hu/about/notices.md index 3cb34084..9190518f 100644 --- a/i18n/hu/about/notices.md +++ b/i18n/hu/about/notices.md @@ -8,7 +8,7 @@ A Privacy Guides nem jogi iroda. Mint ilyen, a Privacy Guides weboldal és közr A weboldal működtetése, mint minden emberi vállalkozás, bizonytalansággal és kompromisszumokkal jár. Reméljük, hogy ez a weboldal segít, de hibákat tartalmazhat, és nem tud minden helyzetet figyelembe venni. Ha bármilyen kérdésed van a szituációddal kapcsolatban, bátorítunk, hogy végezz saját kutatásokat, keress fel más szakértőket, és vegyél részt a Privacy Guides közösségével folytatott beszélgetésekben. Ha bármilyen jogi kérdésed van, konzultálj saját jogi tanácsadóddal, mielőtt továbblépnél. -A Privacy Guides egy nyílt forráskódú projekt, amelyhez olyan licencek alapján lehet hozzá járulni, amelyek a weboldal és a közreműködők védelme érdekében egyértelművé teszik, hogy a Privacy Guides projekt és a weboldal garancia nélkül és úgy van kínálva "ahogy van", és kizárják a felelősséget a weboldal vagy a benne található ajánlások használatából eredő károkért. A Privacy Guides nem garantálja és nem vállal semmilyen felelősséget a weboldalon található anyagok pontosságát, valószínűsíthető eredményét vagy megbízhatóságát illetően, vagy egyéb módon a weboldalon található ilyen anyagokkal kapcsolatban, illetve az ezen a weboldalon hivatkozott bármely harmadik fél weboldalán. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. A Privacy Guides nem garantálja és nem vállal semmilyen felelősséget a weboldalon található anyagok pontosságát, valószínűsíthető eredményét vagy megbízhatóságát illetően, vagy egyéb módon a weboldalon található ilyen anyagokkal kapcsolatban, illetve az ezen a weboldalon hivatkozott bármely harmadik fél weboldalán. A Privacy Guides továbbá nem garantálja, hogy ez a weboldal folyamatosan vagy egyáltalán elérhető lesz. diff --git a/i18n/hu/about/privacytools.md b/i18n/hu/about/privacytools.md index f54fe722..66a52327 100644 --- a/i18n/hu/about/privacytools.md +++ b/i18n/hu/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/hu/android.md b/i18n/hu/android.md index 05f4b18e..b2d3d338 100644 --- a/i18n/hu/android.md +++ b/i18n/hu/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/hu/basics/common-misconceptions.md b/i18n/hu/basics/common-misconceptions.md index bae4435b..69c23213 100644 --- a/i18n/hu/basics/common-misconceptions.md +++ b/i18n/hu/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/hu/cloud.md b/i18n/hu/cloud.md index 1bcf5992..1f5fbeb5 100644 --- a/i18n/hu/cloud.md +++ b/i18n/hu/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretnénk látni egy tökéletes projekttől ebben a kategóriában. Előfordulhat, hogy ajánlásaink nem tartalmazzák az összes ilyen funkciót, de azok, amelyek igen, magasabb helyen szerepelhetnek, mint mások ezen az oldalon. -- A klienseknek nyílt forráskódúaknak kell lenniük. +- Clients should be open source. - A klienseket teljes egészükben független harmadik félnek kell felülvizsgálnia. - Natív klienseket kell kínálnia Linux, Android, Windows, macOS és iOS rendszerekre. - Ezeknek a klienseknek integrálódniuk kell natív operációs rendszer eszközökkel, amik felhőtárhely szolgáltatóknak lettek létrehozva, például a Files alkalmazás integrációjával iOS-en, vagy a DocumentsProvider funkcióval Androidon. diff --git a/i18n/hu/data-redaction.md b/i18n/hu/data-redaction.md index 3afee72f..1b6a5a37 100644 --- a/i18n/hu/data-redaction.md +++ b/i18n/hu/data-redaction.md @@ -55,19 +55,19 @@ Fájlok megosztásakor ügyelj a kapcsolódó metaadatok eltávolítsára. A ké A törlésre kerülő metaadat a kép fájltípusától függ: -* **JPEG**: ICC Profil, Exif, Photoshop Image Resources és XMP/ExtendedXMP metaadatok fognak törlődni, ha vannak. -* **PNG**: ICC Profil, Exif és XMP metaadatok fognak törlődni, ha vannak. -* **WebP**: ICC Profil, Exif és XMP metaadatok fognak törlődni, ha vannak. +- **JPEG**: ICC Profil, Exif, Photoshop Image Resources és XMP/ExtendedXMP metaadatok fognak törlődni, ha vannak. +- **PNG**: ICC Profil, Exif és XMP metaadatok fognak törlődni, ha vannak. +- **WebP**: ICC Profil, Exif és XMP metaadatok fognak törlődni, ha vannak. A képek feldolgozása után ExifEraser teljes jelentést ad arról, hogy pontosan mit távolított el egyes képekről. Az alkalmazás többféle módszert nyújt metaadatokat törléséhez a képekről. Név szerint: -* Az megoszthat egy képet egy másik alkalmazásból az ExifEraser-nek. -* Magán az alkalmazáson keresztül egyetlen képet, egyszerre több képet vagy akár egy egész könyvtárat is kiválaszthatsz. -* Rendelkezik egy "Kamera" opcióval, amely az operációs rendszer kameraalkalmazását használja egy fénykép készítéséhez, majd eltávolítja arról a metaadatokat. -* Lehetővé teszi, hogy fényképeket húzz át egy másik alkalmazásból az ExifEraser-be, ha mindkét app osztott képernyős módban van megnyitva. -* Végül, lehetővé teszi egy kép beillesztését a vágólapról. +- Az megoszthat egy képet egy másik alkalmazásból az ExifEraser-nek. +- Magán az alkalmazáson keresztül egyetlen képet, egyszerre több képet vagy akár egy egész könyvtárat is kiválaszthatsz. +- Rendelkezik egy "Kamera" opcióval, amely az operációs rendszer kameraalkalmazását használja egy fénykép készítéséhez, majd eltávolítja arról a metaadatokat. +- Lehetővé teszi, hogy fényképeket húzz át egy másik alkalmazásból az ExifEraser-be, ha mindkét app osztott képernyős módban van megnyitva. +- Végül, lehetővé teszi egy kép beillesztését a vágólapról. ### Metapho (iOS) @@ -143,5 +143,5 @@ Az alkalmazás többféle módszert nyújt metaadatokat törléséhez a képekr Azon dolgozunk, hogy meghatározott követelményeket állapítsunk meg az oldalunk minden egyes szakaszára vonatkozóan, és ez még változhat. Ha bármilyen kérdésed van a követelményinkkel kapcsolatban, kérjük, [kérdezz a fórumon](https://discuss.privacyguides.net/latest), és ne feltételezd, hogy valamit nem vettünk figyelembe az ajánlásaink elkészítésekor, ha az nem szerepel itt. Számos tényezőt veszünk figyelembe és vitatunk meg, amikor egy projektet ajánlunk, és minden egyes tényező dokumentálása folyamatban lévő munka. -- Nyílt forráskódú operációs rendszerekre fejlesztett alkalmazásoknak nyílt forráskódúnak kell lenniük. +- Apps developed for open-source operating systems must be open source. - Az alkalmazásoknak ingyenesnek kell lenniük, és nem tartalmazhatnak reklámokat vagy egyéb korlátozásokat. diff --git a/i18n/hu/desktop.md b/i18n/hu/desktop.md index bf509dc3..921444c5 100644 --- a/i18n/hu/desktop.md +++ b/i18n/hu/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/hu/email-clients.md b/i18n/hu/email-clients.md index 81ad0e46..6b6ec741 100644 --- a/i18n/hu/email-clients.md +++ b/i18n/hu/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Alap minősítések -- Nyílt forráskódú operációs rendszerekre fejlesztett alkalmazásoknak nyílt forráskódúnak kell lenniük. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretnénk látni egy kifogástalan projekttől ebben a kategóriában. Előfordulhat, hogy ajánlásaink nem tartalmazzák az összes ilyen funkciót, de azok, amelyek igen, magasabb helyen szerepelhetnek, mint mások ezen az oldalon. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/hu/encryption.md b/i18n/hu/encryption.md index 3990dd5b..1cb77638 100644 --- a/i18n/hu/encryption.md +++ b/i18n/hu/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Alap minősítések -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/hu/frontends.md b/i18n/hu/frontends.md index c78e7fda..c5208239 100644 --- a/i18n/hu/frontends.md +++ b/i18n/hu/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/hu/multi-factor-authentication.md b/i18n/hu/multi-factor-authentication.md index 5c9713a9..bcfa3eec 100644 --- a/i18n/hu/multi-factor-authentication.md +++ b/i18n/hu/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Követelmények diff --git a/i18n/hu/notebooks.md b/i18n/hu/notebooks.md index 0eee8bf2..c168bca7 100644 --- a/i18n/hu/notebooks.md +++ b/i18n/hu/notebooks.md @@ -132,7 +132,7 @@ A Cryptee 100MB tárhelyet kínál ingyenesen, fizetős lehetőséggel, ha több Azon dolgozunk, hogy meghatározott követelményeket állapítsunk meg az oldalunk minden egyes szakaszára vonatkozóan, és ez még változhat. Ha bármilyen kérdésed van a követelményinkkel kapcsolatban, kérjük, [kérdezz a fórumon](https://discuss.privacyguides.net/latest), és ne feltételezd, hogy valamit nem vettünk figyelembe az ajánlásaink elkészítésekor, ha az nem szerepel itt. Számos tényezőt veszünk figyelembe és vitatunk meg, amikor egy projektet ajánlunk, és minden egyes tényező dokumentálása folyamatban lévő munka. -- A klienseknek nyílt forráskódúaknak kell lenniük. +- Clients must be open source. - Minden felhőszinkronizálás funkciónak End-to-End titkosítottnak kell lennie. - Támogatnia kell dokumentumok szabványos formátumba történő exportálását. diff --git a/i18n/hu/os/android-overview.md b/i18n/hu/os/android-overview.md index c2b6b451..4b66e1e6 100644 --- a/i18n/hu/os/android-overview.md +++ b/i18n/hu/os/android-overview.md @@ -12,7 +12,7 @@ Az **Android Nyílt Forráskódú Projekt** egy biztonságos mobil operációs r ### Egy Android disztribúció kiválasztása -Egy Android telefon vásárlásakor a készülék alapértelmezett operációs rendszere gyakran olyan alkalmazások és szolgáltatások invazív integrációját tartalmazza, amelyek nem részei az [Android Open-Source Project](https://source.android.com/)-nek. Ilyen például a Google Play Szolgáltatások, amely visszavonhatatlan jogosultságokkal rendelkezik a fájljaidhoz, névjegy tárolódhoz, hívásnaplóidhoz, SMS-üzeneteidhez, tartózkodási helyedhez, kamerádhoz, mikrofonodhoz, hardverazonosítóidhoz, stb. való hozzáférésre. Ezek az alkalmazások és szolgáltatások növelik a készüléked támadási felületét, és számos adatvédelmi aggály forrását jelentik az Androiddal kapcsolatban. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). Ilyen például a Google Play Szolgáltatások, amely visszavonhatatlan jogosultságokkal rendelkezik a fájljaidhoz, névjegy tárolódhoz, hívásnaplóidhoz, SMS-üzeneteidhez, tartózkodási helyedhez, kamerádhoz, mikrofonodhoz, hardverazonosítóidhoz, stb. való hozzáférésre. Ezek az alkalmazások és szolgáltatások növelik a készüléked támadási felületét, és számos adatvédelmi aggály forrását jelentik az Androiddal kapcsolatban. Ez a probléma megoldható lehet egy olyan egyedi Android-disztribúció használatával, amely nem tartalmaz ilyen invazív integrációkat. Sajnos sok egyedi Android disztribúció gyakran megsérti az Android biztonsági modellt azzal, hogy nem támogat olyan kritikus biztonsági funkciókat, mint az AVB, a rollback védelem, firmware-frissítések, stb. Egyes disztribúciók [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) buildeket nyújtanak, amelyek védtelenné teszik a root-ot az [ADB](https://developer.android.com/studio/command-line/adb)-n keresztül és [több engedélyt biztosító](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policy-kat igényelnek a hibakeresési funkciókhoz, ami tovább növeli a támadási felületet és gyengébb biztonsági modellt eredményez. diff --git a/i18n/hu/os/linux-overview.md b/i18n/hu/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/hu/os/linux-overview.md +++ b/i18n/hu/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/hu/passwords.md b/i18n/hu/passwords.md index 32e1dd1c..2f5f40fc 100644 --- a/i18n/hu/passwords.md +++ b/i18n/hu/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretnénk látni egy kifogástalan projekttől ebben a kategóriában. Előfordulhat, hogy ajánlásaink nem tartalmazzák az összes ilyen funkciót, de azok, amelyek igen, magasabb helyen szerepelhetnek, mint mások ezen az oldalon. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/hu/productivity.md b/i18n/hu/productivity.md index 568d77da..6edde99a 100644 --- a/i18n/hu/productivity.md +++ b/i18n/hu/productivity.md @@ -60,7 +60,7 @@ A legtöbb online irodai programcsomag nem támogatja az End-to-End titkosítás Általános esetben az kollaborációs platformokat olyan teljes értékű csomagokként határozzuk meg, amelyek ésszerűen helyettesíthetik az olyan kollaborációs platformokat, mint a Google Drive. -- Nyílt forráskódú. +- Open source. - WebDAV-on keresztül elérhetővé tesz fájlokat, kivéve, ha az End-to-End titkosítás miatt nem lehetséges. - Szinkronizáló kliensekkel rendelkezik Linux, macOS és Windows rendszerekre. - Támogat dokumentum- és táblázatkezelést. @@ -162,11 +162,10 @@ A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretn #### Alap elvárások -- Must be open-source. +- Nyílt forráskódúnak kell lennie. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Legjobb esetben A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretnénk látni egy kifogástalan projekttől ebben a kategóriában. Előfordulhat, hogy ajánlásaink nem tartalmazzák az összes ilyen funkciót, de azok, amelyek igen, magasabb helyen szerepelhetnek, mint mások ezen az oldalon. diff --git a/i18n/hu/router.md b/i18n/hu/router.md index 4c1bf9ed..be98f2aa 100644 --- a/i18n/hu/router.md +++ b/i18n/hu/router.md @@ -29,7 +29,7 @@ Az OpenWrt [hardvertáblázatában](https://openwrt.org/toh/start) ellenőrizhet ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - Az **OPNsense** egy nyílt forráskódú, FreeBSD-alapú tűzfal és forgalom irányító platform, amely számos fejlett funkciót tartalmaz, mint például forgalom alakítás, terheléselosztás és VPN-lehetőségek, és számos további funkcióval érhető el bővítmények formájában. Az OPNsense-t általában peremtűzfalként, routerként, vezeték nélküli hozzáférési pontként, DHCP-szerverként, DNS-szerverként és VPN végpontként vetik be. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. Az OPNsense-t általában peremtűzfalként, routerként, vezeték nélküli hozzáférési pontként, DHCP-szerverként, DNS-szerverként és VPN végpontként vetik be. A pfSense-t általában perem tűzfalként, routerként, vezeték nélküli hozzáférési pontként, DHCP szerverként, DNS szerverként és VPN végpontként telepítik. diff --git a/i18n/hu/vpn.md b/i18n/hu/vpn.md index 9a15b1f5..fa4a7f97 100644 --- a/i18n/hu/vpn.md +++ b/i18n/hu/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ Minden általunk ajánlott VPN-szolgáltatótól elvárjuk, hogy biztosítson Op - Olyan erős protokollok támogatása, mint a WireGuard és az OpenVPN. - Kliensekbe beépített killswitch. - Multihop támogatás. Multihopping is important to keep data private in case of a single node compromise. -- Ha biztosítva vannak VPN-kliensek, akkor azoknak [nyílt forráskódúaknak](https://en.wikipedia.org/wiki/Open_source) kell lenniük, épp mint a VPN-szoftver, ami általában beléjük van építve. Úgy véljük, hogy a [forráskód](https://en.wikipedia.org/wiki/Source_code) elérhetősége nagyobb átláthatóságot biztosít arról, hogy az eszközöd valójában mit csinál. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. Úgy véljük, hogy a [forráskód](https://en.wikipedia.org/wiki/Source_code) elérhetősége nagyobb átláthatóságot biztosít arról, hogy az eszközöd valójában mit csinál. **Legjobb Esetben:** diff --git a/i18n/id/about/criteria.md b/i18n/id/about/criteria.md index 5d3e2c74..bacf3697 100644 --- a/i18n/id/about/criteria.md +++ b/i18n/id/about/criteria.md @@ -17,7 +17,7 @@ Kami tidak menghasilkan uang dari merekomendasikan produk tertentu, kami tidak m Kami menerapkan prioritas ini ketika mempertimbangkan rekomendasi baru: - **Aman**: Alat harus mengikuti praktik terbaik keamanan di mana pun berlaku. -- **Ketersediaan Sumber**: Proyek sumber terbuka umumnya lebih disukai daripada alternatif bersumber tertutup yang setara. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Lintas Platform**: Kami biasanya lebih memilih rekomendasi yang bersifat lintas platform, untuk menghindari penguncian penyedia. - **Pengembangan Aktif**: Alat yang kami rekomendasikan harus dikembangkan secara aktif, proyek yang tidak terpelihara akan dihapus dalam banyak kasus. - **Kegunaan**: Alat bantu harus dapat diakses oleh sebagian besar pengguna komputer, latar belakang yang terlalu teknis tidak diperlukan. diff --git a/i18n/id/about/index.md b/i18n/id/about/index.md index a5873506..a24b8191 100644 --- a/i18n/id/about/index.md +++ b/i18n/id/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/id/about/notices.md b/i18n/id/about/notices.md index 6af95198..fbed734a 100644 --- a/i18n/id/about/notices.md +++ b/i18n/id/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides bukanlah firma hukum. Dengan demikian, situs web dan kontributor Menjalankan situs web ini, seperti hal usaha manusia lainnya, melibatkan ketidakpastian dan kerugian. Kami harap situs web ini membantu, tetapi mungkin termasuk kesalahan dan tidak dapat mengatasi setiap situasi. Jika Anda memiliki pertanyaan tentang situasi Anda, kami mendorong Anda untuk melakukan penelitian Anda sendiri, mencari ahli lain, dan terlibat dalam diskusi dengan komunitas Privacy Guides. Jika Anda memiliki pertanyaan hukum, Anda harus berkonsultasi dengan penasihat hukum Anda sendiri sebelum melangkah lebih jauh. -Privacy Guides adalah proyek sumber terbuka yang dikontribusikan di bawah lisensi yang mencakup persyaratan yang, demi perlindungan situs web dan kontributornya, menjelaskan bahwa proyek dan situs web Panduan Privasi ditawarkan "apa adanya", tanpa jaminan, dan melepaskan tanggung jawab atas kerugian yang diakibatkan oleh penggunaan situs web atau rekomendasi apa pun yang terkandung di dalamnya. Privacy Guides tidak menjamin atau membuat pernyataan apa pun mengenai keakuratan, kemungkinan hasil, atau keandalan penggunaan materi di situs web atau yang terkait dengan materi tersebut di situs web atau di situs pihak ketiga mana pun yang ditautkan di situs ini. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides tidak menjamin atau membuat pernyataan apa pun mengenai keakuratan, kemungkinan hasil, atau keandalan penggunaan materi di situs web atau yang terkait dengan materi tersebut di situs web atau di situs pihak ketiga mana pun yang ditautkan di situs ini. Privacy Guides juga tidak menjamin bahwa situs web ini akan selalu tersedia, atau tersedia sama sekali. diff --git a/i18n/id/about/privacytools.md b/i18n/id/about/privacytools.md index fbbe41f7..380f03f3 100644 --- a/i18n/id/about/privacytools.md +++ b/i18n/id/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu juga membuat [kiriman Twitter](https://twitter.com/privacytoolsIO/st Pada tanggal 25 September 2022, kami melihat keseluruhan rencana BurungHantu terwujud di privacytools.io, dan ini adalah alasan utama kami memutuskan untuk membuat halaman penjelasan ini hari ini. Situs web yang dia operasikan tampaknya merupakan versi situs yang sangat dioptimalkan untuk SEO yang merekomendasikan alat dengan imbalan kompensasi finansial. Baru-baru ini, IVPN dan Mullvad, dua penyedia VPN yang hampir secara universal [direkomendasikan](../vpn.md) oleh komunitas privasi dan terkenal karena sikap mereka yang menentang program afiliasi telah dihapus dari PrivacyTools. Di tempat mereka? NordVPN, Surfshark, ExpressVPN, dan hide.me; Perusahaan VPN raksasa dengan platform dan praktik bisnis yang tidak dapat dipercaya, terkenal karena program pemasaran dan afiliasi mereka yang agresif. -==**PrivacyTools telah menjadi jenis situs yang kami [peringatkan untuk dihindari](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) di blog PrivacyTools pada tahun 2019.**== Kami telah mencoba untuk menjaga jarak dari PrivacyTools sejak transisi, tetapi pelecehan mereka yang terus berlanjut terhadap proyek kami dan sekarang penyalahgunaan mereka yang tidak masuk akal terhadap kredibilitas merek mereka yang diperoleh selama 6 tahun kontribusi sumber terbuka sangat mengganggu kami. Kami yang benar-benar memperjuangkan privasi tidak bertengkar satu sama lain, dan tidak mendapatkan saran dari penawar tertinggi. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Kami yang benar-benar memperjuangkan privasi tidak bertengkar satu sama lain, dan tidak mendapatkan saran dari penawar tertinggi. ## r/privacytoolsIO Sekarang diff --git a/i18n/id/android.md b/i18n/id/android.md index 34e1cc6a..b0d1761e 100644 --- a/i18n/id/android.md +++ b/i18n/id/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/id/basics/common-misconceptions.md b/i18n/id/basics/common-misconceptions.md index f94fcb33..d14b2b0d 100644 --- a/i18n/id/basics/common-misconceptions.md +++ b/i18n/id/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/id/cloud.md b/i18n/id/cloud.md index 21f520a7..1ead6319 100644 --- a/i18n/id/cloud.md +++ b/i18n/id/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang sempurna dalam kategori ini. Rekomendasi kami mungkin tidak menyertakan salah satu atau semua fungsi ini, tetapi rekomendasi yang menyertakan fungsi ini mungkin memiliki peringkat yang lebih tinggi daripada yang lain di halaman ini. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/id/data-redaction.md b/i18n/id/data-redaction.md index bc4c1201..ac37ef8f 100644 --- a/i18n/id/data-redaction.md +++ b/i18n/id/data-redaction.md @@ -55,19 +55,19 @@ Saat berbagi file, pastikan untuk menghapus metadata terkait. File gambar biasan Metadata yang dihapus, bergantung pada jenis file gambar: -* **JPEG**: Profil ICC, Exif, Sumber Daya Gambar Photoshop, dan metadata XMP/ExtendedXMP akan dihapus jika ada. -* **PNG**: Profil ICC, metadata Exif dan XMP akan dihapus jika ada. -* **WebP**: Profil ICC, Exif dan metadata XMP akan dihapus jika ada. +- **JPEG**: Profil ICC, Exif, Sumber Daya Gambar Photoshop, dan metadata XMP/ExtendedXMP akan dihapus jika ada. +- **PNG**: Profil ICC, metadata Exif dan XMP akan dihapus jika ada. +- **WebP**: Profil ICC, Exif dan metadata XMP akan dihapus jika ada. Setelah memproses gambar, ExifEraser memberi Anda laporan lengkap mengenai apa yang sesungguhnya dihapus dari tiap gambar. Aplikasi ini menawarkan beberapa cara untuk menghapus metadata dari gambar. Yaitu: -* Anda dapat berbagi gambar dari aplikasi lain dengan ExifEraser. -* Melalui aplikasi itu sendiri, Anda dapat memilih satu gambar, beberapa gambar sekaligus, atau bahkan seluruh direktori. -* Aplikasi ini memiliki opsi "Kamera", yang menggunakan aplikasi kamera sistem operasi Anda untuk mengambil foto, dan kemudian menghapus metadata dari foto tersebut. -* Anda dapat menyeret foto dari aplikasi lain ke ExifEraser apabila keduanya terbuka dalam mode layar terbagi. -* Terakhir, Anda dapat menempelkan gambar dari clipboard Anda. +- Anda dapat berbagi gambar dari aplikasi lain dengan ExifEraser. +- Melalui aplikasi itu sendiri, Anda dapat memilih satu gambar, beberapa gambar sekaligus, atau bahkan seluruh direktori. +- Aplikasi ini memiliki opsi "Kamera", yang menggunakan aplikasi kamera sistem operasi Anda untuk mengambil foto, dan kemudian menghapus metadata dari foto tersebut. +- Anda dapat menyeret foto dari aplikasi lain ke ExifEraser apabila keduanya terbuka dalam mode layar terbagi. +- Terakhir, Anda dapat menempelkan gambar dari clipboard Anda. ### Metapho (iOS) @@ -143,5 +143,5 @@ Aplikasi ini menawarkan beberapa cara untuk menghapus metadata dari gambar. Yait Kami sedang berupaya menetapkan kriteria yang jelas untuk setiap bagian dari situs kami, dan hal ini dapat berubah sewaktu-waktu. Jika Anda memiliki pertanyaan mengenai kriteria kami, silakan [tanyakan di forum](https://discuss.privacyguides.net/latest) dan jangan berasumsi bahwa kami tidak mempertimbangkan sesuatu saat membuat rekomendasi jika tidak tercantum di sini. Ada banyak faktor yang dipertimbangkan dan didiskusikan saat kami merekomendasikan sebuah proyek, dan mendokumentasikan setiap faktor tersebut merupakan sebuah pekerjaan yang sedang berjalan. -- Aplikasi yang dikembangkan untuk sistem operasi sumber terbuka haruslah sumber terbuka. +- Apps developed for open-source operating systems must be open source. - Aplikasi harus gratis dan tidak boleh menyertakan iklan atau batasan lainnya. diff --git a/i18n/id/desktop.md b/i18n/id/desktop.md index 3e0be69a..c8cd15d6 100644 --- a/i18n/id/desktop.md +++ b/i18n/id/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/id/email-clients.md b/i18n/id/email-clients.md index 09874207..a3357e6a 100644 --- a/i18n/id/email-clients.md +++ b/i18n/id/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Aplikasi yang dikembangkan untuk sistem operasi sumber terbuka haruslah sumber terbuka. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang sempurna dalam kategori ini. Rekomendasi kami mungkin tidak menyertakan salah satu atau semua fungsi ini, tetapi rekomendasi yang menyertakan fungsi ini mungkin memiliki peringkat yang lebih tinggi daripada yang lain di halaman ini. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/id/encryption.md b/i18n/id/encryption.md index ef461934..b3d29f90 100644 --- a/i18n/id/encryption.md +++ b/i18n/id/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/id/frontends.md b/i18n/id/frontends.md index f3445c0b..8f51a3e6 100644 --- a/i18n/id/frontends.md +++ b/i18n/id/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/id/multi-factor-authentication.md b/i18n/id/multi-factor-authentication.md index 6846aa18..f3594168 100644 --- a/i18n/id/multi-factor-authentication.md +++ b/i18n/id/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Kriteria diff --git a/i18n/id/notebooks.md b/i18n/id/notebooks.md index 48d59374..3294cc0d 100644 --- a/i18n/id/notebooks.md +++ b/i18n/id/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si Kami sedang berupaya menetapkan kriteria yang jelas untuk setiap bagian dari situs kami, dan hal ini dapat berubah sewaktu-waktu. Jika Anda memiliki pertanyaan mengenai kriteria kami, silakan [tanyakan di forum](https://discuss.privacyguides.net/latest) dan jangan berasumsi bahwa kami tidak mempertimbangkan sesuatu saat membuat rekomendasi jika tidak tercantum di sini. Ada banyak faktor yang dipertimbangkan dan didiskusikan saat kami merekomendasikan sebuah proyek, dan mendokumentasikan setiap faktor tersebut merupakan sebuah pekerjaan yang sedang berjalan. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/id/os/android-overview.md b/i18n/id/os/android-overview.md index 4efb8901..f9fecdf2 100644 --- a/i18n/id/os/android-overview.md +++ b/i18n/id/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Memilih Distribusi Android -Ketika Anda membeli ponsel Android, sistem operasi bawaan perangkat sering kali dilengkapi dengan integrasi invasif dengan aplikasi dan layanan yang bukan merupakan bagian dari [Android Open-Source Project](https://source.android.com/). Contohnya adalah Layanan Google Play, yang memiliki hak istimewa yang tidak dapat dibatalkan untuk mengakses file, penyimpanan kontak, log panggilan, pesan SMS, lokasi, kamera, mikrofon, pengidentifikasi perangkat keras, dan sebagainya. Aplikasi dan layanan ini meningkatkan permukaan serangan pada perangkat Anda dan merupakan sumber dari berbagai masalah privasi pada Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). Contohnya adalah Layanan Google Play, yang memiliki hak istimewa yang tidak dapat dibatalkan untuk mengakses file, penyimpanan kontak, log panggilan, pesan SMS, lokasi, kamera, mikrofon, pengidentifikasi perangkat keras, dan sebagainya. Aplikasi dan layanan ini meningkatkan permukaan serangan pada perangkat Anda dan merupakan sumber dari berbagai masalah privasi pada Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/id/os/linux-overview.md b/i18n/id/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/id/os/linux-overview.md +++ b/i18n/id/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/id/passwords.md b/i18n/id/passwords.md index 6d304dee..193f056d 100644 --- a/i18n/id/passwords.md +++ b/i18n/id/passwords.md @@ -161,7 +161,7 @@ Bitwarden juga memiliki fitur [Bitwarden Send](https://bitwarden.com/products/se Anda memerlukan [Paket Premium](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) untuk dapat berbagi file. Paket yang gratis hanya bisa berbagi teks saja. -Kode sisi server Bitwarden adalah [open-source](https://github.com/bitwarden/server), jadi jika Anda tidak ingin menggunakan cloud Bitwarden, Anda dapat dengan mudah meng-host server sinkronisasi Bitwarden Anda sendiri. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** adalah implementasi alternatif dari server sinkronisasi Bitwarden yang ditulis dalam Rust dan kompatibel dengan klien Bitwarden resmi, sempurna untuk penerapan yang dihosting sendiri di mana menjalankan layanan resmi yang penuh sumber daya mungkin tidak ideal. Jika Anda ingin meng-host Bitwarden di server Anda sendiri, Gunakanlah Vaultwarden dan bukan kode server resmi Bitwarden. @@ -239,7 +239,7 @@ Psono menyediakan dokumentasi ekstensif untuk produk mereka. Klien web untuk Pso Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang sempurna dalam kategori ini. Rekomendasi kami mungkin tidak menyertakan salah satu atau semua fungsi ini, tetapi rekomendasi yang menyertakan fungsi ini mungkin memiliki peringkat yang lebih tinggi daripada yang lain di halaman ini. - Telemetri harus bersifat opsional (dinonaktifkan secara default) atau tidak dikumpulkan sama sekali. -- Harus bersumber terbuka dan dapat dihosting sendiri. +- Should be open source and reasonably self-hostable. ## Penyimpanan Lokal diff --git a/i18n/id/productivity.md b/i18n/id/productivity.md index 67938b90..4a3e6b3f 100644 --- a/i18n/id/productivity.md +++ b/i18n/id/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Persyaratan Minimum -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Kasus Terbaik Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang sempurna dalam kategori ini. Rekomendasi kami mungkin tidak menyertakan salah satu atau semua fungsi ini, tetapi rekomendasi yang menyertakan fungsi ini mungkin memiliki peringkat yang lebih tinggi daripada yang lain di halaman ini. diff --git a/i18n/id/router.md b/i18n/id/router.md index 852d6904..3caddd5b 100644 --- a/i18n/id/router.md +++ b/i18n/id/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/id/vpn.md b/i18n/id/vpn.md index bff801ce..72ce09fc 100644 --- a/i18n/id/vpn.md +++ b/i18n/id/vpn.md @@ -133,7 +133,7 @@ IVPN telah menjalani [audit tanpa pencatatan dari Cure53](https://cure53.de/audi #### :material-check:{ .pg-green } Klien Sumber Terbuka -Pada Februari 2020 [aplikasi IVPN sekarang menjadi sumber terbuka](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Kode sumber dapat diperoleh dari [organisasi GitHub](https://github.com/ivpn) mereka. +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Kode sumber dapat diperoleh dari [organisasi GitHub](https://github.com/ivpn) mereka. #### :material-check:{ .pg-green } Menerima Uang Tunai dan Monero @@ -248,7 +248,7 @@ Kami mewajibkan semua penyedia VPN yang kami rekomendasikan untuk menyediakan be - Dukungan untuk protokol yang kuat seperti WireGuard & OpenVPN. - Killswitch yang terpasang pada klien. - Dukungan multihop. Multihopping penting untuk menjaga kerahasiaan data jika terjadi kompromi pada satu node. -- Jika klien VPN disediakan, klien tersebut seharusnya [perangkat lunak sumber terbuka](https://id.wikipedia.org/wiki/Perangkat_lunak_sumber_terbuka), seperti perangkat lunak VPN yang umumnya sudah terpasang di dalamnya. Kami percaya bahwa ketersediaan [kode sumber](https://id.wikipedia.org/wiki/Kode_sumber) memberikan transparansi yang lebih besar tentang apa yang sebenarnya dilakukan oleh perangkat Anda. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. Kami percaya bahwa ketersediaan [kode sumber](https://id.wikipedia.org/wiki/Kode_sumber) memberikan transparansi yang lebih besar tentang apa yang sebenarnya dilakukan oleh perangkat Anda. **Kasus Terbaik:** diff --git a/i18n/it/about/criteria.md b/i18n/it/about/criteria.md index 18fa3950..869f3bb4 100644 --- a/i18n/it/about/criteria.md +++ b/i18n/it/about/criteria.md @@ -17,7 +17,7 @@ Non guadagniamo denaro consigliando certi prodotti, non utilizziamo i link d'aff Applichiamo queste priorità considerando nuovi consigli: - **Sicuro**: gli strumenti dovrebbero seguire le migliori pratiche di sicurezza, ove applicabile. -- **Disponibilità della Sorgente**: I progetti open source sono generalmente preferiti alle equivalenti alternative proprietarie. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Multipiattaforma**: tipicamente, preferiamo che i prodotti consigliati siano multipiattaforma, per evitare il blocco del venditore. - **Sviluppo attivo**: Gli strumenti che consigliamo dovrebbero essere mantenuti attivamente; i progetti non mantenuti, in gran parte dei casi, saranno rimossi. - **Utilizzabilità**: gli strumenti dovrebbero essere accessibili a gran parte degli utenti, senza richiedere un background eccessivamente tecnico. diff --git a/i18n/it/about/index.md b/i18n/it/about/index.md index e911fd4e..e78e4a6c 100644 --- a/i18n/it/about/index.md +++ b/i18n/it/about/index.md @@ -81,7 +81,7 @@ Finora, nel 2023, abbiamo lanciato le traduzioni internazionali del nostro sito - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Inoltre, [molte persone](https://github.com/privacyguides/privacyguides.org/graphs/contributors) hanno contribuito al progetto. Anche tu puoi, siamo open source su GitHub e accettiamo suggerimenti di traduzione su [Crowdin](https://crowdin.com/project/privacyguides). +Inoltre, [molte persone](https://github.com/privacyguides/privacyguides.org/graphs/contributors) hanno contribuito al progetto. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). I membri del nostro team revisionano tutte le modifiche effettuate al sito web e gestiscono i doveri amministrativi, come l'hosting web e le finanze; tuttavia, non traggono alcun profitto personale da alcun contributo effettuato a questo sito. I nostri dati finanziari sono ospitati trasparentemente dalla Open Collective Foundation 501(c)(3), su [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Le donazioni a Privacy Guides sono generalmente fiscalmente detraibili negli Stati Uniti. diff --git a/i18n/it/about/notices.md b/i18n/it/about/notices.md index 0aa7c13c..872387f0 100644 --- a/i18n/it/about/notices.md +++ b/i18n/it/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides non è uno studio legale. Pertanto, il sito web e i collaboratori La gestione di questo sito web, come ogni impresa umana, comporta incertezze e compromessi. Speriamo che questo sito web sia d'aiuto, ma potrebbe includere errori e non può affrontare ogni situazione. Se hai qualsiasi domanda sulla tua situazione, ti incoraggiamo a svolgere le tue ricerche, cercare altri esperti e discutere con la community di Privacy Guides. Se hai qualsiasi domanda legale, dovresti consultare il tuo consulente legale, prima di procedere. -Privacy Guides è un progetto open source a cui si contribuisce sotto licenze che includono termini che, per la protezione del sito web e dei suoi collaboratori, chiariscono che il progetto e il sito web di Privacy Guides è offerto "così com'è", senza garanzie, e declinando la responsabilità per i danni risultati dall'utilizzo del sito web o di qualsiasi consiglio contenuto in esso. Privacy Guides non garantisce, né rilascia alcuna dichiarazione riguardante l'accuratezza, i risultati probabili, o l'affidabilità dell'utilizzo dei materiali sul sito web, o altrimenti relativi a tali materiali sul sito web, o su qualsiasi sito di terze parti collegato al sito web. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides non garantisce, né rilascia alcuna dichiarazione riguardante l'accuratezza, i risultati probabili, o l'affidabilità dell'utilizzo dei materiali sul sito web, o altrimenti relativi a tali materiali sul sito web, o su qualsiasi sito di terze parti collegato al sito web. Inoltre, Privacy Guides non garantisce che questo sito web sarà disponibile costantemente, o disponibile affatto. diff --git a/i18n/it/about/privacytools.md b/i18n/it/about/privacytools.md index 0e338fe5..f2c14939 100644 --- a/i18n/it/about/privacytools.md +++ b/i18n/it/about/privacytools.md @@ -77,7 +77,7 @@ Inoltre, BurungHntu ha pubblicato un [post di Twitter](https://twitter.com/priva Dal 25 settembre 2022, stiamo vedendo i piani generali di BurungHantu realizzarsi su privacytools.io, ed è proprio per questo che abbiamo deciso di creare questa pagina esplicativa, oggi. Il sito web che sta gestendo sembra essere una versione fortemente ottimizzata per il SEO del sito, che consiglia strumenti, in cambio di compenso monetario. Molto di recente, IVPN e Mullvad, due fornitori VPN [consigliati](../vpn.md) quasi universamente dalla community sulla privacy e noti per la propria posizione contro i programmi d'affiliazione, sono stati rimossi da PrivacyTools. Al loro posto? NordVPN, Surfshark, ExpressVPN e hide.me; enormi società di VPN con piattaforme e pratiche aziendli non affidabili, note per il proprio marketing aggressivo e i propri programmi d'affiliazione. -==**PrivacyTools è diventato esattamente la tipologia di sito che abbiamo [sconsigliato](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) sul blog di PrivacyTools nel 2019.**== Abbiamo provato a mantenere le distanze da PrivacyTools dalla transizione, ma le loro continue molestie nei confronti del nostro progetto e, adesso, il loro assurdo abuso della credibilità del proprio marchio, ottenuta in oltre 6 anni di contributi open source, ci sta preoccupando estremamente. Coloro che, tra noi, lottano realmente per la privacy, non stanno lottando gli uni contro gli altri, e non si fanno consigliare dal migliore offerente. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Coloro che, tra noi, lottano realmente per la privacy, non stanno lottando gli uni contro gli altri, e non si fanno consigliare dal migliore offerente. ## r/privacytoolsIO ora diff --git a/i18n/it/android.md b/i18n/it/android.md index f5d15eba..3cc794bd 100644 --- a/i18n/it/android.md +++ b/i18n/it/android.md @@ -180,7 +180,7 @@ I telefoni Google Pixel sono i **soli** dispositivi che consigliamo di acquistar Gli Elementi Sicuri come Titan M2 sono più limitati dell'Ambiente d'Esecuzione Attendibile del processore, utilizzato da gran parte degli altri dispositivi, essendo utilizzati soltanto per l'archiviazione segreta, l'attestazione del hardware e la limitazione della frequenza, non per eseguire i programmi "attendibili". I telefoni privi di un Elemento Sicuro, devono utilizzare TEE per *tutte* queste funzionalità, risultando in una maggiore superficie di attacco. -I telefoni Google Pixel utilizzano un TEE OS detto Trusty, che è [open source](https://source.android.com/security/trusty#whyTrusty), a differenza di molti altri dispositivi. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. L'installazione di GrapheneOS su un telefono Pixel è facile grazie all'[installatore web](https://grapheneos.org/install/web). Se non ti senti a tuo agio a farlo da solo e desideri spendere un po' di denaro in più, consulta [NitroPhone](https://shop.nitrokey.com/shop), preinstallato con GrapheneOS dalla rispettabile azienda [Nitrokey](https://www.nitrokey.com/about). diff --git a/i18n/it/basics/common-misconceptions.md b/i18n/it/basics/common-misconceptions.md index acd487de..08366c98 100644 --- a/i18n/it/basics/common-misconceptions.md +++ b/i18n/it/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Il software open source è intrinsecamente sicuro? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/it/cloud.md b/i18n/it/cloud.md index e66a946c..eb237b94 100644 --- a/i18n/it/cloud.md +++ b/i18n/it/cloud.md @@ -92,7 +92,7 @@ Hanno anche ricevuto l'Etichetta di Affidabilità Digitale, una certificazione d I nostri criteri ottimali rappresentano ciò che vorremmo vedere dal progetto perfetto in questa categoria. I nostri consigli potrebbero non includere tutte o alcune di queste funzionalità, ma quelli che le includono potrebbero essere preferiti ad altri su questa pagina. -- I client dovrebbero essere open source. +- Clients should be open source. - I client dovrebbero essere interamente controllati da una terza parte indipendente. - Dovrebbero offrire client nativi per Linux, Android, Windows, macOS e iOS. - Questi client dovrebbero integrarsi con gli strumenti nativi del sistema operativo per i fornitori dell'archiviazione su cloud, come l'integrazione dell'app Files su iOS o la funzionalità di DocumentsProvider su Android. diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md index af6b2767..af8b525a 100644 --- a/i18n/it/data-redaction.md +++ b/i18n/it/data-redaction.md @@ -55,19 +55,19 @@ Condividendo dei file, assicurati di rimuovere i metadati associati. I file imma I metadati cancellati dipendono dal tipo di file dell'immagine: -* **JPEG**: i metadati del profilo ICC, Exif, Risorse dell'Immagine Photoshop e XMP/ExtendedXMP saranno cancellati se esistenti. -* **PNG**: i metadati del profilo ICC, Exif e XMP saranno cancellati se esistenti. -* **WebP**: i metadati del profilo ICC, Exif e XMP saranno cancellati se esistenti. +- **JPEG**: i metadati del profilo ICC, Exif, Risorse dell'Immagine Photoshop e XMP/ExtendedXMP saranno cancellati se esistenti. +- **PNG**: i metadati del profilo ICC, Exif e XMP saranno cancellati se esistenti. +- **WebP**: i metadati del profilo ICC, Exif e XMP saranno cancellati se esistenti. Dopo l'elaborazione delle immagini, ExifEraser fornisce un rapporto completo su cosa è stato rimosso esattamente da ogni immagine. L'applicazione offre diversi modi per cancellare i metadati dalle immagini. Nello specifico: -* È possibile condividere un'immagine da un'altra applicazione con ExifEraser. -* Attraverso l'applicazione stessa, è possibile selezionare una singola immagine, più immagini contemporaneamente o persino un'intera directory. -* È dotata di un'opzione "Fotocamera" che utilizza l'app fotocamera del sistema operativo per scattare una foto e poi ne rimuove i metadati. -* Consente di trascinare le foto da un'altra applicazione in ExifEraser quando entrambe sono aperte in modalità split-screen. -* Infine, consente di incollare un'immagine dagli appunti. +- È possibile condividere un'immagine da un'altra applicazione con ExifEraser. +- Attraverso l'applicazione stessa, è possibile selezionare una singola immagine, più immagini contemporaneamente o persino un'intera directory. +- È dotata di un'opzione "Fotocamera" che utilizza l'app fotocamera del sistema operativo per scattare una foto e poi ne rimuove i metadati. +- Consente di trascinare le foto da un'altra applicazione in ExifEraser quando entrambe sono aperte in modalità split-screen. +- Infine, consente di incollare un'immagine dagli appunti. ### Metapho (iOS) @@ -143,5 +143,5 @@ L'applicazione offre diversi modi per cancellare i metadati dalle immagini. Nell Stiamo lavorando per stabilire i criteri definiti per ogni sezione del nostro sito e, questa, potrebbe essere soggetta a modifiche. Se hai qualsiasi domanda sui nostri criteri, ti preghiamo di [chiedere sul nostro forum](https://discuss.privacyguides.net/latest) e di non supporre che non abbiamo considerato qualcosa, formulando i nostri consigli, se non elencato qui. Molti fattori sono presi in considerazione e discussi quando consigliamo un progetto e la documentazione di ognuno è in lavorazione. -- Le applicazioni sviluppate per sistemi operativi open-source devono essere open-source. +- Apps developed for open-source operating systems must be open source. - Le applicazioni devono essere gratuite e non devono includere pubblicità o altre limitazioni. diff --git a/i18n/it/desktop.md b/i18n/it/desktop.md index bb250900..264b8fbb 100644 --- a/i18n/it/desktop.md +++ b/i18n/it/desktop.md @@ -185,7 +185,7 @@ Sebbene [sconsiglimo](os/linux-overview.md#release-cycle) le distribuzioni "pere Scegliere una distribuzione di Linux adatta a te, diperrà da una vasta gamma di preferenze personali e, questa pagina, **non** è intesa come un elenco esaustiivo di ogni distribuzione fattibile. La nostra pagina panoramica su Linux contiene dei consigli sulla [scelta di una distro](os/linux-overview.md#choosing-your-distribution), in maggiore dettaglio. Le distribuzioni su *questa* pagina, in generale, seguono tutte le linee guida coperte lì e, tutte, soddisfano questi standard: -- Liberi e open source. +- Free and open source. - Ricevono aggiornamenti regolari del software e del kernel. - [Evitano X11](os/linux-overview.md#wayland). - L'eccezione notevole, qui, è Qubes, ma i problemi di isolamento tipici di X11, sono evitati dalla virtualizzazione. Questo isolamento si applica esclusivamente alle app *eseguite in qube differenti* (macchine virtuali), le app eseguite nella *stessa* qube non sono protette tra loro. diff --git a/i18n/it/email-clients.md b/i18n/it/email-clients.md index e0b656a6..c5973252 100644 --- a/i18n/it/email-clients.md +++ b/i18n/it/email-clients.md @@ -227,7 +227,7 @@ Canary Mail è closed-source. Lo consigliamo a causa di alcune scelte per i clie ### Requisiti minimi -- Le app sviluppate per i sistemi operativi open source, devono essere open source. +- Apps developed for open-source operating systems must be open source. - Non devono raccogliere telemetria, o deve disporre di un metodo facile per disabilitare tutta la telemetria. - Deve supportare la crittografia dei messaggi OpenPGP. @@ -235,7 +235,7 @@ Canary Mail è closed-source. Lo consigliamo a causa di alcune scelte per i clie I nostri criteri del caso migliore rappresentano cosa vorremmo vedere dal progetto perfetto in questa categoria. I nostri consigli potrebbero non includere tutte o alcune di queste funzionalità, ma quelli che le includono potrebbero essere preferiti ad altri su questa pagina. -- Dovrebbe essere open source. +- Should be open source. - Dovrebbe essere multipiattaforma. - Non dovrebbe raccogliere alcuna telemetria di default. - Deve supportare OpenPGP nativamente, cioè senza estensioni. diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index 0951bd02..13282bfa 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -345,7 +345,7 @@ Crittografando con PGP, puoi configurare diverse opzioni nel tuo file `gpg.confi ### Requisiti minimi -- Le app di crittografia multipiattaforma devono essere open source. +- Cross-platform encryption apps must be open source. - Le app di crittografia dei file devono supportare la decrittografia su Linux, macOS e Windows. - Le app per la crittografia del disco esterno devono supportare la decrittografia su Linux, macOS e Windows. - Le app di crittografia del disco interno (OS) devono essere multipiattaforma o integrate nativamente al sistema operativo. diff --git a/i18n/it/frontends.md b/i18n/it/frontends.md index 1386f661..6cddfc5f 100644 --- a/i18n/it/frontends.md +++ b/i18n/it/frontends.md @@ -39,9 +39,9 @@ Utilizzando un'istanza gestita da altri, assicurati di leggere la politica sulla !!! recommendation - ![Logo di ProxiTok](assets/img/frontends/proxitok.svg){ align=right } + ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** è un frontend open source per il sito web [TikTok](https://www.tiktok.com), che può anche essere ospitato autonomamente. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. Esistono numerose istanze pubbliche, alcune delle quali supportano i servizi onion di [Tor](https://www.torproject.org). diff --git a/i18n/it/multi-factor-authentication.md b/i18n/it/multi-factor-authentication.md index 1d1ecfca..bd3006ac 100644 --- a/i18n/it/multi-factor-authentication.md +++ b/i18n/it/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp La [tabella di confronto](https://www.yubico.com/store/compare/) mostra le funzionalità e come si confrontano le YubiKeys. Ti consigliamo vivamente di selezionare le chiavi tra le YubiKey 5 Series. -Le YubiKey sono programmabili utilizzando [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) o [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Per gestire i codici TOTP, puoi utilizzare [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Tutti i client di Yubico sono open source. +Le YubiKey sono programmabili utilizzando [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) o [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Per gestire i codici TOTP, puoi utilizzare [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. Per i modelli che supportano HOTP e TOTP, esistono 2 slot nell'interfaccia OTP che potrebbero essere utilizzati per HOTP e 32 slot per memorizzare i codici segreti TOTP. Questi codici segreti sono memorizzati e crittografati sulla chiave e non sono mai esposti ai dispositivi cui questa è collegata. Una volta fornito un seed (codice segreto condiviso) a Yubico Authenticator, questo fornirà soltanto il codice a sei cifre, mai il seed. Questo modello di sicurezza aiuta a limitare ciò che un malintenzionato può fare, qualora dovesse compromettere uno dei dispositivi che operano Yubico Authenticator, rendendo la YubiKey resistente agli attacchi fisici. !!! warning - Il firmware delle YubiKeys non è open source, né aggiornabile. Se desideri avere le funzionalità nelle versioni del firmware più recenti, o se è presente una vulnerabilità nella versione del firmware in uso, dovrai acquistare una nuova chiave. + The firmware of YubiKey is not open source and is not updatable. Se desideri avere le funzionalità nelle versioni del firmware più recenti, o se è presente una vulnerabilità nella versione del firmware in uso, dovrai acquistare una nuova chiave. ### Nitrokey @@ -58,7 +58,7 @@ Per i modelli che supportano HOTP e TOTP, ci sono 3 slot per HOTP e 15 per TOTP. La Nitrokey Pro 2, Nitrokey Storage 2 e l'imminente Nitrokey 3 supportano la verifica dell'integrità del sistema per i portatili con il firmware [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/). -Il firmware di Nitrokey è open source, a differenza di YubiKey. Il firmware dei modelli NitroKey moderni (tranne che per **NitroKey Pro 2**) è aggiornabile. +Nitrokey's firmware is open source, unlike the YubiKey. Il firmware dei modelli NitroKey moderni (tranne che per **NitroKey Pro 2**) è aggiornabile. ### Criteri diff --git a/i18n/it/notebooks.md b/i18n/it/notebooks.md index e596f5e3..be3b98b4 100644 --- a/i18n/it/notebooks.md +++ b/i18n/it/notebooks.md @@ -132,7 +132,7 @@ Cryptee offre 100MB di archiviazione gratuiti, con opzioni a pagamento se necess Stiamo lavorando per stabilire i criteri definiti per ogni sezione del nostro sito e, questa, potrebbe essere soggetta a modifiche. Se hai qualsiasi domanda sui nostri criteri, ti preghiamo di [chiedere sul nostro forum](https://discuss.privacyguides.net/latest) e di non supporre che non abbiamo considerato qualcosa, formulando i nostri consigli, se non elencato qui. Molti fattori sono presi in considerazione e discussi quando consigliamo un progetto e la documentazione di ognuno è in lavorazione. -- I client devono essere open source. +- Clients must be open source. - Qualsiasi funzionalità di sincronizzazione su cloud dev'essere in E2EE. - Deve supportare l'esportazione dei documenti in un formato standard. diff --git a/i18n/it/os/android-overview.md b/i18n/it/os/android-overview.md index afc0f4c4..989f9c8f 100644 --- a/i18n/it/os/android-overview.md +++ b/i18n/it/os/android-overview.md @@ -12,7 +12,7 @@ Il **Progetto Open Source di Androd** è un sistema operativo mobile sicuro, che ### Scegliere una distribuzione di Android -Quando acquisti un telefono Android, il sistema operativo predefinito del dispositivo è spesso dotato di un'integrazione invasiva con applicazioni e servizi che non fanno parte di [Android Open-Source Project](https://source.android.com/). Un esempio è Google Play Services, che ha privilegi irrevocabili di accesso ai file, all'archiviazione dei contatti, ai registri delle chiamate, ai messaggi SMS, alla posizione, alla fotocamera, al microfono, agli identificativi hardware e così via. Queste applicazioni e servizi aumentano la superficie di attacco del dispositivo e sono all'origine di vari problemi di privacy con Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). Un esempio è Google Play Services, che ha privilegi irrevocabili di accesso ai file, all'archiviazione dei contatti, ai registri delle chiamate, ai messaggi SMS, alla posizione, alla fotocamera, al microfono, agli identificativi hardware e così via. Queste applicazioni e servizi aumentano la superficie di attacco del dispositivo e sono all'origine di vari problemi di privacy con Android. Questo problema potrebbe essere risolto utilizzando una distribuzione modificata di Android che non preveda un'integrazione così invasiva. Purtroppo, molte distribuzioni di Android personalizzate spesso violano il modello di sicurezza di Android, non supportando funzioni di sicurezza critiche come AVB, protezione rollback, aggiornamenti del firmware e così via. Alcune distribuzioni forniscono anche build [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) che espongono root tramite [ADB](https://developer.android.com/studio/command-line/adb) e richiedono politiche SELinux [più permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) per ospitare le funzionalità di debug, con conseguente ulteriore aumento della superficie di attacco e indebolimento del modello di sicurezza. diff --git a/i18n/it/os/linux-overview.md b/i18n/it/os/linux-overview.md index bd42c783..ffcdd551 100644 --- a/i18n/it/os/linux-overview.md +++ b/i18n/it/os/linux-overview.md @@ -18,7 +18,7 @@ Esistono alcune notevoli preoccupazioni sulla privacy con Linux, di cui dovresti - Mantenere la [libertà del software](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Utilizzare sistemi incentrati sulla privacy come [Whonix](https://www.whonix.org) o [Tails](https://tails.boum.org/) -### Sicurezza Open Source +### Open-Source Security È una convinzione [comunemente errata](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) che Linux e altri software open-source siano intrinsecamente sicuri semplicemente perché il codice sorgente è disponibile. Ci si aspetta che la verifica della community si verifichi regolarmente, ma ciò non è sempre [il caso](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index 269206a7..12df042a 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -161,7 +161,7 @@ Inoltre, Bitwarden dispone di [Bitwarden Send](https://bitwarden.com/products/se Per poter condividere i file è necessario il [piano Premium](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans). Il piano gratuito consente esclusivamente la condivisione di testo. -Il codice dal lato del server di Bitwarden è [open source](https://github.com/bitwarden/server), quindi, se non desideri utilizzare il cloud di Bitwarden, puoi facilmente ospitare il tuo server di sincronizzazione di Bitwarden. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** è un'implementazione alternativa del server di sincronizzazione di Bitwarden scritta in Rust e compatibile con i client ufficiali di Bitwarden, perfetta per la distribuzione ospitabile autonomamente, quando l'esecuzione del servizio ufficiale e ricco di risorse, potrebbe non essere ideale. Se desideri ospitare autonomamente il tuo server di Bitwarden, desidererai quasi sicuramente utilizzare Vaultwarden, rispetto al codice del server ufficiale di Bitwarden. @@ -239,7 +239,7 @@ Psono fornisce un'ampia documentazione sul proprio prodotto. Il client web per P I nostri criteri del caso migliore rappresentano cosa vorremmo vedere dal progetto perfetto in questa categoria. I nostri consigli potrebbero non includere tutte o alcune di queste funzionalità, ma quelli che le includono potrebbero essere preferiti ad altri su questa pagina. - La telemetria dovrebbe essere su richiesta (disabilitata di default) o non raccolta affatto. -- Dovrebbe essere open source e ragionevolmente ospitabile autonomamente. +- Should be open source and reasonably self-hostable. ## Archiviazione locale diff --git a/i18n/it/productivity.md b/i18n/it/productivity.md index 9cfd5d27..d9439845 100644 --- a/i18n/it/productivity.md +++ b/i18n/it/productivity.md @@ -162,11 +162,10 @@ In generale, definiamo suite da ufficio le applicazioni che potrebbero ragionevo #### Requisiti minimi -- Devono essere open source. +- Deve essere open source. - Deve implementare la crittografia end-to-end "a fiducia zero". - Deve supportare i file protetti da password. - #### Miglior Caso I nostri criteri del caso migliore rappresentano cosa vorremmo vedere dal progetto perfetto in questa categoria. I nostri consigli potrebbero non includere tutte o alcune di queste funzionalità, ma quelli che le includono potrebbero essere preferiti ad altri su questa pagina. diff --git a/i18n/it/router.md b/i18n/it/router.md index 7bbf7c61..b52f4c78 100644 --- a/i18n/it/router.md +++ b/i18n/it/router.md @@ -27,9 +27,9 @@ Di seguito sono elencati alcuni sistemi operativi alternativi, utilizzabili sui !!! recommendation - ![Logo di OPNSense](assets/img/router/opnsense.svg){ align=right } + ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** è una piattaforma open source di firewall e instradamento basata su FreeBSD, che incorpora molte funzionalità avanzate come il modellamento del traffico, il bilanciamento del carico e le funzionalità VPN, con molte altre funzionalità disponibili sotto forma di plugin. OPNsense è comunemente distribuito come firewall perimetrale, router, punto d'accesso wireless, server DHCP, server DNS ed endpoint VPN. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense è comunemente distribuito come firewall perimetrale, router, punto d'accesso wireless, server DHCP, server DNS ed endpoint VPN. [:octicons-home-16: Home](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentazione} diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index 42b44760..8ead34e0 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -133,7 +133,7 @@ IVPN è stata sottoposta a un [controllo di non registrazione da Cure53](https:/ #### :material-check:{ .pg-green } Client Open-Source -A partire da febbraio 2020 [le applicazioni IVPN sono ora open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Il codice sorgente è ottenibile dalla loro [organizzazione di GitHub](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Il codice sorgente è ottenibile dalla loro [organizzazione di GitHub](https://github.com/ivpn). #### :material-check:{ .pg-green } Accetta contanti e Monero @@ -248,7 +248,7 @@ Richiediamo a tutti i nostri fornitori di VPN consigliati di fornire i file di c - Supporto a protocolli forti, come WireGuard e OpenVPN. - Killswitch integrato nei client. - Supporto multihop. Il multihopping è importante per mantenere i dati privati nel caso in cui un nodo venisse compromesso. -- Se vengono forniti client VPN, devono essere [open-source](https://en.wikipedia.org/wiki/Open_source), come il software VPN che generalmente hanno incorporato. Crediamo che la disponibilità del [codice sorgente](https://en.wikipedia.org/wiki/Source_code) fornisca maggiore trasparenza su ciò che il dispositivo sta effettivamente facendo. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. Crediamo che la disponibilità del [codice sorgente](https://en.wikipedia.org/wiki/Source_code) fornisca maggiore trasparenza su ciò che il dispositivo sta effettivamente facendo. **Caso migliore:** diff --git a/i18n/ja/about/criteria.md b/i18n/ja/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/ja/about/criteria.md +++ b/i18n/ja/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/ja/about/index.md b/i18n/ja/about/index.md index 02032969..92aea46b 100644 --- a/i18n/ja/about/index.md +++ b/i18n/ja/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/ja/about/notices.md b/i18n/ja/about/notices.md index 9ccae1ae..d948a76a 100644 --- a/i18n/ja/about/notices.md +++ b/i18n/ja/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is not a law firm. As such, the Privacy Guides website and contri Running this website, like any human endeavor, involves uncertainty and trade-offs. We hope this website helps, but it may include mistakes and can’t address every situation. If you have any questions about your situation, we encourage you to do your own research, seek out other experts, and engage in discussions with the Privacy Guides community. If you have any legal questions, you should consult with your own legal counsel before moving forward. -Privacy Guides is an open source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Privacy Guides additionally does not warrant that this website will be constantly available, or available at all. diff --git a/i18n/ja/about/privacytools.md b/i18n/ja/about/privacytools.md index 11b709d2..ac67543a 100644 --- a/i18n/ja/about/privacytools.md +++ b/i18n/ja/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIOの現在 diff --git a/i18n/ja/android.md b/i18n/ja/android.md index 85dfd546..9a3e1012 100644 --- a/i18n/ja/android.md +++ b/i18n/ja/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/ja/basics/common-misconceptions.md b/i18n/ja/basics/common-misconceptions.md index 0c2f7d4e..88cb73c3 100644 --- a/i18n/ja/basics/common-misconceptions.md +++ b/i18n/ja/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/ja/cloud.md b/i18n/ja/cloud.md index cbc20311..79831156 100644 --- a/i18n/ja/cloud.md +++ b/i18n/ja/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss 満たされることが望ましい基準には、このカテゴリーの完璧なプロジェクトに私たちが望むものを示しています。 私たちが推薦するプロジェクトは、この機能の一部または全部を含んでいないかもしれませんが、もし含んでいれば、このページで他のプロジェクトよりも上位にランクされるかもしれません。 -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/ja/data-redaction.md b/i18n/ja/data-redaction.md index 5c4de562..be45d1d2 100644 --- a/i18n/ja/data-redaction.md +++ b/i18n/ja/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: 私たちは、サイトの各項目に定義された基準を確立することに取り組んでいます。この基準は変更される可能性があります。 私たちの基準について疑問がある場合は、[フォーラムで質問](https://discuss.privacyguides.net/latest)してください。また、ここに記載されていない場合でも、私たちがプロジェクトを推奨する際に、そうした事柄を考慮しなかったと仮定するのはお止めください。 プロジェクトを推奨する際に考慮され、議論される要素は多くあり、そのすべてを文書化する作業は現在進行中です。 -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/ja/desktop.md b/i18n/ja/desktop.md index 36a201b7..84833fab 100644 --- a/i18n/ja/desktop.md +++ b/i18n/ja/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- 自由でオープンソースであること。 +- Free and open source. - 定期的にソフトウェアとカーネルのアップデートを受け取ること。 - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/ja/email-clients.md b/i18n/ja/email-clients.md index 71d4cef8..29197b40 100644 --- a/i18n/ja/email-clients.md +++ b/i18n/ja/email-clients.md @@ -226,7 +226,7 @@ Canary Mailのソースコードは公開されていません。 We recommend i ### 最低要件 -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mailのソースコードは公開されていません。 We recommend i 満たされることが望ましい基準には、このカテゴリーの完璧なプロジェクトに私たちが望むものを示しています。 私たちが推薦するプロジェクトは、この機能の一部または全部を含んでいないかもしれませんが、もし含んでいれば、このページで他のプロジェクトよりも上位にランクされるかもしれません。 -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/ja/encryption.md b/i18n/ja/encryption.md index 7749d11f..29634aac 100644 --- a/i18n/ja/encryption.md +++ b/i18n/ja/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### 最低要件 -- クロスプラットフォームの暗号化アプリはオープンソースであること。 +- Cross-platform encryption apps must be open source. - ファイル暗号化アプリは、Linux、macOS、Windowsでの復号化をサポートするものであること。 - 外部ディスク暗号化アプリは、Linux、macOS、Windowsでの復号化をサポートするものであること。 - 内部(OS)ディスク暗号化アプリは、クロスプラットフォームであるか、OSにネイティブに組み込まれたものであること。 diff --git a/i18n/ja/frontends.md b/i18n/ja/frontends.md index 34b0b7b1..4ebedeb4 100644 --- a/i18n/ja/frontends.md +++ b/i18n/ja/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. 多くの公開インスタンスがあり、いくつかのインスタンスは [Tor](https://www.torproject.org)のオニオン・サービスをサポートしています。 diff --git a/i18n/ja/multi-factor-authentication.md b/i18n/ja/multi-factor-authentication.md index 78c8ac39..87ca4f70 100644 --- a/i18n/ja/multi-factor-authentication.md +++ b/i18n/ja/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### 基準 diff --git a/i18n/ja/notebooks.md b/i18n/ja/notebooks.md index 43d2a5b7..a04660d1 100644 --- a/i18n/ja/notebooks.md +++ b/i18n/ja/notebooks.md @@ -132,7 +132,7 @@ Crypteeは100MBのストレージを無料で提供しています。さらに 私たちは、サイトの各項目に定義された基準を確立することに取り組んでいます。この基準は変更される可能性があります。 私たちの基準について疑問がある場合は、[フォーラムで質問](https://discuss.privacyguides.net/latest)してください。また、ここに記載されていない場合でも、私たちがプロジェクトを推奨する際に、そうした事柄を考慮しなかったと仮定するのはお止めください。 プロジェクトを推奨する際に考慮され、議論される要素は多くあり、そのすべてを文書化する作業は現在進行中です。 -- クライアントはオープンソースであること。 +- Clients must be open source. - クラウド同期機能がエンドツーエンド暗号化であること。 - 文書を標準的な形式でエクスポートできること。 diff --git a/i18n/ja/os/android-overview.md b/i18n/ja/os/android-overview.md index 54eba0cc..620507f7 100644 --- a/i18n/ja/os/android-overview.md +++ b/i18n/ja/os/android-overview.md @@ -12,7 +12,7 @@ description: Androidは、強力なセキュリティー保護機能を備えた ### Androidディストリビューションの選択 -Androidの携帯電話を購入すると、その端末に標準で搭載されているOSには、多くの場合、[Androidオープンソースプロジェクト](https://source.android.com/)に含まれていないアプリやサービスが強制的に統合されてしまっています。 例えば、Google Playサービスは、あなたのファイル、連絡先ストレージ、通話ログ、SMSメッセージ、位置情報、カメラ、マイク、ハードウェア識別子などにアクセスする権限を備えており、それらの権限を取り消すことはできません。 これらのアプリやサービスは、あなたのデバイスの攻撃対象を増加させ、Androidのプライバシーに関する様々な懸念の原因となっています。 +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). 例えば、Google Playサービスは、あなたのファイル、連絡先ストレージ、通話ログ、SMSメッセージ、位置情報、カメラ、マイク、ハードウェア識別子などにアクセスする権限を備えており、それらの権限を取り消すことはできません。 これらのアプリやサービスは、あなたのデバイスの攻撃対象を増加させ、Androidのプライバシーに関する様々な懸念の原因となっています。 この問題は、そうした強制的な統合を伴わない、カスタムAndroidディストリビューションを使用すると解決できる可能性があります。 しかし残念ながら、多くのカスタムAndroidディストリビューションは、AVBや、ロールバック保護、ファームウェア・アップデートなどの重要なセキュリティ機能をサポートしておらず、しばしばAndroidのセキュリティーモデルに違反しています。 ディストリビューションによっては、[`userdebug`](https://source.android.com/setup/build/building#choose-a-target)ビルドもリリースしています。このビルドは、 [ADB](https://developer.android.com/studio/command-line/adb)経由でrootを公開し、デバッグ機能に対応するために[より寛容な](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code)SELinuxポリシーを必要とするものです。結果、攻撃対象がさらに増加し、セキュリティモデルが弱体化してしまいます。 diff --git a/i18n/ja/os/linux-overview.md b/i18n/ja/os/linux-overview.md index 87e05e77..788bbea9 100644 --- a/i18n/ja/os/linux-overview.md +++ b/i18n/ja/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/ja/passwords.md b/i18n/ja/passwords.md index aded81d8..6d296768 100644 --- a/i18n/ja/passwords.md +++ b/i18n/ja/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso 満たされることが望ましい基準には、このカテゴリーの完璧なプロジェクトに私たちが望むものを示しています。 私たちが推薦するプロジェクトは、この機能の一部または全部を含んでいないかもしれませんが、もし含んでいれば、このページで他のプロジェクトよりも上位にランクされるかもしれません。 - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/ja/productivity.md b/i18n/ja/productivity.md index da2c20a8..d6a163c4 100644 --- a/i18n/ja/productivity.md +++ b/i18n/ja/productivity.md @@ -58,7 +58,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -160,11 +160,10 @@ In general, we define office suites as applications which could reasonably act a #### 最低要件 -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### 満たされることが望ましい基準 満たされることが望ましい基準には、このカテゴリーの完璧なプロジェクトに私たちが望むものを示しています。 私たちが推薦するプロジェクトは、この機能の一部または全部を含んでいないかもしれませんが、もし含んでいれば、このページで他のプロジェクトよりも上位にランクされるかもしれません。 diff --git a/i18n/ja/router.md b/i18n/ja/router.md index 2297895a..3d7fd4ab 100644 --- a/i18n/ja/router.md +++ b/i18n/ja/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/ja/vpn.md b/i18n/ja/vpn.md index 5c97e7f5..205e5593 100644 --- a/i18n/ja/vpn.md +++ b/i18n/ja/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } オープンソースクライアント -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **満たされることが望ましい基準:** diff --git a/i18n/ko/about/criteria.md b/i18n/ko/about/criteria.md index 6eb97c1e..a39ba60e 100644 --- a/i18n/ko/about/criteria.md +++ b/i18n/ko/about/criteria.md @@ -17,7 +17,7 @@ Privacy Guides는 특정 제품을 추천함으로써 수익을 창출하지 않 다음 사항들을 고려하여 권장 목록에 새로 추가합니다. - **보안**: 툴은 (해당되는 경우) 보안 모범 사례를 따라야 합니다. -- **소스 가용성**: 오픈 소스 프로젝트는 일반적으로 독점 프로젝트보다 우선됩니다. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **크로스 플랫폼**: 특정 벤더에 종속되는 것을 피하기 위해 일반적으로 크로스 플랫폼을 우선합니다. - **활발한 개발**: 권장 툴은 유지 관리가 활발하게 이루어져야 합니다. 개발이 중단된 프로젝트는 대부분 제거됩니다. - **사용성**: 툴은 대부분의 컴퓨터 사용자가 사용하는 데에 무리가 없어야 합니다. 지나치게 많은 기술적 배경 지식이 요구되어서는 안 됩니다. diff --git a/i18n/ko/about/index.md b/i18n/ko/about/index.md index 219319ba..84896e9c 100644 --- a/i18n/ko/about/index.md +++ b/i18n/ko/about/index.md @@ -81,7 +81,7 @@ Privacy Guides 프로젝트는 지금은 [사라진](privacytools.md) 'PrivacyTo - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -추가로 [많은 분들이](https://github.com/privacyguides/privacyguides.org/graphs/contributors) 프로젝트에 기여해 주셨습니다. 여러분도 얼마든지 기여하실 수 있습니다. Privacy Guides는 GitHub에서 오픈 소스로 운영되며, [Crowdin](https://crowdin.com/project/privacyguides)에서 번역 제안을 받고 있습니다. +추가로 [많은 분들이](https://github.com/privacyguides/privacyguides.org/graphs/contributors) 프로젝트에 기여해 주셨습니다. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Privacy Guides 팀원은 모든 변경 사항을 검토하고 웹 호스팅 및 재무 관리 등의 업무를 처리합니다. 팀원들은 본 사이트에 기여하는 과정에서 사적 이익을 얻지 않습니다. Privacy Guides 재정은 Open Collective Foundation 501(c)(3)([opencollective.com/privacyguides](https://opencollective.com/privacyguides))에서 투명하게 관리하고 있습니다. Privacy Guides로의 기부는 일반적으로 미국에서 세금 공제 대상입니다. diff --git a/i18n/ko/about/notices.md b/i18n/ko/about/notices.md index 8e90f4e0..8c2edbe5 100644 --- a/i18n/ko/about/notices.md +++ b/i18n/ko/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides는 법률 회사가 아닙니다. 따라서 Privacy Guides 웹사 본 웹사이트의 운영은 다른 모든 노력과 마찬가지로 불확실성과 장단점을 수반합니다. 본 웹사이트가 도움이 되길 바라지만, 실수가 존재할 수 있으며 모든 상황을 해결할 수는 없습니다. 자신의 상황에 대해 궁금한 점이 있는 경우, 스스로 조사하고, 다른 전문가를 찾아보고, Privacy Guides 커뮤니티에서 논의에 참여할 것을 권장합니다. 법적인 질문이 있는 경우, 나아가기에 앞서 자신의 법률 상담자과 상의해야 합니다. -Privacy Guide는 웹사이트와 기여자를 보호하기 위해 Privacy Guides 프로젝트 및 웹사이트가 보증 없이 "있는 그대로" 제공되며, 웹사이트 이용 또는 웹사이트에 포함된 권장 사항으로 인한 손해에 대한 책임을 부인하는 약관이 포함된 라이선스에 따라 기여한 오픈 소스 프로젝트입니다. Privacy Guides는 웹사이트의 자료 사용에 대한 정확성, 가능한 결과, 또는 신뢰성에 대해 보증하거나 어떠한 진술도 하지 않으며, 웹사이트의 이러한 자료나 본 사이트에 연결된 제3자 사이트와 관련된 어떠한 자료에 대해서도 보증하지 않습니다. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides는 웹사이트의 자료 사용에 대한 정확성, 가능한 결과, 또는 신뢰성에 대해 보증하거나 어떠한 진술도 하지 않으며, 웹사이트의 이러한 자료나 본 사이트에 연결된 제3자 사이트와 관련된 어떠한 자료에 대해서도 보증하지 않습니다. 또한 Privacy Guides는 본 웹사이트가 지속적으로 이용 가능하거나 전혀 이용 가능하지 않을 수 있음을 보증하지 않습니다. diff --git a/i18n/ko/about/privacytools.md b/i18n/ko/about/privacytools.md index dec51227..5326b83f 100644 --- a/i18n/ko/about/privacytools.md +++ b/i18n/ko/about/privacytools.md @@ -77,7 +77,7 @@ Reddit은 서브레딧에 활동하는 관리자가 존재해야 합니다. 주 2022년 9월 25일 기준, Privacy Guides는 BurungHantu가 privacytools.io에서 어떤 만행을 저지르고 있는지 파악했고, 이는 보고 계신 설명 페이지를 만들기로 결정한 주된 이유이기도 합니다. BurungHantu가 운영 중인 사이트는 SEO(검색 엔진 최적화)를 매우 신경써서 검색 결과에서 최대한 많은 노출을 노리고 있으며, 금전적 보상을 대가로 받고 특정 서비스를 추천하고 있습니다. 최근에는 IVPN, Mullvad VPN 서비스가 PrivacyTools에서 제거되었습니다. 이 두 서비스는 프라이버시 커뮤니티라면 어디든 보편적으로 [권장하는](../vpn.md) 서비스이며, 제휴 마케팅에 반대하는 입장으로 유명합니다. 대신에 등재된 서비스는 NordVPN, Surfshark, ExpressVPN, hide.me였습니다. 이들은 신뢰할 수 없는 플랫폼과 비즈니스 관행을 가진 거대 VPN 업체로, 공격적인 홍보 및 제휴 마케팅으로 악명 높습니다. -==**PrivacyTools는 2019년 PrivacyTools 블로그에서 저희가 [경고했던](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) '나쁜' 사이트가 되어버렸습니다.**== Privacy Guides는 이전이 이루어진 이후 PrivacyTools와는 의도적으로 거리를 두었지만, Privacy Guides 프로젝트에 대한 지속적인 비난과 6년 동안의 오픈 소스 기여로 이뤄낸 브랜드 신뢰도를 터무니없이 악용하는 것은 매우 골치 아픈 문제입니다. 프라이버시를 진지하게 고려하는 사람들은 서로 싸우려 들지 않으며, 누군가에게 큰 돈을 받고 남들을 선동하지 않습니다. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. 프라이버시를 진지하게 고려하는 사람들은 서로 싸우려 들지 않으며, 누군가에게 큰 돈을 받고 남들을 선동하지 않습니다. ## r/privacytoolsIO 현황 diff --git a/i18n/ko/android.md b/i18n/ko/android.md index 0eb8b3f9..2410c7b5 100644 --- a/i18n/ko/android.md +++ b/i18n/ko/android.md @@ -180,7 +180,7 @@ Google Pixel은 Privacy Guides에서 **유일하게** 구매를 권장하는 기 Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/ko/basics/common-misconceptions.md b/i18n/ko/basics/common-misconceptions.md index f046fbb1..49b5341c 100644 --- a/i18n/ko/basics/common-misconceptions.md +++ b/i18n/ko/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: 오픈 소스 소프트웨어는 본질적으로 안전한가요? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/ko/cloud.md b/i18n/ko/cloud.md index b801727d..2c5ac98b 100644 --- a/i18n/ko/cloud.md +++ b/i18n/ko/cloud.md @@ -92,7 +92,7 @@ Tresorit은 독립적인 보안 감사를 여러 차례 받았습니다. 평가 기준에서 '우대 사항'은 해당 부문에서 완벽한 프로젝트에 기대하는 바를 나타냅니다. 다음의 우대 사항에 해당하지 않더라도 권장 목록에 포함될 수 있습니다. 단, 우대 사항에 해당할수록 이 페이지의 다른 항목보다 높은 순위를 갖습니다. -- 클라이언트는 오픈 소스여야 합니다. +- Clients should be open source. - 클라이언트는 독립적인 제3자로부터 전체 감사를 받아야 합니다. - Linux, Android, Windows, macOS, iOS 네이티브 클라이언트를 제공해야 합니다. - 클라이언트는 운영체제에서 기본으로 제공하는 클라우드 스토리지 서비스용 툴과 통합되어야 합니다. 예시: iOS '파일' 앱 연동, Android DocumentsProvider 기능 등 diff --git a/i18n/ko/data-redaction.md b/i18n/ko/data-redaction.md index 1d3a16ac..76e35d43 100644 --- a/i18n/ko/data-redaction.md +++ b/i18n/ko/data-redaction.md @@ -55,19 +55,19 @@ cover: data-redaction.webp 지워지는 메타데이터는 이미지 파일 유형에 따라 달라집니다: -* **JPEG**: ICC 프로필, Exif, Photoshop Image Resources, XMP/ExtendedXMP 메타데이터가 제거됩니다. -* **PNG**: ICC 프로필, Exif, XMP 메타데이터가 제거됩니다. -* **WebP**: ICC 프로필, Exif, XMP 메타데이터가 제거됩니다. +- **JPEG**: ICC 프로필, Exif, Photoshop Image Resources, XMP/ExtendedXMP 메타데이터가 제거됩니다. +- **PNG**: ICC 프로필, Exif, XMP 메타데이터가 제거됩니다. +- **WebP**: ICC 프로필, Exif, XMP 메타데이터가 제거됩니다. 이미지를 처리한 후에는 각 이미지에서 정확히 무엇이 제거됐는지 정리된 전체 기록을 볼 수 있습니다. ExifEraser로 이미지 메타데이터를 제거하는 방법은 다양합니다. 예시는 다음과 같습니다: -* 다른 애플리케이션에서 이미지의 공유 대상으로 ExifEraser를 선택할 수 있습니다. -* 앱 내에서 단일 및 여러 이미지, 혹은 디렉터리 전체를 선택할 수 있습니다. -* 시스템 기본 카메라 앱을 사용해 사진을 촬영하고 메타데이터를 제거하는 '카메라' 옵션이 있습니다. -* 다른 앱과 ExifEraser가 분할 화면 모드로 열려 있을 때, 다른 앱에서 사진을 ExifEraser로 드래그할 수 있습니다. -* 클립보드에서 이미지를 붙여넣을 수 있습니다. +- 다른 애플리케이션에서 이미지의 공유 대상으로 ExifEraser를 선택할 수 있습니다. +- 앱 내에서 단일 및 여러 이미지, 혹은 디렉터리 전체를 선택할 수 있습니다. +- 시스템 기본 카메라 앱을 사용해 사진을 촬영하고 메타데이터를 제거하는 '카메라' 옵션이 있습니다. +- 다른 앱과 ExifEraser가 분할 화면 모드로 열려 있을 때, 다른 앱에서 사진을 ExifEraser로 드래그할 수 있습니다. +- 클립보드에서 이미지를 붙여넣을 수 있습니다. ### Metapho (iOS) @@ -143,5 +143,5 @@ ExifEraser로 이미지 메타데이터를 제거하는 방법은 다양합니 Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준을 정립하는 중이며, 따라서 세부 내용은 변경될 수 있습니다. 평가 기준에 대해서 질문이 있다면 [포럼에서 문의](https://discuss.privacyguides.net/latest)하시기 바랍니다. (무언가가 목록에 존재하지 않다고 해서 권장 목록을 작성할 때 고려한 적이 없을 것으로 단정 짓지 마세요.) 권장 목록에 어떤 프로젝트를 추가할 때 고려하고 논의해야 할 요소는 매우 많으며, 모든 요소를 문서화하는 것은 현재 진행 중인 작업입니다. -- 오픈 소스 운영 체제용으로 개발된 앱은 반드시 오픈 소스여야 합니다. +- Apps developed for open-source operating systems must be open source. - 무료 앱이어야 하며, 광고 및 기타 제약 사항이 존재해서는 안 됩니다. diff --git a/i18n/ko/desktop.md b/i18n/ko/desktop.md index 8534d7f6..fef6e2c8 100644 --- a/i18n/ko/desktop.md +++ b/i18n/ko/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/ko/email-clients.md b/i18n/ko/email-clients.md index 2c96803d..91f51d53 100644 --- a/i18n/ko/email-clients.md +++ b/i18n/ko/email-clients.md @@ -226,7 +226,7 @@ Canay Mail은 오픈 소스가 아닙니다. iOS에서 PGP E2EE를 지원하는 ### 최소 요구 사항 -- 오픈 소스 운영 체제용으로 개발된 앱은 반드시 오픈 소스여야 합니다. +- Apps developed for open-source operating systems must be open source. - 원격 분석 데이터를 수집하지 않거나, 모든 원격 분석을 간단하게 비활성화할 수 있어야 합니다. - OpenPGP 메시지 암호화를 지원해야 합니다. @@ -234,7 +234,7 @@ Canay Mail은 오픈 소스가 아닙니다. iOS에서 PGP E2EE를 지원하는 평가 기준에서 '우대 사항'은 해당 부문에서 완벽한 프로젝트에 기대하는 바를 나타냅니다. 다음의 우대 사항에 해당하지 않더라도 권장 목록에 포함될 수 있습니다. 단, 우대 사항에 해당할수록 이 페이지의 다른 항목보다 높은 순위를 갖습니다. -- 오픈 소스여야 합니다. +- Should be open source. - 크로스 플랫폼을 지원해야 합니다. - 원격 분석 데이터를 기본적으로 수집하지 않아야 합니다. - (확장 프로그램 등을 필요로 하지 않고) 기본적으로 OpenPGP를 지원해야 합니다. diff --git a/i18n/ko/encryption.md b/i18n/ko/encryption.md index 8bfcc9dd..5d46649c 100644 --- a/i18n/ko/encryption.md +++ b/i18n/ko/encryption.md @@ -344,7 +344,7 @@ When encrypting with PGP, you have the option to configure different options in ### 최소 요구 사항 -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/ko/frontends.md b/i18n/ko/frontends.md index 4d8c3018..f5b881b7 100644 --- a/i18n/ko/frontends.md +++ b/i18n/ko/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/ko/multi-factor-authentication.md b/i18n/ko/multi-factor-authentication.md index de352616..fa89bf29 100644 --- a/i18n/ko/multi-factor-authentication.md +++ b/i18n/ko/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp 여러 YubiKey 모델 간 기능 비교는 [YubiKey 비교 표](https://www.yubico.com/store/compare/)에서 확인하실 수 있습니다. Privacy Guides에서는 YubiKey 5 시리즈를 사용하실 것을 권장드립니다. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Yubico에서 제공하는 클라이언트는 모두 오픈 소스입니다. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### 평가 기준 diff --git a/i18n/ko/notebooks.md b/i18n/ko/notebooks.md index cef90f91..af0c316b 100644 --- a/i18n/ko/notebooks.md +++ b/i18n/ko/notebooks.md @@ -132,7 +132,7 @@ Cryptee는 100MB 저장 공간을 무료로 제공하며, 유료 결제를 통 Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준을 정립하는 중이며, 따라서 세부 내용은 변경될 수 있습니다. 평가 기준에 대해서 질문이 있다면 [포럼에서 문의](https://discuss.privacyguides.net/latest)하시기 바랍니다. (무언가가 목록에 존재하지 않다고 해서 권장 목록을 작성할 때 고려한 적이 없을 것으로 단정 짓지 마세요.) 권장 목록에 어떤 프로젝트를 추가할 때 고려하고 논의해야 할 요소는 매우 많으며, 모든 요소를 문서화하는 것은 현재 진행 중인 작업입니다. -- 클라이언트는 오픈 소스여야 합니다. +- Clients must be open source. - 클라우드 동기화 기능은 E2EE가 적용되어야 합니다. - 표준 형식으로 문서 내보내기를 지원해야 합니다. diff --git a/i18n/ko/os/android-overview.md b/i18n/ko/os/android-overview.md index 53cd62b1..7d4b46b8 100644 --- a/i18n/ko/os/android-overview.md +++ b/i18n/ko/os/android-overview.md @@ -12,7 +12,7 @@ description: Android는 강력한 보안 및 보호 기능을 갖춘 오픈 소 ### Android 배포판 선택 -여러분이 Android 휴대폰을 새로 구입하면, 기기의 기본 운영체제 내에 [Android 오픈 소스 프로젝트(AOSP)](https://source.android.com/)에 포함되지 않은 앱, 서비스가 강력히 통합되어 있는 경우가 많습니다. 대표적인 예시로는 Google Play 서비스가 있습니다. Google Play 서비스는 파일, 통화 기록, 연락처, 통화 기록, SMS 메시지, 위치, 카메라, 마이크, 하드웨어 식별자 등에 접근할 수 있으며, 이 권한을 빼앗을 수도 없습니다. 이러한 앱, 서비스는 기기의 공격 표면을 증가시키고 Android의 다양한 프라이버시 문제로 이어집니다. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). 대표적인 예시로는 Google Play 서비스가 있습니다. Google Play 서비스는 파일, 통화 기록, 연락처, 통화 기록, SMS 메시지, 위치, 카메라, 마이크, 하드웨어 식별자 등에 접근할 수 있으며, 이 권한을 빼앗을 수도 없습니다. 이러한 앱, 서비스는 기기의 공격 표면을 증가시키고 Android의 다양한 프라이버시 문제로 이어집니다. 이 문제는 강력히 통합된 앱이 아예 포함되지 않은 커스텀 Android 배포판을 사용하면 해결할 수 있습니다. 다만 안타깝게도, 대부분의 커스텀 Android 배포판은 AVB, 롤백 보호, 펌웨어 업데이트 등의 중요한 보안 기능을 지원하지 않음으로써 Android 보안 모델을 위반하는 경우가 많습니다. 일부 배포판은 [ADB](https://developer.android.com/studio/command-line/adb?hl=ko)를 통해 루트 권한을 노출하고, 디버깅 기능을 포함하기 위해 [보다 느슨한](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux 정책을 선택하여 공격 표면의 증가와 보안 모델의 약화를 일으키는 [`userdebug`](https://source.android.com/docs/setup/build/building?hl=ko#choose-a-target) 빌드를 제공하기도 합니다. diff --git a/i18n/ko/os/linux-overview.md b/i18n/ko/os/linux-overview.md index 75497a4d..ebd3f963 100644 --- a/i18n/ko/os/linux-overview.md +++ b/i18n/ko/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - [자유 소프트웨어](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms)를 사용하고 싶은 경우 - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/ko/passwords.md b/i18n/ko/passwords.md index 38e71d9f..53c27672 100644 --- a/i18n/ko/passwords.md +++ b/i18n/ko/passwords.md @@ -161,7 +161,7 @@ Bitwarden은 [종단 간 암호화를 적용해](https://bitwarden.com/help/send 파일 공유 기능은 [프리미엄 요금제](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans)에만 제공됩니다. 무료 플랜은 텍스트 공유만 가능합니다. -Bitwarden 서버 코드는 [오픈 소스](https://github.com/bitwarden/server)이므로, Bitwarden 클라우드를 사용하고 싶지 않은 경우에는 Bitwarden 동기화 서버를 직접 호스팅하는 것도 가능합니다. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden**은 Bitwarden 동기화 서버를 Rust 언어로 구현한 것으로, Bitwarden 공식 클라이언트와 호환됩니다. 공식 서비스에 비해 리소스 사용량이 적으므로 자체 호스팅 용도로 적합합니다. Vaultwarden은 개인 서버에서 Bitwarden을 자체 호스팅하는 경우 공식 Bitwarden 서버 코드보다 선호됩니다. @@ -239,7 +239,7 @@ Psono는 제품에 관련된 문서를 매우 폭넓게 제공합니다. Psono 평가 기준에서 '우대 사항'은 해당 부문에서 완벽한 프로젝트에 기대하는 바를 나타냅니다. 다음의 우대 사항에 해당하지 않더라도 권장 목록에 포함될 수 있습니다. 단, 우대 사항에 해당할수록 이 페이지의 다른 항목보다 높은 순위를 갖습니다. - 원격 분석 데이터 수집 기능은 아예 존재하지 않거나, 기본적으로 비활성화되어 있어야 합니다. -- 오픈 소스여야 하며, 자체 호스팅이 현실적으로 가능해야 합니다. +- Should be open source and reasonably self-hostable. ## 로컬 저장 diff --git a/i18n/ko/productivity.md b/i18n/ko/productivity.md index a6ec5a08..0ebf9e82 100644 --- a/i18n/ko/productivity.md +++ b/i18n/ko/productivity.md @@ -60,7 +60,7 @@ cover: productivity.webp 일반적으로, Privacy Guides에서 선정하는 '협업 플랫폼'의 기준은 'Google 드라이브 같은 협업 플랫폼을 대체할 수 있을 만한 완전한 제품군'입니다. -- 오픈 소스여야 합니다. +- Open source. - WebDAV를 통한 파일 접근을 지원해야 합니다(종단 간 암호화로 인해 불가능한 경우 제외). - Linux, macOS, Windows 동기화 클라이언트를 제공해야 합니다. - 문서 및 스프레드시트 편집을 지원해야 합니다. @@ -166,7 +166,6 @@ cover: productivity.webp - 'Zero Trust' 종단 간 암호화를 구현해야 합니다. - 파일을 비밀번호로 보호하는 기능을 지원해야 합니다 - #### 우대 사항 평가 기준에서 '우대 사항'은 해당 부문에서 완벽한 프로젝트에 기대하는 바를 나타냅니다. 다음의 우대 사항에 해당하지 않더라도 권장 목록에 포함될 수 있습니다. 단, 우대 사항에 해당할수록 이 페이지의 다른 항목보다 높은 순위를 갖습니다. diff --git a/i18n/ko/router.md b/i18n/ko/router.md index 4bf93b77..033c8644 100644 --- a/i18n/ko/router.md +++ b/i18n/ko/router.md @@ -29,7 +29,7 @@ cover: router.webp ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense**는 오픈 소스, FreeBSD 기반 방화벽 및 라우팅 플랫폼입니다. 트래픽 셰이핑, 로드 밸런싱, VPN 기능 등 여러 고급 기능이 통합되어 있으며, 플러그인 형태로 더 많은 기능을 사용 가능합니다. OPNsense는 일반적으로 경계 방화벽(Perimeter Firewall), 라우터, 무선 액세스 포인트, DHCP 서버, DNS 서버, VPN 엔드포인트상에 배포됩니다. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense는 일반적으로 경계 방화벽(Perimeter Firewall), 라우터, 무선 액세스 포인트, DHCP 서버, DNS 서버, VPN 엔드포인트상에 배포됩니다. [:octicons-home-16: 홈페이지](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=문서} diff --git a/i18n/ko/vpn.md b/i18n/ko/vpn.md index fb1ed6b1..5c7c69f3 100644 --- a/i18n/ko/vpn.md +++ b/i18n/ko/vpn.md @@ -133,7 +133,7 @@ IVPN은 [Cure53으로부터 감사](https://cure53.de/audit-report_ivpn.pdf)를 #### :material-check:{ .pg-green } 오픈 소스 클라이언트 -2020년 2월부터, [모든 IVPN 애플리케이션은 오픈 소스로 공개](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source)되었습니다. 소스 코드는 IVPN [GitHub](https://github.com/ivpn)에서 찾아볼 수 있습니다. +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). 소스 코드는 IVPN [GitHub](https://github.com/ivpn)에서 찾아볼 수 있습니다. #### :material-check:{ .pg-green } 현금 및 Monero 결제 가능 @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - WireGuard와 OpenVPN과 같은 강력한 프로토콜을 지원 - 클라이언트에 킬스위치 (Killswitch)기능이 내장되어 있음 - 멀티홉을 지원함 멀티홉은 한 노드가 공격당할 경우 데이터를 지키는데에 중요하게 사용됩니다. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **우대 사항:** diff --git a/i18n/ku-IQ/about/criteria.md b/i18n/ku-IQ/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/ku-IQ/about/criteria.md +++ b/i18n/ku-IQ/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/ku-IQ/about/index.md b/i18n/ku-IQ/about/index.md index 02032969..92aea46b 100644 --- a/i18n/ku-IQ/about/index.md +++ b/i18n/ku-IQ/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/ku-IQ/about/notices.md b/i18n/ku-IQ/about/notices.md index 9ccae1ae..d948a76a 100644 --- a/i18n/ku-IQ/about/notices.md +++ b/i18n/ku-IQ/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is not a law firm. As such, the Privacy Guides website and contri Running this website, like any human endeavor, involves uncertainty and trade-offs. We hope this website helps, but it may include mistakes and can’t address every situation. If you have any questions about your situation, we encourage you to do your own research, seek out other experts, and engage in discussions with the Privacy Guides community. If you have any legal questions, you should consult with your own legal counsel before moving forward. -Privacy Guides is an open source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Privacy Guides additionally does not warrant that this website will be constantly available, or available at all. diff --git a/i18n/ku-IQ/about/privacytools.md b/i18n/ku-IQ/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/ku-IQ/about/privacytools.md +++ b/i18n/ku-IQ/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/ku-IQ/android.md b/i18n/ku-IQ/android.md index c8e45258..e0cf37db 100644 --- a/i18n/ku-IQ/android.md +++ b/i18n/ku-IQ/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/ku-IQ/basics/common-misconceptions.md b/i18n/ku-IQ/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/ku-IQ/basics/common-misconceptions.md +++ b/i18n/ku-IQ/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/ku-IQ/cloud.md b/i18n/ku-IQ/cloud.md index 080217e7..fcfec1c5 100644 --- a/i18n/ku-IQ/cloud.md +++ b/i18n/ku-IQ/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/ku-IQ/data-redaction.md b/i18n/ku-IQ/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/ku-IQ/data-redaction.md +++ b/i18n/ku-IQ/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/ku-IQ/desktop.md b/i18n/ku-IQ/desktop.md index 79c52e75..c2b5515a 100644 --- a/i18n/ku-IQ/desktop.md +++ b/i18n/ku-IQ/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/ku-IQ/email-clients.md b/i18n/ku-IQ/email-clients.md index c02dae71..955c824d 100644 --- a/i18n/ku-IQ/email-clients.md +++ b/i18n/ku-IQ/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/ku-IQ/encryption.md b/i18n/ku-IQ/encryption.md index 61fc1aa1..dcbacc03 100644 --- a/i18n/ku-IQ/encryption.md +++ b/i18n/ku-IQ/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/ku-IQ/frontends.md b/i18n/ku-IQ/frontends.md index 20c7c858..8e12809e 100644 --- a/i18n/ku-IQ/frontends.md +++ b/i18n/ku-IQ/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/ku-IQ/multi-factor-authentication.md b/i18n/ku-IQ/multi-factor-authentication.md index c10a310f..90cb34ce 100644 --- a/i18n/ku-IQ/multi-factor-authentication.md +++ b/i18n/ku-IQ/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/ku-IQ/notebooks.md b/i18n/ku-IQ/notebooks.md index fa318b5c..37448109 100644 --- a/i18n/ku-IQ/notebooks.md +++ b/i18n/ku-IQ/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/ku-IQ/os/android-overview.md b/i18n/ku-IQ/os/android-overview.md index bffa9e33..7a79c8c5 100644 --- a/i18n/ku-IQ/os/android-overview.md +++ b/i18n/ku-IQ/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/ku-IQ/os/linux-overview.md b/i18n/ku-IQ/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/ku-IQ/os/linux-overview.md +++ b/i18n/ku-IQ/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/ku-IQ/passwords.md b/i18n/ku-IQ/passwords.md index 3cc11265..db7c95d2 100644 --- a/i18n/ku-IQ/passwords.md +++ b/i18n/ku-IQ/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/ku-IQ/productivity.md b/i18n/ku-IQ/productivity.md index de2ce413..1d7c96de 100644 --- a/i18n/ku-IQ/productivity.md +++ b/i18n/ku-IQ/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/ku-IQ/router.md b/i18n/ku-IQ/router.md index bfa8d0a3..8b814e6e 100644 --- a/i18n/ku-IQ/router.md +++ b/i18n/ku-IQ/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/ku-IQ/vpn.md b/i18n/ku-IQ/vpn.md index 1a09a323..f6c77047 100644 --- a/i18n/ku-IQ/vpn.md +++ b/i18n/ku-IQ/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/nl/about/criteria.md b/i18n/nl/about/criteria.md index a35f5f32..65a42e3c 100644 --- a/i18n/nl/about/criteria.md +++ b/i18n/nl/about/criteria.md @@ -17,7 +17,7 @@ We verdienen geen geld met het aanbevelen van bepaalde producten, we gebruiken g We passen deze prioriteiten toe bij het overwegen van nieuwe aanbevelingen: - **Secure**: Tools moeten de beste beveiligingspraktijken volgen, waar van toepassing. -- **Bronbeschikbaarheid**: Open source projecten hebben over het algemeen de voorkeur boven gelijkwaardige merkalternatieven. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We geven er meestal de voorkeur aan dat aanbevelingen cross-platform zijn, om lock-in van leveranciers te voorkomen. - **Actieve ontwikkeling**: De hulpmiddelen die wij aanbevelen moeten actief worden ontwikkeld, niet-onderhouden projecten zullen in de meeste gevallen worden verwijderd. - **Bruikbaarheid**: Tools moeten toegankelijk zijn voor de meeste computergebruikers, een al te technische achtergrond is niet vereist. diff --git a/i18n/nl/about/index.md b/i18n/nl/about/index.md index 4b80527f..6cb52690 100644 --- a/i18n/nl/about/index.md +++ b/i18n/nl/about/index.md @@ -81,7 +81,7 @@ Tot nu toe hebben we in 2023 internationale vertalingen van onze website gelance - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Bovendien hebben [veel mensen](https://github.com/privacyguides/privacyguides.org/graphs/contributors) bijgedragen aan het project. Jij kunt dat ook, we zijn open source op GitHub, en accepteren vertaalsuggesties op [Crowdin](https://crowdin.com/project/privacyguides). +Bovendien hebben [veel mensen](https://github.com/privacyguides/privacyguides.org/graphs/contributors) bijgedragen aan het project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Onze teamleden bekijken alle wijzigingen aan de website en nemen administratieve taken op zich zoals webhosting en financiën, maar zij profiteren niet persoonlijk van bijdragen aan deze site. Onze financiën worden transparant gehost door de Open Collective Foundation 501(c)(3) op [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Giften aan Privacy Guides zijn in het algemeen aftrekbaar van de belasting in de Verenigde Staten. diff --git a/i18n/nl/about/notices.md b/i18n/nl/about/notices.md index d3ff0ad2..746aa15d 100644 --- a/i18n/nl/about/notices.md +++ b/i18n/nl/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is geen advocatenkantoor. Als zodanig geven de Privacy Gidsen web Het runnen van deze website brengt, zoals elke menselijke inspanning, onzekerheid en afwegingen met zich mee. Wij hopen dat deze website helpt, maar er kunnen fouten in staan en niet elke situatie kan worden behandeld. Als je vragen hebt over jouw situatie, moedigen wij je aan jouw eigen onderzoek te doen, andere deskundigen te raadplegen en deel te nemen aan discussies met de Privacy Guides-gemeenschap. Indien je juridische vragen hebt, dien je jouw eigen juridisch adviseur te raadplegen alvorens verder te gaan. -Privacy Guides is een open source-project waaraan wordt bijgedragen onder licenties die voorwaarden bevatten die, ter bescherming van de website en de bijdragers, duidelijk maken dat het Privacy Guides-project en de website "as-is" worden aangeboden, zonder garantie, en waarin aansprakelijkheid wordt afgewezen voor schade die voortvloeit uit het gebruik van de website of de aanbevelingen die erin zijn opgenomen. Privacy Guides geeft geen garantie en doet geen uitspraken over de nauwkeurigheid, de waarschijnlijke resultaten, of de betrouwbaarheid van het gebruik van de materialen op de website of anderszins met betrekking tot dergelijke materialen op de website of op sites van derden die zijn gekoppeld aan deze site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides geeft geen garantie en doet geen uitspraken over de nauwkeurigheid, de waarschijnlijke resultaten, of de betrouwbaarheid van het gebruik van de materialen op de website of anderszins met betrekking tot dergelijke materialen op de website of op sites van derden die zijn gekoppeld aan deze site. Privacy Guides garandeert evenmin dat deze website voortdurend beschikbaar zal zijn, of helemaal niet beschikbaar zal zijn. diff --git a/i18n/nl/about/privacytools.md b/i18n/nl/about/privacytools.md index 0dea09d7..01801432 100644 --- a/i18n/nl/about/privacytools.md +++ b/i18n/nl/about/privacytools.md @@ -90,7 +90,7 @@ BurungHantu maakte ook een [twitter post](https://twitter.com/privacytoolsIO/sta Vanaf 25 september 2022 zien we de algemene plannen van BurungHantu in vervulling gaan op privacytools.io, en dat is precies de reden waarom we besloten hebben vandaag deze verklarende pagina te maken. De website die hij exploiteert lijkt een zwaar SEO-geoptimaliseerde versie te zijn van de site die hulpmiddelen aanbeveelt in ruil voor financiële compensatie. Zeer recentelijk zijn IVPN en Mullvad, twee VPN-providers die door de privacygemeenschap bijna universeel [worden aanbevolen](../vpn.md) en die bekend staan om hun stellingname tegen affiliate programma's, uit PrivacyTools verwijderd. In hun plaats? NordVPN, Surfshark, ExpressVPN, en hide.me; Gigantische VPN bedrijven met onbetrouwbare platforms en zakelijke praktijken, berucht om hun agressieve marketing en affiliate programma's. -==**PrivacyTools is precies het type site geworden waar we [voor waarschuwden](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) op de PrivacyTools blog in 2019.**== We hebben geprobeerd om sinds de overgang afstand te houden van PrivacyTools, maar hun voortdurende pesterijen jegens ons project en nu hun absurde misbruik van de geloofwaardigheid die hun merk in 6 jaar van open source bijdragen heeft verworven, is voor ons uiterst verontrustend. Degenen onder ons die daadwerkelijk voor privacy vechten, vechten niet tegen elkaar en krijgen hun advies niet van de hoogste bieder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Degenen onder ons die daadwerkelijk voor privacy vechten, vechten niet tegen elkaar en krijgen hun advies niet van de hoogste bieder. diff --git a/i18n/nl/android.md b/i18n/nl/android.md index 9832b0c4..841ba686 100644 --- a/i18n/nl/android.md +++ b/i18n/nl/android.md @@ -180,7 +180,7 @@ Google Pixel-telefoons zijn de **enige** toestellen die we aanraden om te kopen. Secure Elements zoals de Titan M2 zijn beperkter dan de Trusted Execution Environment van de processor die door de meeste andere telefoons gebruikt wordt, omdat ze alleen gebruikt worden voor geheimen opslag, hardware attestatie, en snelheidsbeperking van het invoeren van wachtwoorden, niet voor het draaien van "vertrouwde" programma's. Telefoons zonder een Secure Element moeten de TEE gebruiken voor *alle* van deze functies. Dat leidt tot een groter aanvalsoppervlak. -Google Pixel-telefoons gebruiken een TEE OS genaamd Trusty dat [open-source](https://source.android.com/security/trusty#whyTrusty) is, in tegenstelling tot veel andere telefoons. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. De installatie van GrapheneOS op een Pixel telefoon is eenvoudig met hun [web installer](https://grapheneos.org/install/web). Als je zich niet op jouw gemak voelt om het zelf te doen en bereid bent om een beetje extra geld uit te geven, kijk dan eens naar de [NitroPhone](https://shop.nitrokey.com/shop). Deze zijn voorgeladen met GrapheneOS van het gerenommeerde bedrijf [Nitrokey](https://www.nitrokey.com/about). diff --git a/i18n/nl/basics/common-misconceptions.md b/i18n/nl/basics/common-misconceptions.md index 109d7f17..b24e31bc 100644 --- a/i18n/nl/basics/common-misconceptions.md +++ b/i18n/nl/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherent veilig? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/nl/cloud.md b/i18n/nl/cloud.md index e631c9b9..2874b7c8 100644 --- a/i18n/nl/cloud.md +++ b/i18n/nl/cloud.md @@ -92,7 +92,7 @@ Ze hebben ook het Digital Trust Label ontvangen, een certificering van het [Swis Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte project in deze categorie. Het is mogelijk dat onze aanbevelingen geen of niet alle functies bevatten, maar degene die dat wel doen kunnen hoger gerangschikt worden dan andere op deze pagina. -- Clients moeten open-source zijn. +- Clients should be open source. - Clients moeten in hun geheel door een onafhankelijke derde partij worden gecontroleerd. - Moet native clients aanbieden voor Linux, Android, Windows, macOS en iOS. - Deze clients moeten integreren met native OS tools voor cloud storage providers, zoals Files app integratie op iOS, of DocumentsProvider functionaliteit op Android. diff --git a/i18n/nl/data-redaction.md b/i18n/nl/data-redaction.md index 9c20af98..39dd8ee1 100644 --- a/i18n/nl/data-redaction.md +++ b/i18n/nl/data-redaction.md @@ -55,19 +55,19 @@ Wanneer je bestanden deelt, is het belangrijk om de bijbehorende metadata te ver De metagegevens die worden gewist, hangen af van het bestandstype van de afbeelding: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources en XMP/ExtendedXMP metadata worden gewist als ze bestaan. -* **PNG**: ICC Profile, Exif en XMP metadata worden gewist als ze bestaan. -* **WebP**: ICC Profile, Exif en XMP metadata zullen worden gewist als ze bestaan. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources en XMP/ExtendedXMP metadata worden gewist als ze bestaan. +- **PNG**: ICC Profile, Exif en XMP metadata worden gewist als ze bestaan. +- **WebP**: ICC Profile, Exif en XMP metadata zullen worden gewist als ze bestaan. Na het verwerken van de afbeeldingen, geeft ExifEraser je een volledig overzicht over wat er precies uit elke afbeelding is verwijderd. De app biedt meerdere manieren om metadata uit afbeeldingen te wissen. Namelijk: -* Je kunt een afbeelding vanuit een andere toepassing delen met ExifEraser. -* Via de app zelf kan je een enkele afbeelding, meerdere afbeeldingen tegelijk of zelfs een hele map selecteren. -* Het heeft een "Camera"-optie, die de camera-app van je besturingssysteem gebruikt om een foto te maken, en vervolgens de metadata ervan verwijdert. -* Het laat je foto's uit een ander programma naar ExifEraser slepen wanneer beide programma's in split-screen modus geopend zijn. -* Als laatste kan je een afbeelding uit het klembord plakken. +- Je kunt een afbeelding vanuit een andere toepassing delen met ExifEraser. +- Via de app zelf kan je een enkele afbeelding, meerdere afbeeldingen tegelijk of zelfs een hele map selecteren. +- Het heeft een "Camera"-optie, die de camera-app van je besturingssysteem gebruikt om een foto te maken, en vervolgens de metadata ervan verwijdert. +- Het laat je foto's uit een ander programma naar ExifEraser slepen wanneer beide programma's in split-screen modus geopend zijn. +- Als laatste kan je een afbeelding uit het klembord plakken. ### Metapho (iOS) @@ -143,5 +143,5 @@ De app biedt meerdere manieren om metadata uit afbeeldingen te wissen. Namelijk: We werken aan het vaststellen van gedefinieerde criteria voor elk deel van onze site, en dit kan onderhevig zijn aan verandering. Als je vragen hebt over onze criteria, stel ze dan [op ons forum](https://discuss.privacyguides.net/latest) en neem niet aan dat we iets niet in overweging hebben genomen bij het opstellen van onze aanbevelingen als het hier niet vermeld staat. Er zijn veel factoren die worden overwogen en besproken wanneer wij een project aanbevelen, en het documenteren van elke factor is een werk in uitvoering. -- Apps ontwikkeld voor open-source besturingssystemen moeten open-source zijn. +- Apps developed for open-source operating systems must be open source. - Apps moeten gratis zijn en mogen geen advertenties of andere beperkingen bevatten. diff --git a/i18n/nl/desktop.md b/i18n/nl/desktop.md index f2270ebb..8ebf2e65 100644 --- a/i18n/nl/desktop.md +++ b/i18n/nl/desktop.md @@ -183,7 +183,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/nl/email-clients.md b/i18n/nl/email-clients.md index 11f2fc1a..c98c7874 100644 --- a/i18n/nl/email-clients.md +++ b/i18n/nl/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We raden het aan omdat er maar weinig keuzes zijn ### Minimum kwalificaties -- Apps ontwikkeld voor open-source besturingssystemen moeten open-source zijn. +- Apps developed for open-source operating systems must be open source. - Mag geen telemetrie verzamelen, of een gemakkelijke manier hebben om alle telemetrie uit te schakelen. - Moet OpenPGP-berichtversleuteling ondersteunen. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We raden het aan omdat er maar weinig keuzes zijn Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte project in deze categorie. Het is mogelijk dat onze aanbevelingen geen of niet alle functies bevatten, maar degene die dat wel doen kunnen hoger gerangschikt worden dan andere op deze pagina. -- Moet open-source zijn. +- Should be open source. - Moet cross-platform zijn. - Verzamelt standaard geen telemetrie. - Moet OpenPGP native ondersteunen, dat wil zeggen zonder extensies. diff --git a/i18n/nl/encryption.md b/i18n/nl/encryption.md index 7162f988..b902fa26 100644 --- a/i18n/nl/encryption.md +++ b/i18n/nl/encryption.md @@ -345,7 +345,7 @@ Bij het versleutelen met PGP, heb je de optie om verschillende opties te configu ### Minimum kwalificaties -- Cross-platform encryptie apps moeten open-source zijn. +- Cross-platform encryption apps must be open source. - Apps voor bestandsversleuteling moeten ontsleuteling ondersteunen op Linux, macOS en Windows. - Apps voor externe schijfversleuteling moeten ontsleuteling ondersteunen op Linux, macOS en Windows. - Interne (OS) schijfversleutelingsapps moeten platformonafhankelijk zijn of ingebouwd zijn in het besturingssysteem. diff --git a/i18n/nl/frontends.md b/i18n/nl/frontends.md index eca09f6a..705e92a4 100644 --- a/i18n/nl/frontends.md +++ b/i18n/nl/frontends.md @@ -41,7 +41,7 @@ Als je een instantie gebruikt die door iemand anders wordt beheerd, moet je het ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is een open source frontend voor de [TikTok](https://www.tiktok.com) website die ook zelf te hosten is. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. Er zijn een aantal openbare instanties, waarvan sommige instanties [Tor](https://www.torproject.org) .onion diensten ondersteunen. diff --git a/i18n/nl/multi-factor-authentication.md b/i18n/nl/multi-factor-authentication.md index d63c3c43..e35bb564 100644 --- a/i18n/nl/multi-factor-authentication.md +++ b/i18n/nl/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp Deze [vergelijkingstabel](https://www.yubico.com/store/compare/) toont de kenmerken en hoe de YubiKeys zich tot elkaar verhouden. Wij raden je ten zeerste aan om sleutels uit de YubiKey 5-serie te kiezen. -YubiKeys kunnen worden geprogrammeerd met behulp van de [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) of [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Voor het beheer van TOTP-codes kunt je de [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)gebruiken. Alle Yubico's clients zijn open source. +YubiKeys kunnen worden geprogrammeerd met behulp van de [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) of [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Voor het beheer van TOTP-codes kunt je de [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)gebruiken. All of Yubico's clients are open source. Voor modellen die HOTP en TOTP ondersteunen, zijn er 2 slots in de OTP-interface die kunnen worden gebruikt voor HOTP en 32 slots om TOTP geheimen op te slaan. Deze geheimen worden versleuteld opgeslagen op de sleutel en worden nooit blootgesteld aan de apparaten waarop ze zijn aangesloten. Zodra een "seed" ( het gedeeld geheim) aan de Yubico Authenticator is gegeven, zal deze alleen de zescijferige codes geven, maar nooit de seed. Dit beveiligingsmodel beperkt wat een aanvaller kan doen als hij een van de apparaten waarop de Yubico Authenticator draait, in gevaar brengt en maakt de YubiKey bestand tegen een fysieke aanvaller. !!! warning - De firmware van YubiKey is niet open-source en kan niet worden geüpdatet. Als je functies in nieuwere firmwareversies wilt, of als er een kwetsbaarheid is in de firmwareversie die je gebruikt, moet je een nieuwe sleutel kopen. + The firmware of YubiKey is not open source and is not updatable. Als je functies in nieuwere firmwareversies wilt, of als er een kwetsbaarheid is in de firmwareversie die je gebruikt, moet je een nieuwe sleutel kopen. ### Nitrokey @@ -58,7 +58,7 @@ Voor de modellen die HOTP en TOTP ondersteunen, zijn er 3 slots voor HOTP en 15 De Nitrokey Pro 2, Nitrokey Storage 2 en de komende Nitrokey 3 ondersteunen systeemintegriteitscontrole voor laptops met de [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, in tegenstelling tot de YubiKey. De firmware op moderne NitroKey-modellen (behalve de **NitroKey Pro 2**) kan worden bijgewerkt. +Nitrokey's firmware is open source, unlike the YubiKey. De firmware op moderne NitroKey-modellen (behalve de **NitroKey Pro 2**) kan worden bijgewerkt. ### Criteria diff --git a/i18n/nl/notebooks.md b/i18n/nl/notebooks.md index 1b8079f7..8edb0e79 100644 --- a/i18n/nl/notebooks.md +++ b/i18n/nl/notebooks.md @@ -132,7 +132,7 @@ Cryptee biedt gratis 100MB opslag, met betaalde opties als je meer nodig hebt. A We werken aan het vaststellen van gedefinieerde criteria voor elk deel van onze site, en dit kan onderhevig zijn aan verandering. Als je vragen hebt over onze criteria, stel ze dan [op ons forum](https://discuss.privacyguides.net/latest) en neem niet aan dat we iets niet in overweging hebben genomen bij het opstellen van onze aanbevelingen als het hier niet vermeld staat. Er zijn veel factoren die worden overwogen en besproken wanneer wij een project aanbevelen, en het documenteren van elke factor is een werk in uitvoering. -- Clients moeten open-source zijn. +- Clients must be open source. - Elke cloud-synchronisatiefunctionaliteit moet E2EE zijn. - Moet het exporteren van documenten naar een standaardformaat ondersteunen. diff --git a/i18n/nl/os/android-overview.md b/i18n/nl/os/android-overview.md index 06ab1d15..b4b2a506 100644 --- a/i18n/nl/os/android-overview.md +++ b/i18n/nl/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Het kiezen van een Android distributie -Wanneer je een Androidtelefoon koopt, wordt het standaardbesturingssysteem van het toestel vaak geleverd met een indringende integratie met apps en diensten die geen deel uitmaken van het [Android Open-Source Project](https://source.android.com/). Een voorbeeld hiervan zijn Google Play Services, die onherroepelijke rechten heeft om toegang te krijgen tot jouw bestanden, contactenopslag, oproeplogs, sms-berichten, locatie, camera, microfoon, hardware-identificaties, enzovoort. Deze apps en diensten vergroten het aanvalsoppervlak van jouw toestel en zijn de bron van diverse privacyproblemen met Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). Een voorbeeld hiervan zijn Google Play Services, die onherroepelijke rechten heeft om toegang te krijgen tot jouw bestanden, contactenopslag, oproeplogs, sms-berichten, locatie, camera, microfoon, hardware-identificaties, enzovoort. Deze apps en diensten vergroten het aanvalsoppervlak van jouw toestel en zijn de bron van diverse privacyproblemen met Android. Dit probleem kan worden opgelost door een aangepaste Android-distributie te gebruiken die niet met een dergelijke invasieve integratie komt. Helaas schenden veel aangepaste Android-distributies vaak het Android-beveiligingsmodel door cruciale beveiligingsfuncties zoals AVB, terugdraaibeveiliging, firmware-updates, enzovoort, niet te ondersteunen. Sommige distributies leveren ook [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds die root blootstellen via [ADB](https://developer.android.com/studio/command-line/adb) en [meer permissieve](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies vereisen om debug-functies te accommoderen, wat resulteert in een verder verhoogd aanvalsoppervlak en een verzwakt beveiligingsmodel. diff --git a/i18n/nl/os/linux-overview.md b/i18n/nl/os/linux-overview.md index b07b74f9..eaa89cea 100644 --- a/i18n/nl/os/linux-overview.md +++ b/i18n/nl/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Handhaving van [softwarevrijheid](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/nl/passwords.md b/i18n/nl/passwords.md index 0baa3684..b3554add 100644 --- a/i18n/nl/passwords.md +++ b/i18n/nl/passwords.md @@ -161,7 +161,7 @@ Bitwarden beschikt ook over de tool genaamd [Bitwarden Send](https://bitwarden.c U hebt het [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) nodig om bestanden te kunnen delen. Het gratis plan staat alleen het delen van tekst toe. -De server-side code van Bitwarden is [open-source](https://github.com/bitwarden/server), dus als je de Bitwarden-cloud niet wilt gebruiken, kunt je gemakkelijk jouw eigen Bitwarden-synchronisatieserver hosten. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is een alternatieve implementatie van de sync-server van Bitwarden, geschreven in Rust en compatibel met de officiële Bitwarden-clients, perfect voor zelf-hosting waar het draaien van de officiële resource-heavy service misschien niet ideaal is. Als je Bitwarden zelf wilt hosten op jouw eigen server, wil je vrijwel zeker Vaultwarden gebruiken in plaats van de officiële servercode van Bitwarden. @@ -239,7 +239,7 @@ Psono biedt uitgebreide documentatie voor hun product. De web-client voor Psono Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte project in deze categorie. Het is mogelijk dat onze aanbevelingen geen of niet alle functies bevatten, maar degene die dat wel doen kunnen hoger gerangschikt worden dan andere op deze pagina. - Telemetrie moet opt-in zijn (standaard uitgeschakeld) of helemaal niet worden verzameld. -- Moet open-source zijn en redelijk self-hostable. +- Should be open source and reasonably self-hostable. ## Lokale opslag diff --git a/i18n/nl/productivity.md b/i18n/nl/productivity.md index dbe42fec..0f84993e 100644 --- a/i18n/nl/productivity.md +++ b/i18n/nl/productivity.md @@ -162,11 +162,10 @@ In het algemeen definiëren wij kantoorsuites als toepassingen die voor de meest #### Minimale vereisten -- Moet open-source zijn. +- Moet open source zijn. - End-to-end versleuteling, "zero-trust", moet worden geïmplementeerd. - Moet wachtwoordbeveiligde bestanden ondersteunen. - #### Beste geval Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte project in deze categorie. Het is mogelijk dat onze aanbevelingen geen of niet alle functies bevatten, maar degene die dat wel doen kunnen hoger gerangschikt worden dan andere op deze pagina. diff --git a/i18n/nl/router.md b/i18n/nl/router.md index efd98fbf..0ddbcc28 100644 --- a/i18n/nl/router.md +++ b/i18n/nl/router.md @@ -29,7 +29,7 @@ Je kunt OpenWrt's [tabel van hardware](https://openwrt.org/toh/start) raadplegen ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is een open source, op FreeBSD gebaseerde firewall en routing platform dat veel geavanceerde functies bevat zoals traffic shaping, load balancing en VPN mogelijkheden, met nog veel meer functies beschikbaar in de vorm van plugins. OPNsense wordt gewoonlijk ingezet als perimeter firewall, router, draadloos toegangspunt, DHCP server, DNS server en VPN eindpunt. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense wordt gewoonlijk ingezet als perimeter firewall, router, draadloos toegangspunt, DHCP server, DNS server en VPN eindpunt. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentatie} diff --git a/i18n/nl/vpn.md b/i18n/nl/vpn.md index 1aab19b2..38a6e5c8 100644 --- a/i18n/nl/vpn.md +++ b/i18n/nl/vpn.md @@ -133,7 +133,7 @@ IVPN heeft een [no-logging audit ondergaan van Cure53](https://cure53.de/audit-r #### :material-check:{ .pg-green } Open-source clients -Vanaf februari 2020 zijn [IVPN-toepassingen nu open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Broncode kan worden verkregen van hun [GitHub organisatie](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Broncode kan worden verkregen van hun [GitHub organisatie](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepteert contant geld en Monero @@ -248,7 +248,7 @@ Wij eisen dat al onze aanbevolen VPN-providers OpenVPN-configuratiebestanden lev - Ondersteuning voor sterke protocollen zoals WireGuard & OpenVPN. - Killswitch ingebouwd in clients. - Multihop ondersteuning. Multihopping is belangrijk om gegevens privé te houden in het geval van een compromittering door één knooppunt. -- Als er VPN-clients worden verstrekt, moeten dat [open-source](https://en.wikipedia.org/wiki/Open_source)zijn, zoals de VPN-software die er doorgaans in is ingebouwd. Wij zijn van mening dat de beschikbaarheid van [broncode](https://en.wikipedia.org/wiki/Source_code) meer transparantie biedt over wat uw apparaat feitelijk doet. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. Wij zijn van mening dat de beschikbaarheid van [broncode](https://en.wikipedia.org/wiki/Source_code) meer transparantie biedt over wat uw apparaat feitelijk doet. **Beste geval:** diff --git a/i18n/pl/about/criteria.md b/i18n/pl/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/pl/about/criteria.md +++ b/i18n/pl/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/pl/about/index.md b/i18n/pl/about/index.md index 02032969..92aea46b 100644 --- a/i18n/pl/about/index.md +++ b/i18n/pl/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/pl/about/notices.md b/i18n/pl/about/notices.md index bac0666e..d16a70ef 100644 --- a/i18n/pl/about/notices.md +++ b/i18n/pl/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides nie jest kancelarią prawną. W związku z tym, strona internetow Prowadzenie tej strony, jak każde ludzkie przedsięwzięcie, wiąże się z niepewnością i kompromisami. Mamy nadzieję, że ta strona internetowa jest pomocna, ale może zawierać pomyłki i może nie odnosić się do każdej sytuacji. Jeśli masz jakiekolwiek pytania dotyczące swojej sytuacji, zachęcamy do przeprowadzenia własnego rozeznania, skonsultowania z innymi ekspertami oraz wzięcia udziału w dyskusjach ze społecznością Privacy Guides. Jeśli masz jakiekolwiek zapytania prawne, należy skonsultować się ze swoim własnym radcą prawnym przed podjęciem dalszych działań. -Privacy Guides to projekt o otwartym źródle współtworzony na licencjach, które zawierają warunki, które w celu ochrony strony internetowej oraz jej współtwórców, jasno stwierdzają, że projekt Privacy Guides i strona internetowa są oferowane "tak jak są", bez gwarancji oraz zrzekają się odpowiedzialności poniesionej z uwagi na szkody powstałe w wyniku korzystania ze strony internetowej oraz jakichkolwiek rekomendacji na niej zawartych. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Ponadto Privacy Guides nie gwarantuje że strona internetowa będzie dostępna cały czas lub wcale. diff --git a/i18n/pl/about/privacytools.md b/i18n/pl/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/pl/about/privacytools.md +++ b/i18n/pl/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/pl/android.md b/i18n/pl/android.md index 4132fac4..decde59b 100644 --- a/i18n/pl/android.md +++ b/i18n/pl/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/pl/basics/common-misconceptions.md b/i18n/pl/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/pl/basics/common-misconceptions.md +++ b/i18n/pl/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/pl/cloud.md b/i18n/pl/cloud.md index 280bcfca..b66beba1 100644 --- a/i18n/pl/cloud.md +++ b/i18n/pl/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/pl/data-redaction.md b/i18n/pl/data-redaction.md index 907e9754..b9ff6a6b 100644 --- a/i18n/pl/data-redaction.md +++ b/i18n/pl/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/pl/desktop.md b/i18n/pl/desktop.md index 72a2c572..7c2311dd 100644 --- a/i18n/pl/desktop.md +++ b/i18n/pl/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/pl/email-clients.md b/i18n/pl/email-clients.md index 43afca76..1703742d 100644 --- a/i18n/pl/email-clients.md +++ b/i18n/pl/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/pl/encryption.md b/i18n/pl/encryption.md index 65eaa810..ff7320e0 100644 --- a/i18n/pl/encryption.md +++ b/i18n/pl/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/pl/frontends.md b/i18n/pl/frontends.md index ffa29cb8..076afe41 100644 --- a/i18n/pl/frontends.md +++ b/i18n/pl/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/pl/multi-factor-authentication.md b/i18n/pl/multi-factor-authentication.md index c3a4a0c1..c984dc5b 100644 --- a/i18n/pl/multi-factor-authentication.md +++ b/i18n/pl/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/pl/notebooks.md b/i18n/pl/notebooks.md index e52413e0..ec790b9d 100644 --- a/i18n/pl/notebooks.md +++ b/i18n/pl/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/pl/os/android-overview.md b/i18n/pl/os/android-overview.md index 54d0f010..7d6711b7 100644 --- a/i18n/pl/os/android-overview.md +++ b/i18n/pl/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Wybór dystrybucji Androida -System Android na zakupionym telefonie często zawiera zintegrowane inwazyjne aplikacje oraz usługi, które nie są częścią [Android Open Source Project](https://source.android.com/). Jedną z nich są Usługi Google Play, która ma niezbywalne uprawnienia dostępu do Twoich plików, magazynu kontaktów, rejestru połączeń, wiadomości SMS, lokalizacji, aparatu, mikrofonu, identyfikatorów sprzętowych oraz wiele więcej. Te aplikacje i usługi zwiększają możliwości ataku na Twoje urządzenie oraz są źródłem wielu obaw związanych z prywatnością systemu Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). Jedną z nich są Usługi Google Play, która ma niezbywalne uprawnienia dostępu do Twoich plików, magazynu kontaktów, rejestru połączeń, wiadomości SMS, lokalizacji, aparatu, mikrofonu, identyfikatorów sprzętowych oraz wiele więcej. Te aplikacje i usługi zwiększają możliwości ataku na Twoje urządzenie oraz są źródłem wielu obaw związanych z prywatnością systemu Android. Ten problem można rozwiązać instalując niestandardową dystrybucję Androida, która nie zawiera tak inwazyjnej integracji. Niestety, ale wiele niestandardowych dystrybucji Androida narusza model bezpieczeństwa systemu nie wspierając funkcji bezpieczeństwa, takich jak AVB, ochrona przed cofnięciem aktualizacji, aktualizacje oprogramowania i innych. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/pl/os/linux-overview.md b/i18n/pl/os/linux-overview.md index 420e36d5..5d93086a 100644 --- a/i18n/pl/os/linux-overview.md +++ b/i18n/pl/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/pl/passwords.md b/i18n/pl/passwords.md index 9f0d6131..59d85c0c 100644 --- a/i18n/pl/passwords.md +++ b/i18n/pl/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/pl/productivity.md b/i18n/pl/productivity.md index cf365d70..c21c6754 100644 --- a/i18n/pl/productivity.md +++ b/i18n/pl/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Wymagane jest otwarte źródło. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/pl/router.md b/i18n/pl/router.md index 1aa0b66a..3d7699c5 100644 --- a/i18n/pl/router.md +++ b/i18n/pl/router.md @@ -27,10 +27,9 @@ Zapoznaj się z [listą obsługiwanych urządzeń](https://openwrt.org/toh/start !!! rekomendacja - ![pfSense logo](assets/img/router/pfsense.svg#only-light){ align=right } - ![pfSense logo](assets/img/router/pfsense-dark.svg#only-dark){ align=right } + ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - pfSense to otwarte oprogramowanie zapory sieciowej/routera bazujące na FreeBSD. Po zainstalowaniu na komputerze pełni rolę dedykowanej zapory sieciowej/routera dla sieci i wyróżnia się niezawodnością oraz oferuje funkcje, które można często znaleźć tylko w drogich zaporach sieciowych. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. Po zainstalowaniu na komputerze pełni rolę dedykowanej zapory sieciowej/routera dla sieci i wyróżnia się niezawodnością oraz oferuje funkcje, które można często znaleźć tylko w drogich zaporach sieciowych. [:octicons-home-16: Strona WWW](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Dokumentacja} diff --git a/i18n/pl/vpn.md b/i18n/pl/vpn.md index a6f3c2ab..a86b2065 100644 --- a/i18n/pl/vpn.md +++ b/i18n/pl/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/pt-BR/about/criteria.md b/i18n/pt-BR/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/pt-BR/about/criteria.md +++ b/i18n/pt-BR/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/pt-BR/about/index.md b/i18n/pt-BR/about/index.md index 02032969..92aea46b 100644 --- a/i18n/pt-BR/about/index.md +++ b/i18n/pt-BR/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/pt-BR/about/notices.md b/i18n/pt-BR/about/notices.md index a98f2b9a..807d0067 100644 --- a/i18n/pt-BR/about/notices.md +++ b/i18n/pt-BR/about/notices.md @@ -8,7 +8,7 @@ O Privacy Guides não é um escritório de advocacia. Como tal, o website do Pri A gestão deste website, como qualquer esforço humano, envolve incerteza e contrapartidas. Esperamos que este website ajude, mas pode conter erros e não pode abordar todas as situações. Se você tiver alguma dúvida sobre sua situação, incentivamos você a fazer sua própria pesquisa, procurar outros especialistas e participar de discussões com a comunidade de Privacy Guides. Se tiver quaisquer questões jurídicas, deve consultar o seu próprio consultor jurídico antes de avançar. -O Privacy Guides é um projeto de código aberto para o qual contribuíram sob licenças que incluem termos que, para protecção do website e dos seus contribuintes, tornam claro que o projeto Privacy Guides e o website é oferecido "tal como está", sem garantia, e excluindo a responsabilidade por danos resultantes da utilização do website ou quaisquer recomendações contidas no mesmo. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Além disso, Privacy Guides não garante que este site esteja constantemente disponível ou completamente disponível. diff --git a/i18n/pt-BR/about/privacytools.md b/i18n/pt-BR/about/privacytools.md index dc483628..9168e76a 100644 --- a/i18n/pt-BR/about/privacytools.md +++ b/i18n/pt-BR/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/pt-BR/android.md b/i18n/pt-BR/android.md index 9b6163cf..0c55bef5 100644 --- a/i18n/pt-BR/android.md +++ b/i18n/pt-BR/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/pt-BR/basics/common-misconceptions.md b/i18n/pt-BR/basics/common-misconceptions.md index 70e4d07a..d977e5ff 100644 --- a/i18n/pt-BR/basics/common-misconceptions.md +++ b/i18n/pt-BR/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: O software (aplicativo) de código aberto é seguro por natureza? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/pt-BR/cloud.md b/i18n/pt-BR/cloud.md index e5998d41..5726625e 100644 --- a/i18n/pt-BR/cloud.md +++ b/i18n/pt-BR/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/pt-BR/data-redaction.md b/i18n/pt-BR/data-redaction.md index 5e8cc4ad..516b1baf 100644 --- a/i18n/pt-BR/data-redaction.md +++ b/i18n/pt-BR/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/pt-BR/desktop.md b/i18n/pt-BR/desktop.md index d10d63b2..9d01b2bb 100644 --- a/i18n/pt-BR/desktop.md +++ b/i18n/pt-BR/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/pt-BR/email-clients.md b/i18n/pt-BR/email-clients.md index 0380ba9e..bd3b26df 100644 --- a/i18n/pt-BR/email-clients.md +++ b/i18n/pt-BR/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/pt-BR/encryption.md b/i18n/pt-BR/encryption.md index b4049ce9..963060e9 100644 --- a/i18n/pt-BR/encryption.md +++ b/i18n/pt-BR/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/pt-BR/frontends.md b/i18n/pt-BR/frontends.md index 17389b86..a6735b7e 100644 --- a/i18n/pt-BR/frontends.md +++ b/i18n/pt-BR/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/pt-BR/multi-factor-authentication.md b/i18n/pt-BR/multi-factor-authentication.md index f379c59a..29bfbb23 100644 --- a/i18n/pt-BR/multi-factor-authentication.md +++ b/i18n/pt-BR/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/pt-BR/notebooks.md b/i18n/pt-BR/notebooks.md index 0bcd967d..24ad2dd6 100644 --- a/i18n/pt-BR/notebooks.md +++ b/i18n/pt-BR/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/pt-BR/os/android-overview.md b/i18n/pt-BR/os/android-overview.md index bbe75118..e1a3e981 100644 --- a/i18n/pt-BR/os/android-overview.md +++ b/i18n/pt-BR/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Escolhendo uma Distribuição Android -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/pt-BR/os/linux-overview.md b/i18n/pt-BR/os/linux-overview.md index 389d377c..b3ac74ca 100644 --- a/i18n/pt-BR/os/linux-overview.md +++ b/i18n/pt-BR/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/pt-BR/passwords.md b/i18n/pt-BR/passwords.md index 31e4b0d3..a9200c48 100644 --- a/i18n/pt-BR/passwords.md +++ b/i18n/pt-BR/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** é uma implementação alternativa do servidor de sincronização do Bitwarden, escrito em Rust e compatível com os clientes oficiais do Bitwarden, perfeito para a implementação auto-hospedada em que a execução do serviço oficial com muitos recursos pode não ser ideal. Se você deseja hospedar o Bitwarden em seu próprio servidor, é quase certo que queira usar o Vaultwarden em vez do código de servidor oficial do Bitwarden. @@ -239,7 +239,7 @@ Psono fornece uma extensa documentação para seu produto. The web-client for Ps Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/pt-BR/productivity.md b/i18n/pt-BR/productivity.md index 6d0b6de5..3d57ae4d 100644 --- a/i18n/pt-BR/productivity.md +++ b/i18n/pt-BR/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Deve ser de código aberto. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Melhor Caso Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/pt-BR/router.md b/i18n/pt-BR/router.md index f6c52303..327f39ff 100644 --- a/i18n/pt-BR/router.md +++ b/i18n/pt-BR/router.md @@ -29,7 +29,7 @@ Você pode consultar a tabela [de hardware](https://openwrt.org/toh/start) do Op ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** é uma plataforma de firewall e roteamento de código aberto baseada em FreeBSD que incorpora muitos recursos avançados, como modelagem de tráfego, balanceamento de carga e recursos de VPN, com muitos outros recursos disponíveis na forma de plugins. O OPNsense é comumente implantado como um firewall de perímetro, roteador, ponto de acesso wireless, servidor DHCP, servidor DNS e endpoint de VPN. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. O OPNsense é comumente implantado como um firewall de perímetro, roteador, ponto de acesso wireless, servidor DHCP, servidor DNS e endpoint de VPN. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentação} diff --git a/i18n/pt-BR/vpn.md b/i18n/pt-BR/vpn.md index a59b18da..56cd2100 100644 --- a/i18n/pt-BR/vpn.md +++ b/i18n/pt-BR/vpn.md @@ -133,7 +133,7 @@ IVPN foi submetido a uma [auditoria de ausência de registro de dados (no-loggin #### :material-check:{ .pg-green } Clientes de Código Aberto (Open-Source) -A partir de fevereiro de 2020, [aplicativos IVPN agora são de código aberto](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). O código-fonte pode ser obtido da sua [organização (GitHub)](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). O código-fonte pode ser obtido da sua [organização (GitHub)](https://github.com/ivpn). #### :material-check:{ .pg-green } Aceita Dinheiro e Monero @@ -248,7 +248,7 @@ Exigimos que todos os nossos provedores de VPN recomendados forneçam arquivos d - Suporte para protocolos fortes, como WireGuard & OpenVPN. - Killswitch integrado aos clientes. - Suporte a Multihop. O Multihopping é importante para manter os dados privados no caso de comprometimento de um único nó. -- Se forem fornecidos clientes VPN, eles devem ser de [código aberto](https://en.wikipedia.org/wiki/Open_source), como o software VPN que eles normalmente trazem incorporado. Acreditamos que a disponibilidade do [código-fonte](https://en.wikipedia.org/wiki/Source_code) proporciona maior transparência sobre o que o seu dispositivo está realmente fazendo. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. Acreditamos que a disponibilidade do [código-fonte](https://en.wikipedia.org/wiki/Source_code) proporciona maior transparência sobre o que o seu dispositivo está realmente fazendo. **Melhor Caso:** diff --git a/i18n/pt/about/criteria.md b/i18n/pt/about/criteria.md index e2c452c9..516100dd 100644 --- a/i18n/pt/about/criteria.md +++ b/i18n/pt/about/criteria.md @@ -17,7 +17,7 @@ Não ganhamos dinheiro com a recomendação de determinados produtos, não utili Aos considerarmos novas recomendações, aplicamos as seguintes prioridades: - **Segurança**: as ferramentas devem seguir as melhores práticas de segurança, sempre que aplicável. -- **Disponibilidade da fonte**: os projetos de fonte aberta são geralmente preferidos às alternativas proprietárias equivalentes. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Multiplataforma**: normalmente, preferimos que as recomendações sejam multiplataforma, para evitar a dependência do fornecedor. - **Desenvolvimento ativo**: as ferramentas que recomendamos devem ser desenvolvidas ativamente. Os projetos que não tenham uma manutenção regular serão removidos, na maioria dos casos. - **Usabilidade**: as ferramentas devem ser acessíveis à maioria dos utilizadores de computadores, não devendo ser necessária uma formação ou conhecimento demasiado técnicos. diff --git a/i18n/pt/about/index.md b/i18n/pt/about/index.md index 189c88e3..d0835c9c 100644 --- a/i18n/pt/about/index.md +++ b/i18n/pt/about/index.md @@ -81,7 +81,7 @@ Recomendamos armazenar uma chave de recuperação local em um local seguro, em v - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Além destas pessoas, [muitas outras](https://github.com/privacyguides/privacyguides.org/graphs/contributors) deram o seu contributo para o projeto. Também poderá fazê-lo. O nosso código é aberto no GitHub e estamos a aceitar sugestões de tradução em [Crowdin](https://crowdin.com/project/privacyguides). +Além destas pessoas, [muitas outras](https://github.com/privacyguides/privacyguides.org/graphs/contributors) deram o seu contributo para o projeto. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Os membros da nossa equipa analisam todas as alterações feitas ao site e tratam das tarefas administrativas, como o alojamento Web e as finanças, sem que lucrem pessoalmente com quaisquer contribuições financeiras a este site. As nossas finanças podem ser consultadas, de forma transparente, na Open Collective Foundation 501(c)(3) em [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Os donativos para o Privacy Guides são geralmente dedutíveis nos Estados Unidos. diff --git a/i18n/pt/about/notices.md b/i18n/pt/about/notices.md index 3a1ce2c2..d6fc057b 100644 --- a/i18n/pt/about/notices.md +++ b/i18n/pt/about/notices.md @@ -8,7 +8,7 @@ O Privacy Guides não é um escritório de advocacia. Como tal, o site Privacy G Gerir este site, como qualquer outro empreendimento humano, envolve incerteza e compromissos. Esperamos que este site seja capaz de ajudar, mas ele poderá não estar isento de erros, nem tão pouco irá resolver todas as situações. Se tiver alguma dúvida sobre a questão que pretende resolver, aconselhámo-lo a fazer a sua própria pesquisa, a procurar outros especialistas e a participar em discussões com a comunidade do Privacy Guides. Se tiver alguma questão legal, deverá consultar o seu advogado, antes de dar o passo seguinte. -O Privacy Guides é um projeto de código aberto que está ao abrigo de licenças que incluem termos que, para a proteção do próprio site e dos seus colaboradores, deixam claro que o projeto Privacy Guides e o site é disponibilizado "tal como está", sem qualquer garantia, e isentando-se de responsabilidades por danos resultantes da sua utilização ou de quaisquer recomendações que possa conter. O Privacy Guides não garante ou faz quaisquer considerações relacionadas com a precisão, resultados prováveis ou fiabilidade da utilização dos materiais contidos no site, ou de qualquer outra forma de relacionamento com o site, como por exemplo materiais contidos em sites de terceiros ligados ao site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. O Privacy Guides não garante ou faz quaisquer considerações relacionadas com a precisão, resultados prováveis ou fiabilidade da utilização dos materiais contidos no site, ou de qualquer outra forma de relacionamento com o site, como por exemplo materiais contidos em sites de terceiros ligados ao site. Além disso, o Privacy Guides não garante que o seu site esteja constantemente disponível, ou até mesmo disponível. diff --git a/i18n/pt/about/privacytools.md b/i18n/pt/about/privacytools.md index a935b173..2a685ab0 100644 --- a/i18n/pt/about/privacytools.md +++ b/i18n/pt/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu, inclusive, fez uma [publicação no Twitter](https://twitter.com/pr Desde 25 de setembro de 2022, que vemos que os planos de BurungHantu se estão a concretizar em privacytools.io, motivo pelo qual decidimos criar esta página explicativa. O site que ele está a gerir parece ser uma versão altamente otimizada para SEO, que recomenda ferramentas em troca de compensação financeira. Muito recentemente, IVPN e Mullvad, dois fornecedores de VPN recorrentemente [recomendados](../vpn.md) pela comunidade de privacidade, e notáveis pela sua política contra programas afiliados, foram removidos do PrivacyTools. E no seu lugar? No seu lugar estão agora NordVPN, Surfshark, ExpressVPN e hide.me; grandes fornecedores de VPN com plataformas e práticas comerciais pouco confiáveis, conhecidas pelo marketing agressivo e programa de afiliados. -==**PrivacyTools transformou-se num tipo de site que mereceu as nossas [objeções](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the- trouble-with-vpn-and-privacy-reviews/) no blogue PrivacyTools, em 2019.**== Tentamos manter distância do PrivacyTools desde a transição, mas o contínuo assédio ao nosso projeto e o absurdo abuso da credibilidade que a marca ganhou ao longo de 6 anos de contribuições de código aberto são factos extremamente preocupantes para nós. Aqueles de nós que realmente lutam pela privacidade não estão a lutar uns contra os outros e não estão a ceder a pressões de quem paga mais. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Aqueles de nós que realmente lutam pela privacidade não estão a lutar uns contra os outros e não estão a ceder a pressões de quem paga mais. ## r/privacytoolsIO Agora diff --git a/i18n/pt/android.md b/i18n/pt/android.md index b7067509..303fa1f0 100644 --- a/i18n/pt/android.md +++ b/i18n/pt/android.md @@ -183,7 +183,7 @@ Os telemóveis Google Pixel são os **únicos dispositivos** que recomendamos pa Os Secure Elements, como o Titan M2, são mais limitados do que o Trusted Execution Environment do processador utilizado pela maioria dos outros telemóveis, uma vez que são utilizados apenas para armazenamento de segredos, atestação de hardware e limitação de taxas, e não para executar programas "de confiança". Os telemóveis sem um elemento seguro têm de utilizar o TEE para *todas* essas funções, o que resulta numa maior superfície de ataque. -Os telemóveis Google Pixel utilizam um TEE OS chamado Trusty, que é [de código aberto](https://source.android.com/security/trusty#whyTrusty), ao contrário de muitos outros telemóveis. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. A instalação do GrapheneOS num telemóvel Pixel é fácil com o seu [instalador por web](https://grapheneos.org/install/web). Se não se sentir à vontade para o fazer por si mesmo e estiver disposto a gastar um pouco mais de dinheiro, consulte o [NitroPhone](https://shop.nitrokey.com/shop), uma vez que vem pré-carregado com GrapheneOS da reputada empresa [Nitrokey](https://www.nitrokey.com/about). diff --git a/i18n/pt/basics/common-misconceptions.md b/i18n/pt/basics/common-misconceptions.md index bbde2f34..596ee474 100644 --- a/i18n/pt/basics/common-misconceptions.md +++ b/i18n/pt/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: É o software de código aberto inerentemente seguro? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/pt/cloud.md b/i18n/pt/cloud.md index 2a6f7acd..90891923 100644 --- a/i18n/pt/cloud.md +++ b/i18n/pt/cloud.md @@ -96,7 +96,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Os nossos melhores critérios representam o que gostaríamos de ver num projeto perfeito desta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/pt/data-redaction.md b/i18n/pt/data-redaction.md index 88b7f27a..377424e8 100644 --- a/i18n/pt/data-redaction.md +++ b/i18n/pt/data-redaction.md @@ -64,19 +64,19 @@ Ao partilhar ficheiros, certifique-se de que remove os metadados associados. Os The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. 17.1 e 18.1 característica GrapheneOS por rede completa [randomização MAC](https://en.wikipedia.org/wiki/MAC_address#Randomization) opção, e [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) controlo, e reinicialização automática/Wi-Fi/Bluetooth [opções de timeout](https://grapheneos.org/features). -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Imagepipe @@ -161,5 +161,5 @@ The app offers multiple ways to erase metadata from images. 17.1 e 18.1 caracter **PrivateBin** é um pastebin online minimalista e de código aberto onde o servidor tem zero conhecimento de dados colados. Os dados são criptografados/descriptografados no navegador usando AES de 256 bits. Psono suporta compartilhamento seguro de senhas, arquivos, marcadores e e-mails. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/pt/desktop.md b/i18n/pt/desktop.md index e379c803..e15aff49 100644 --- a/i18n/pt/desktop.md +++ b/i18n/pt/desktop.md @@ -186,7 +186,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/pt/email-clients.md b/i18n/pt/email-clients.md index 7704bf77..bc0f8744 100644 --- a/i18n/pt/email-clients.md +++ b/i18n/pt/email-clients.md @@ -257,7 +257,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -265,7 +265,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Os nossos melhores critérios representam o que gostaríamos de ver num projeto perfeito desta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/pt/encryption.md b/i18n/pt/encryption.md index 33d374aa..86153f2a 100644 --- a/i18n/pt/encryption.md +++ b/i18n/pt/encryption.md @@ -365,7 +365,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/pt/frontends.md b/i18n/pt/frontends.md index 54c6b1f9..a0b305b2 100644 --- a/i18n/pt/frontends.md +++ b/i18n/pt/frontends.md @@ -41,9 +41,9 @@ Quando estiver a utilizar uma instância gerida por outra pessoa, certifique-se !!! nota Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado. - ![Logótipo ProxiTok](assets/img/frontends/proxitok.svg){ align=right } + ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - O **ProxiTok** é um frontend de código aberto para o site do [TikTok](https://www.tiktok.com) que também é auto-hospedável. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. Existem várias instâncias públicas, sendo que algumas instâncias têm suporte para serviços onion [Tor](https://www.torproject.org). diff --git a/i18n/pt/multi-factor-authentication.md b/i18n/pt/multi-factor-authentication.md index 0565538b..6770c857 100644 --- a/i18n/pt/multi-factor-authentication.md +++ b/i18n/pt/multi-factor-authentication.md @@ -24,12 +24,12 @@ cover: multi-factor-authentication.webp A [tabela de comparação](https://www.yubico.com/store/compare/) compara as características dos diferentes tipos de YubiKeys. Recomendamos vivamente que selecione as chaves da série YubiKey 5. -As YubiKeys podem ser programadas utilizando o [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) ou [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Para gerir os códigos TOTP, pode utilizar o [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Todos os clientes da Yubico são de código aberto. +As YubiKeys podem ser programadas utilizando o [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) ou [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Para gerir os códigos TOTP, pode utilizar o [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. Para os modelos que suportam HOTP e TOTP, existem 2 slots na interface OTP que podem ser utilizadas para HOTP e 32 slots que permitem armazenar segredos TOTP. Estes segredos são armazenados de forma encriptada na chave e nunca são expostos aos dispositivos a que estão ligados. Uma vez que uma semente (segredo compartilhado) é dada ao Yubico Authenticator, o output só consistirá num código de seis dígitos, e nunca na semente. Este modelo de segurança ajuda a limitar o que um atacante pode fazer se comprometer um dos dispositivos que executam o Yubico Authenticator, fazendo com que a YubiKey seja resistente a um atacante físico. -!!! aviso - O firmware da YubiKey não é de código aberto e não pode ser atualizado. Se pretender novas funcionalidades ou se existir uma vulnerabilidade na versão de firmware que está a utilizar, terá de adquirir uma nova chave. +!!! warning + The firmware of YubiKey is not open source and is not updatable. Se pretender novas funcionalidades ou se existir uma vulnerabilidade na versão de firmware que está a utilizar, terá de adquirir uma nova chave. ### Nitrokey @@ -60,7 +60,7 @@ Para os modelos que suportam HOTP e TOTP, existem 3 slots para HOTP e 15 para TO A Nitrokey Pro 2, a Nitrokey Storage 2 e a futura Nitrokey 3 suportam a verificação da integridade do sistema para computadores portáteis com o firmware [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/). -O firmware da Nitrokey é de código aberto, ao contrário do YubiKey. O firmware dos modelos NitroKey modernos (exceto o **NitroKey Pro 2**) pode ser atualizado. +Nitrokey's firmware is open source, unlike the YubiKey. O firmware dos modelos NitroKey modernos (exceto o **NitroKey Pro 2**) pode ser atualizado. ### Critérios diff --git a/i18n/pt/notebooks.md b/i18n/pt/notebooks.md index 69df6457..d367612e 100644 --- a/i18n/pt/notebooks.md +++ b/i18n/pt/notebooks.md @@ -136,7 +136,7 @@ O Cryptee oferece 100MB de armazenamento gratuito, com opções pagas para o cas Estamos a trabalhar no sentido de estabelecer critérios para cada secção do nosso site, o que pode originar alterações. Se tiver alguma dúvida sobre os critérios utilizados, por favor [pergunte no nosso fórum] (https://discuss.privacyguides.net/latest) e não parta do princípio de que algo foi excluído das nossas recomendações, caso não esteja listado aqui. São muitos os fatores considerados e discutidos quando recomendamos um projeto, e documentar cada um deles é um trabalho em curso. -- Os clientes devem ser de código aberto. +- Clients must be open source. - Qualquer funcionalidade de sincronização na nuvem deve ser E2EE. - Devem suportar a exportação de documentos para um formato normalizado. diff --git a/i18n/pt/os/android-overview.md b/i18n/pt/os/android-overview.md index 52f83e16..e5f8187e 100644 --- a/i18n/pt/os/android-overview.md +++ b/i18n/pt/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/pt/os/linux-overview.md b/i18n/pt/os/linux-overview.md index 233ad564..40ffea38 100644 --- a/i18n/pt/os/linux-overview.md +++ b/i18n/pt/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/pt/passwords.md b/i18n/pt/passwords.md index 45cd866f..72586855 100644 --- a/i18n/pt/passwords.md +++ b/i18n/pt/passwords.md @@ -162,7 +162,7 @@ O Bitwarden também inclui [Bitwarden Send](https://bitwarden.com/products/send/ É necessário o [Plano Premium](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) para poder partilhar ficheiros. O plano gratuito apenas permite a partilha de texto. -O código do lado do servidor do Bitwarden é [open-source](https://github.com/bitwarden/server), por isso, se não quiser utilizar a nuvem Bitwarden, pode facilmente configurar o seu próprio servidor de sincronização Bitwarden. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **O Vaultwarden** é uma implementação alternativa do servidor de sincronização do Bitwarden, escrito em Rust, e compatível com os clientes oficiais do Bitwarden. É uma solução perfeita para uma implementação auto-hospedada, onde a execução do serviço oficial com muitos recursos pode não ser ideal. Se você está a pensar auto-hospedar o Bitwarden no seu próprio servidor, vai certamente querer usar o Vaultwarden sobre o código de servidor oficial do Bitwarden. @@ -242,7 +242,7 @@ O Psono disponibiliza uma vasta documentação sobre o seu produto. O cliente We Os nossos melhores critérios representam o que gostaríamos de ver num projeto perfeito desta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado. - A telemetria deve ser opcional (desativada por defeito) ou não deve ser recolhida de todo. -- Devem ser de fonte aberta e razoavelmente auto-hospedáveis. +- Should be open source and reasonably self-hostable. ## Armazenamento local diff --git a/i18n/pt/productivity.md b/i18n/pt/productivity.md index af057e14..7b1bfa25 100644 --- a/i18n/pt/productivity.md +++ b/i18n/pt/productivity.md @@ -62,7 +62,7 @@ A maioria das suítes de escritório online não suporta E2EE, o que significa q Em geral, definimos as plataformas de colaboração como suites completas que podem razoavelmente atuar como substitutos de plataformas de colaboração, como o Google Drive. -- Código aberto. +- Open source. - Tornam os ficheiros acessíveis através de WebDAV, a menos que tal seja impossível devido ao E2EE. - Têm clientes de sincronização para Linux, macOS e Windows. - Suportam a edição de documentos e folhas de cálculo. @@ -167,11 +167,10 @@ Em geral, definimos suites de escritório como aplicações que podem razoavelme #### Requisitos mínimos -- Devem ser de código aberto. +- Deve ser de fonte aberta. - Devem implementar uma encriptação de ponta a ponta de "confiança zero". - Devem suportar ficheiros protegidos por palavra-passe. - #### Melhor caso Os nossos melhores critérios representam o que gostaríamos de ver num projeto perfeito desta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado. diff --git a/i18n/pt/router.md b/i18n/pt/router.md index 752e45de..a310a6cd 100644 --- a/i18n/pt/router.md +++ b/i18n/pt/router.md @@ -29,9 +29,9 @@ Pode consultar a [tabela de hardware](https://openwrt.org/toh/start) do OpenWrt !!! nota Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado. - ![Logótipo OPNsense](assets/img/router/opnsense.svg){ align=right } + ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - O **OPNsense** é uma plataforma de firewall e roteamento de código aberto, baseada no FreeBSD, que incorpora muitos recursos avançados, como modelagem de tráfego, balanceamento de carga e recursos de VPN, com muitos outros recursos disponíveis na forma de plugins. O OPNsense é normalmente implementado como firewall de perímetro, router, ponto de acesso sem fio, servidor DHCP, servidor DNS e ponto terminal de VPN. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. O OPNsense é normalmente implementado como firewall de perímetro, router, ponto de acesso sem fio, servidor DHCP, servidor DNS e ponto terminal de VPN. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentação} diff --git a/i18n/pt/vpn.md b/i18n/pt/vpn.md index 9cb1537f..5195ca1c 100644 --- a/i18n/pt/vpn.md +++ b/i18n/pt/vpn.md @@ -134,7 +134,7 @@ O IVPN foi submetido a uma auditoria de não-registo [da Cure53](https://cure53. #### :material-check:{ .pg-green } Clientes de código aberto -Desde fevereiro de 2020 que as aplicações [do IVPN são de código aberto](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). O código-fonte pode ser obtido na sua página do [GitHub](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). O código-fonte pode ser obtido na sua página do [GitHub](https://github.com/ivpn). #### :material-check:{ .pg-green } Aceita dinheiro e Monero @@ -250,7 +250,7 @@ Exigimos que todos os nossos fornecedores de VPN recomendados forneçam ficheiro - Suporte para protocolos fortes, como o WireGuard e OpenVPN. - Killswitch incorporado nos clientes. - Suporte multihop. O multihopping é importante para manter os dados privados, no caso de um nó de rede ser comprometido. -- Se forem fornecidos clientes VPN, estes devem ser [de código aberto](https://en.wikipedia.org/wiki/Open_source), tal como o software VPN que geralmente têm incorporado. Acreditamos que a disponibilidade do [código-fonte](https://pt.wikipedia.org/wiki/C%C3%B3digo-fonte) proporciona uma maior transparência em relação ao que o seu dispositivo está realmente a fazer. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. Acreditamos que a disponibilidade do [código-fonte](https://pt.wikipedia.org/wiki/C%C3%B3digo-fonte) proporciona uma maior transparência em relação ao que o seu dispositivo está realmente a fazer. **Melhor caso:** diff --git a/i18n/ru/about/criteria.md b/i18n/ru/about/criteria.md index 725fca01..2930b019 100644 --- a/i18n/ru/about/criteria.md +++ b/i18n/ru/about/criteria.md @@ -17,7 +17,7 @@ title: Общие критерии Мы применяем эти приоритеты при рассмотрении новых рекомендаций: - **Безопасность**: Инструменты должны следовать лучшим практикам безопасности, где это применимо. -- **Доступность исходного кода**: Проекты с открытым исходным кодом обычно предпочтительнее, чем эквивалентные проекты с закрытым исходным кодом. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Кросс-платформенность**: Мы обычно предпочитаем, чтобы рекомендации были кросс-платформенными, чтобы избежать привязки к производителю. - **Активная разработка**: Инструменты, которые мы рекомендуем, должны активно разрабатываться, не поддерживаемые проекты в большинстве случаев будут удалены. - **Юзабилити**: Инструменты должны быть доступны большинству пользователей компьютеров, не должно требоваться чрезмерной технической подготовки. diff --git a/i18n/ru/about/index.md b/i18n/ru/about/index.md index ea61c0a8..d3f14c93 100644 --- a/i18n/ru/about/index.md +++ b/i18n/ru/about/index.md @@ -81,7 +81,7 @@ Privacy Guides был запущен в сентябре 2021 года как п - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Кроме них, [множество других людей](https://github.com/privacyguides/privacyguides.org/graphs/contributors) внесли свой вклад в проект. Вы можете тоже, у нас открытый исходный код на GitHub и мы принимаем предложения по переводу на [Crowdin](https://crowdin.com/project/privacyguides). +Кроме них, [множество других людей](https://github.com/privacyguides/privacyguides.org/graphs/contributors) внесли свой вклад в проект. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Члены нашей команды проверяют все изменения, вносимые на сайт, и выполняют административные обязанности, такие как веб-хостинг и управление финансами, однако они не получают личной прибыли от этого сайта. Наша финансовая отчетность прозрачно размещена фондом Open Collective Foundation 501(c)(3) по адресу [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Денежные пожертвования для Privacy Guides подлежат налоговым вычетам в США. diff --git a/i18n/ru/about/notices.md b/i18n/ru/about/notices.md index 19552d15..18617164 100644 --- a/i18n/ru/about/notices.md +++ b/i18n/ru/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides не является юридической организаци Работа этого сайта, как и любая другая деятельность человека, связана с неопределенностью и компромиссами. Мы надеемся, что этот ресурс поможет вам, однако он может содержать некоторые ошибки и не может охватить все ситуации. Если у вас возникли какие-либо вопросы по той или иной ситуации, мы рекомендуем вам провести своё собственное исследование, обратиться к другим экспертам и принять участие в обсуждении с сообществом PrivacyGuides. Если у вас есть какие-либо юридические вопросы, вам следует проконсультироваться с вашим собственным юристом, прежде чем двигаться дальше. -PrivacyGuides - это проект с открытым исходным кодом, созданный на основе лицензий, включающих условия, которые, в целях защиты сайта и его участников, ясно дают понять, что проект PrivacyGuides и его сайт предлагаются "как есть", без каких-либо гарантий и отказа от ответственности за ущерб, возникший в результате использования сайта или любых рекомендаций, содержащихся в нем. PrivacyGuides не гарантирует и не делает никаких заявлений о точности, возможных результатах или надежности использования материалов на сайте или иным образом связанных с такими материалами сайтах или на любых сторонних сайтах, отмеченных на данной веб-странице. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. PrivacyGuides не гарантирует и не делает никаких заявлений о точности, возможных результатах или надежности использования материалов на сайте или иным образом связанных с такими материалами сайтах или на любых сторонних сайтах, отмеченных на данной веб-странице. Кроме того, PrivacyGuides не гарантирует, что данный веб-сайт будет постоянно доступен или доступен вообще. diff --git a/i18n/ru/about/privacytools.md b/i18n/ru/about/privacytools.md index 928df548..224741fe 100644 --- a/i18n/ru/about/privacytools.md +++ b/i18n/ru/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu также опубликовал сообщение в [своём По состоянию на 25 сентября 2022 года мы видим, как планы BurungHantu воплощаются в жизнь на сайте privacytools.io, и именно по этой причине мы решили создать сегодня эту пояснительную страницу. Сайт, которым он управляет, похоже, является сильно SEO-оптимизированной версией сайта, который рекомендует инструменты в обмен на финансовую компенсацию. Совсем недавно из PrivacyTools были удалены IVPN и Mullvad, два VPN-провайдера, почти повсеместно [рекомендованные](../vpn.md) сообществом по защите конфиденциальности и известные своей позицией против партнерских программ. Ну а что взамен? NordVPN, Surfshark, ExpressVPN и hide.me; гигантские VPN-корпорации с ненадежными платформами и деловой практикой, печально известные своим агрессивным маркетингом и партнерскими программами. -==**PrivacyTools стал именно таким сайтом, от которого мы [предостерегали](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) в блоге PrivacyTools в 2019 году.**== Мы старались держаться на расстоянии от PrivacyTools с момента перехода, но их продолжающаяся травля нашего проекта, а теперь и абсурдное злоупотребление доверием к их бренду, завоеванным за 6 лет вклада в открытый исходный код, нас крайне беспокоит. Те из нас, кто действительно борется за конфиденциальность, не борются друг против друга и не получают советы от тех, кто больше заплатит. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Те из нас, кто действительно борется за конфиденциальность, не борются друг против друга и не получают советы от тех, кто больше заплатит. ## r/privacytoolsIO Сейчас diff --git a/i18n/ru/android.md b/i18n/ru/android.md index ff0159b8..2816b076 100644 --- a/i18n/ru/android.md +++ b/i18n/ru/android.md @@ -180,7 +180,7 @@ DivestOS использует F-Droid в качестве магазина пр Элементы безопасности, такие как Titan M2, более ограничены, чем процессорная Trusted Execution Environment, используемая в большинстве других телефонов, поскольку они используются только для хранения секретов, аппаратной аттестации и ограничения скорости, а не для запуска "доверенных" программ. Телефоны без защищенного элемента вынуждены использовать TEE для *всех* этих функций, что приводит к увеличению поверхности атаки. -В телефонах Google Pixel используется ОС TEE под названием Trusty, которая имеет [открытый исходный код](https://source.android.com/security/trusty#whyTrusty), в отличие от многих других телефонов. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. Установить GrapheneOS на телефон Pixel легко с помощью [веб-установщика](https://grapheneos.org/install/web). Если вам неудобно делать это самостоятельно и вы готовы потратить немного больше денег, обратите внимание на [NitroPhone](https://shop.nitrokey.com/shop), поскольку они поставляются с предустановленной GrapheneOS от авторитетной компании [Nitrokey](https://www.nitrokey.com/about). diff --git a/i18n/ru/basics/common-misconceptions.md b/i18n/ru/basics/common-misconceptions.md index 27d37e54..cc5beed5 100644 --- a/i18n/ru/basics/common-misconceptions.md +++ b/i18n/ru/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Является ли ПО с открытым исходным кодом безопасным по своей сути? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/ru/cloud.md b/i18n/ru/cloud.md index 9774954e..02ef7ad8 100644 --- a/i18n/ru/cloud.md +++ b/i18n/ru/cloud.md @@ -93,7 +93,7 @@ cover: cloud.webp Эти критерии представляют собой то, что мы хотели бы видеть от идеального проекта в этой категории. Наши рекомендации могут не соответствовать всем или нескольким из этих критериев, но проекты, которые им соответствуют, расположены выше остальных. -- Клиенты должны иметь открытый код. +- Clients should be open source. - Клиенты должны быть полностью проверены независимой третьей стороной. - Должны предлагать нативные клиенты для Linux, Android, Windows, macOS и iOS. - Эти клиенты должны интегрироваться с собственными инструментами ОС для сервисов облачных хранилищ, такими как интеграция приложения Files на iOS или функциональность DocumentsProvider на Android. diff --git a/i18n/ru/data-redaction.md b/i18n/ru/data-redaction.md index 5137fa18..76d71126 100644 --- a/i18n/ru/data-redaction.md +++ b/i18n/ru/data-redaction.md @@ -55,19 +55,19 @@ cover: data-redaction.webp Удаляемые метаданные зависят от типа файла изображения: -* **JPEG**: ICC Профиль, Exif, Photoshop Image Resources и XMP/ExtendedXMP будут удалены, если они существуют. -* **PNG**: ICC Profile, Exif и XMP будут удалены, если они существуют. -* **WebP**: ICC Profile, Exif и XMP будут удалены, если они существуют. +- **JPEG**: ICC Профиль, Exif, Photoshop Image Resources и XMP/ExtendedXMP будут удалены, если они существуют. +- **PNG**: ICC Profile, Exif и XMP будут удалены, если они существуют. +- **WebP**: ICC Profile, Exif и XMP будут удалены, если они существуют. После обработки изображений ExifEraser предоставляет вам полный отчет о том, что именно было удалено с каждого изображения. Приложение предлагает несколько способов удаления метаданных с изображений. А именно: -* С помощью ExifEraser можно поделиться изображением из другого приложения. -* В самом приложении можно выбрать одно изображение, несколько изображений сразу или даже целый каталог. -* В нем есть опция "Камера", которая использует приложение камеры вашей операционной системы для создания фотографии, а затем удаляет из нее метаданные. -* Он позволяет перетаскивать фотографии из другого приложения в ExifEraser, когда они оба открыты в режиме разделенного экрана. -* Наконец, он позволяет вставить изображение из буфера обмена. +- С помощью ExifEraser можно поделиться изображением из другого приложения. +- В самом приложении можно выбрать одно изображение, несколько изображений сразу или даже целый каталог. +- В нем есть опция "Камера", которая использует приложение камеры вашей операционной системы для создания фотографии, а затем удаляет из нее метаданные. +- Он позволяет перетаскивать фотографии из другого приложения в ExifEraser, когда они оба открыты в режиме разделенного экрана. +- Наконец, он позволяет вставить изображение из буфера обмена. ### Metapho (iOS) @@ -143,5 +143,5 @@ cover: data-redaction.webp Мы всё еще работаем над установлением критериев для каждого раздела нашего сайта, поэтому они могут поменяться в будущем. Если у вас есть вопросы по поводу наших критериев, пожалуйста, [задавайте их на нашем форуме](https://discuss.privacyguides.net/latest). Если какой-то критерий здесь не указан, это не значит, что мы его не учли. Перед тем, как рекомендовать какой-либо проект мы учитываем и обсуждаем множество факторов. Документирование этих факторов ещё не завершено. -- Приложения, разработанные для операционных систем с открытым исходным кодом, должны быть с открытым исходным кодом. +- Apps developed for open-source operating systems must be open source. - Приложения должны быть бесплатными и не должны содержать рекламы или других ограничений. diff --git a/i18n/ru/desktop.md b/i18n/ru/desktop.md index 79496a53..609de0ed 100644 --- a/i18n/ru/desktop.md +++ b/i18n/ru/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/ru/email-clients.md b/i18n/ru/email-clients.md index d62e7d1f..e3da7241 100644 --- a/i18n/ru/email-clients.md +++ b/i18n/ru/email-clients.md @@ -226,7 +226,7 @@ Canary Mail имеет закрытый исходный код. Мы реком ### Минимальные требования -- Приложения, разработанные для операционных систем с открытым исходным кодом, должны быть с открытым исходным кодом. +- Apps developed for open-source operating systems must be open source. - Не должны собирать телеметрию или должен быть простой способ её отключить. - Должны поддерживать шифрование сообщений OpenPGP. @@ -234,7 +234,7 @@ Canary Mail имеет закрытый исходный код. Мы реком Эти критерии представляют собой то, что мы хотели бы видеть от идеального проекта в этой категории. Наши рекомендации могут не соответствовать всем или нескольким из этих критериев, но проекты, которые им соответствуют, расположены выше остальных. -- Должны иметь открытый исходный код. +- Should be open source. - Должны быть кроссплатформенными. - По умолчанию не должны собирать телеметрию. - Должны нативно поддерживать OpenPGP, т.е. без расширений. diff --git a/i18n/ru/encryption.md b/i18n/ru/encryption.md index 26b22971..51a56dba 100644 --- a/i18n/ru/encryption.md +++ b/i18n/ru/encryption.md @@ -345,7 +345,7 @@ OpenPGP иногда необходим для решения специфиче ### Минимальные требования -- Кросс-платформенные приложения для шифрования должны быть с открытым исходным кодом. +- Cross-platform encryption apps must be open source. - Приложения для шифрования файлов должны поддерживать дешифрование на Linux, macOS и Windows. - Приложения для шифрования внешних дисков должны поддерживать дешифрование в Linux, macOS и Windows. - Приложения для шифрования всего диска должны быть кроссплатформенными или встроенными в операционную систему. diff --git a/i18n/ru/frontends.md b/i18n/ru/frontends.md index 7c5d7264..44876433 100644 --- a/i18n/ru/frontends.md +++ b/i18n/ru/frontends.md @@ -39,9 +39,9 @@ cover: frontends.webp !!! recommendation - ![Логотип ProxiTok](assets/img/frontends/proxitok.svg){ align=right } + ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** - это фронтенд с открытым исходным кодом для [TikTok](https://www.tiktok.com), который можно самостоятельно хостить. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. Существует ряд публичных экземпляров, причем некоторые экземпляры имеют поддержку [Tor](https://www.torproject.org). diff --git a/i18n/ru/multi-factor-authentication.md b/i18n/ru/multi-factor-authentication.md index ce5c05e7..1df4c78f 100644 --- a/i18n/ru/multi-factor-authentication.md +++ b/i18n/ru/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp [Сравнительная таблица](https://www.yubico.com/store/compare/) показывает особенности и сравнение ключей YubiKey. Мы настоятельно рекомендуем вам выбрать ключи из серии YubiKey 5. -YubiKeys можно запрограммировать с помощью [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) или [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Для управления TOTP-кодами вы можете использовать [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Все приложения Yubico имеют открытый исходный код. +YubiKeys можно запрограммировать с помощью [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) или [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Для управления TOTP-кодами вы можете использовать [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. Для моделей, поддерживающих HOTP и TOTP, в интерфейсе OTP есть 2 слота, которые можно использовать для HOTP, и 32 слота для хранения секретов TOTP. Эти секреты хранятся в зашифрованном виде на ключе и никогда не раскрывают их для устройств, к которым они подключены. После того как Yubico Authenticator получит семя (общий секрет), он будет выдавать только шестизначные коды. Секрет никогда выдаваться не будет. Эта модель безопасности помогает ограничить возможности злоумышленника, если он скомпрометирует одно из устройств, на которых работает Yubico Authenticator, и делает YubiKey устойчивым к физическому воздействию злоумышленника. -!!! warning "Осторожно" - Прошивку YubiKey нельзя обновить и для неё нет открытого исходного кода. Если вам нужны функции, которые доступны только в более новых версиях прошивки или если в используемой вами версии прошивки есть уязвимость, вам нужно будет приобрести новый ключ. +!!! warning + The firmware of YubiKey is not open source and is not updatable. Если вам нужны функции, которые доступны только в более новых версиях прошивки или если в используемой вами версии прошивки есть уязвимость, вам нужно будет приобрести новый ключ. ### Nitrokey @@ -58,7 +58,7 @@ YubiKeys можно запрограммировать с помощью [YubiKe Nitrokey Pro 2, Nitrokey Storage 2 и предстоящий Nitrokey 3 поддерживают проверку целостности системы для ноутбуков с прошивкой [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/). -В отличие от YubiKey, прошивка Nitrokey имеет открытый исходный код. Прошивка современных моделей NitroKey (кроме **NitroKey Pro 2**) является обновляемой. +Nitrokey's firmware is open source, unlike the YubiKey. Прошивка современных моделей NitroKey (кроме **NitroKey Pro 2**) является обновляемой. ### Критерии diff --git a/i18n/ru/notebooks.md b/i18n/ru/notebooks.md index 8300c0b4..8117a63f 100644 --- a/i18n/ru/notebooks.md +++ b/i18n/ru/notebooks.md @@ -132,7 +132,7 @@ Cryptee предлагает 100 МБ хранилища бесплатно, а Мы пока работаем над установлением определенных критериев для каждого раздела нашего сайта, и они могут поменяться в будущем. Если у вас есть вопросы по поводу наших критериев, пожалуйста, [задавайте их на нашем форуме](https://discuss.privacyguides.net/latest) и не думайте, что мы не учли что-то при составлении наших рекомендаций, если это не указано здесь. Мы учитываем и обсуждаем много факторов, перед тем как рекомендовать какой-то проект, и документирование каждого из них ещё не завершено. -- Приложения должны иметь открытый исходный код. +- Clients must be open source. - Облачная синхронизация должна использовать E2EE. - Должна быть поддержка экспорта документов в стандартных форматах. diff --git a/i18n/ru/os/android-overview.md b/i18n/ru/os/android-overview.md index 29598c55..4145ce44 100644 --- a/i18n/ru/os/android-overview.md +++ b/i18n/ru/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Выбор Android дистрибутива -При покупке Android телефона, стандартная операционная система часто содержит приложения и интеграции с сервисами, которые не являются частью [проекта с открытым исходным кодом Android](https://source.android.com/). Примером могут служить Google Play Services, которые имеют неотменяемые привилегии на доступ к вашим файлам, хранилищу контактов, журналам вызовов, SMS-сообщениям, местоположению, камере, микрофону, аппаратным идентификаторам и так далее. Эти приложения и службы увеличивают поверхность атаки вашего устройства и являются источником различных проблем с конфиденциальностью в Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). Примером могут служить Google Play Services, которые имеют неотменяемые привилегии на доступ к вашим файлам, хранилищу контактов, журналам вызовов, SMS-сообщениям, местоположению, камере, микрофону, аппаратным идентификаторам и так далее. Эти приложения и службы увеличивают поверхность атаки вашего устройства и являются источником различных проблем с конфиденциальностью в Android. Эта проблема может быть решена с помощью кастомного дистрибутива Android, который не имеет таких интеграций. К сожалению, многие кастомные дистрибутивы Android часто нарушают модель безопасности Android, не поддерживая критические функции безопасности, такие как AVB, защита rollback, обновления прошивки и так далее. Некоторые дистрибутивы поставляют сборки [`userdebug`](https://source.android.com/setup/build/building#choose-a-target), которые используют root с [ADB](https://developer.android.com/studio/command-line/adb) и требуют [более слабых](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) политик SELinux для активации функций отладки, что приводит к увеличенной поверхности атаки и ослабленной модели безопасности. diff --git a/i18n/ru/os/linux-overview.md b/i18n/ru/os/linux-overview.md index 86afc603..cf305475 100644 --- a/i18n/ru/os/linux-overview.md +++ b/i18n/ru/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Поддержать [свободу программного обеспечения](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/ru/passwords.md b/i18n/ru/passwords.md index 18a78b75..41861a80 100644 --- a/i18n/ru/passwords.md +++ b/i18n/ru/passwords.md @@ -161,7 +161,7 @@ Bitwarden также имеет функцию [Bitwarden Send](https://bitwarde Чтобы иметь возможность обмениваться файлами, вам необходима [Премиум-подписка](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans). Бесплатный план позволяет обмениваться только текстом. -Сервер Bitwarden имеет [открытый код](https://github.com/bitwarden/server), поэтому, если вы не хотите использовать официальное облако Bitwarden, вы можете легко развернуть свой собственный сервер для синхронизации. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** — это альтернативная реализация сервера синхронизации Bitwarden, написанная на языке Rust и совместимая с официальными клиентами Bitwarden. Она идеально подходит для самостоятельного развертывания, когда запуск официального сервиса, требующего больших мощностей, не является оправданным решением. Если вы хотите самостоятельно развернуть Bitwarden на своем сервере, скорее всего, вам стоит использовать Vaultwarden вместо официального сервера Bitwarden. @@ -239,7 +239,7 @@ Psono предоставляет подробную документацию п Эти критерии представляют собой то, что мы хотели бы видеть от идеального проекта в этой категории. Наши рекомендации могут не соответствовать всем или нескольким из этих критериев, но проекты, которые им соответствуют, расположены выше остальных. - Телеметрия должна собираться по желанию (отключена по умолчанию) или не собираться вообще. -- Исходный код должен быть открытым и пригодным для самостоятельной развёртки. +- Should be open source and reasonably self-hostable. ## Локальные сервисы diff --git a/i18n/ru/productivity.md b/i18n/ru/productivity.md index 3180d804..3cd83b89 100644 --- a/i18n/ru/productivity.md +++ b/i18n/ru/productivity.md @@ -60,7 +60,7 @@ cover: productivity.webp В целом, мы определяем платформы для совместной работы как полноценные комплексы, которые могут разумно заменить такие платформы для совместной работы, как Google Drive. -- Открытый исходный код. +- Open source. - Если E2EE не используется, то файлы должны быть доступны через WebDAV. - Имеет клиенты синхронизации для Linux, macOS и Windows. - Поддерживает редактирование документов и электронных таблиц. @@ -162,11 +162,10 @@ cover: productivity.webp #### Минимальные требования -- Должен быть с открытым исходным кодом. +- Исходный код проекта должен быть открыт. - Должно быть реализовано сквозное шифрование "с нулевым доверием". - Должен поддерживать файлы, защищенные паролем. - #### В лучшем случае Эти критерии представляют собой то, что мы хотели бы видеть от идеального проекта в этой категории. Наши рекомендации могут не соответствовать всем или нескольким из этих критериев, но проекты, которые им соответствуют, расположены выше остальных. diff --git a/i18n/ru/router.md b/i18n/ru/router.md index 5f24bd53..e1ab42c2 100644 --- a/i18n/ru/router.md +++ b/i18n/ru/router.md @@ -27,9 +27,9 @@ cover: router.webp !!! recommendation - ![Логотип OPNsense](assets/img/router/opnsense.svg){ align=right } + ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** - это система для маршрутизации и файервола с открытым исходным кодом на базе FreeBSD, которая включает в себя множество дополнительных функций, таких как формирование трафика, балансировка нагрузки и поддержку VPN, а также множество других функций, доступных в виде плагинов. OPNsense часто используется для файерволов, роутеров, беспроводных точек доступа, серверов DHCP, DNS серверов и конечных точек VPN. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense часто используется для файерволов, роутеров, беспроводных точек доступа, серверов DHCP, DNS серверов и конечных точек VPN. [:octicons-home-16: Домашняя страница](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Документация} diff --git a/i18n/ru/vpn.md b/i18n/ru/vpn.md index 41791825..ce826737 100644 --- a/i18n/ru/vpn.md +++ b/i18n/ru/vpn.md @@ -133,7 +133,7 @@ IVPN прошла [аудит отсутствия логов от Cure53](https #### :material-check:{ .pg-green } Клиенты с открытым исходным кодом -Начиная с февраля 2020 года [открыт исходный код приложений IVPN](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Исходный код можно получить из их [репозиториев на GitHub](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Исходный код можно получить из их [репозиториев на GitHub](https://github.com/ivpn). #### :material-check:{ .pg-green } Принимает наличные и Monero @@ -248,7 +248,7 @@ Mullvad очень прозрачен в отношении того, каким - Поддержка надежных протоколов, таких как WireGuard & OpenVPN. - Killswitch встроен в приложения. - Поддержка Multihop. Multihop важен для сохранения конфиденциальности данных в случае компрометации одного узла. -- Если предоставляются приложения VPN, они должны быть [с открытым исходным кодом](https://en.wikipedia.org/wiki/Open_source), как и программное обеспечение VPN, которое обычно в них встроено. Мы считаем, что доступность [исходного кода](https://en.wikipedia.org/wiki/Source_code) обеспечивает большую прозрачность в отношении того, что на самом деле делает ваше устройство. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. Мы считаем, что доступность [исходного кода](https://en.wikipedia.org/wiki/Source_code) обеспечивает большую прозрачность в отношении того, что на самом деле делает ваше устройство. **В лучшем случае:** diff --git a/i18n/sv/about/criteria.md b/i18n/sv/about/criteria.md index 883cab04..75f8b7cf 100644 --- a/i18n/sv/about/criteria.md +++ b/i18n/sv/about/criteria.md @@ -17,7 +17,7 @@ Vi tjänar inga pengar på att rekommendera vissa produkter, vi använder inga a Vi tillämpar dessa prioriteringar när vi överväger nya rekommendationer: - **Säker**: Verktyg bör följa bästa säkerhetspraxis där det är tillämpligt. -- **Källa Tillgänglighet**: Projekt med öppen källkod föredras i allmänhet framför likvärdiga proprietära alternativ. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Plattformsoberoende**: Vi föredrar vanligtvis att rekommendationerna är plattformsoberoende för att undvika leverantörslåsning. - **Aktiv utveckling**: De verktyg som vi rekommenderar bör vara aktivt utvecklade, ounderhållna projekt kommer i de flesta fall att tas bort. - **Användbarhet**: Verktyg bör vara tillgängliga för de flesta datoranvändare, en alltför teknisk bakgrund bör inte krävas. diff --git a/i18n/sv/about/index.md b/i18n/sv/about/index.md index a50f0836..c4841bd5 100644 --- a/i18n/sv/about/index.md +++ b/i18n/sv/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/sv/about/notices.md b/i18n/sv/about/notices.md index 9ccae1ae..d948a76a 100644 --- a/i18n/sv/about/notices.md +++ b/i18n/sv/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides is not a law firm. As such, the Privacy Guides website and contri Running this website, like any human endeavor, involves uncertainty and trade-offs. We hope this website helps, but it may include mistakes and can’t address every situation. If you have any questions about your situation, we encourage you to do your own research, seek out other experts, and engage in discussions with the Privacy Guides community. If you have any legal questions, you should consult with your own legal counsel before moving forward. -Privacy Guides is an open source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on the website or otherwise relating to such materials on the website or on any third-party sites linked on this site. Privacy Guides additionally does not warrant that this website will be constantly available, or available at all. diff --git a/i18n/sv/about/privacytools.md b/i18n/sv/about/privacytools.md index 35d4ce42..b10c334a 100644 --- a/i18n/sv/about/privacytools.md +++ b/i18n/sv/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu gjorde också ett twitterinlägg på [](https://twitter.com/privacyt Sedan den 25 september 2022 ser vi hur BurungHantus övergripande planer förverkligas på privacytools.io, och det är just därför som vi beslutade att skapa den här förklarande sidan idag. Den webbplats som han driver verkar vara en starkt SEO-optimerad version av den webbplats som rekommenderar verktyg i utbyte mot ekonomisk ersättning. Nyligen togs IVPN och Mullvad, två VPN-leverantörer som nästan alla rekommenderar [](../vpn.md) av integritetsgruppen och som är kända för sin inställning till affiliateprogram, bort från PrivacyTools. I deras ställe? NordVPN, Surfshark, ExpressVPN och hide.me: Stora VPN-företag med opålitliga plattformar och affärsmetoder som är ökända för sin aggressiva marknadsföring och sina affiliateprogram. -==**PrivacyTools har blivit exakt den typ av webbplats som vi [varnade för](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) på bloggen PrivacyTools 2019.**== Vi har försökt att hålla oss på avstånd från PrivacyTools sedan övergången, men deras fortsatta trakasserier mot vårt projekt och nu deras absurda missbruk av den trovärdighet som deras varumärke har fått under 6 år av bidrag till öppen källkod är extremt oroande för oss. De av oss som faktiskt kämpar för integritet kämpar inte mot varandra och får inte råd från den högstbjudande. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. De av oss som faktiskt kämpar för integritet kämpar inte mot varandra och får inte råd från den högstbjudande. ## privacyTools. io nu diff --git a/i18n/sv/android.md b/i18n/sv/android.md index 88c1aa29..bcba6227 100644 --- a/i18n/sv/android.md +++ b/i18n/sv/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/sv/basics/common-misconceptions.md b/i18n/sv/basics/common-misconceptions.md index a080465c..0fd4d28d 100644 --- a/i18n/sv/basics/common-misconceptions.md +++ b/i18n/sv/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/sv/cloud.md b/i18n/sv/cloud.md index 349bf53f..87d1d5b2 100644 --- a/i18n/sv/cloud.md +++ b/i18n/sv/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Våra kriterier för bästa fall representerar vad vi skulle vilja se av det perfekta projektet i denna kategori. Våra rekommendationer kanske inte innehåller alla eller några av dessa funktioner, men de som gör det kan vara högre rankade än andra på den här sidan. -- Klienterna bör ha öppen källkod. +- Clients should be open source. - Klienterna bör granskas i sin helhet av en oberoende tredje part. - De bör erbjuda inhemska klienter för Linux, Android, Windows, macOS och iOS. - Dessa klienter bör integreras med operativsystemets verktyg för leverantörer av molnlagring, t. ex. integrering av Files-appen i iOS eller DocumentsProvider-funktionen i Android. diff --git a/i18n/sv/data-redaction.md b/i18n/sv/data-redaction.md index f56df7b5..10b0c6ea 100644 --- a/i18n/sv/data-redaction.md +++ b/i18n/sv/data-redaction.md @@ -55,19 +55,19 @@ När du delar filer ska du se till att ta bort tillhörande metadata. Bildfiler Vilka metadata som raderas beror på bildens filtyp: -* **JPEG**: ICC-profil, Exif, Photoshop Image Resources och XMP/ExtendedXMP-metadata raderas om de finns. -* **PNG**: ICC-profil, Exif- och XMP-metadata raderas om de finns. -* **PNG**: ICC-profil, Exif- och XMP-metadata raderas om de finns. +- **JPEG**: ICC-profil, Exif, Photoshop Image Resources och XMP/ExtendedXMP-metadata raderas om de finns. +- **PNG**: ICC-profil, Exif- och XMP-metadata raderas om de finns. +- **PNG**: ICC-profil, Exif- och XMP-metadata raderas om de finns. Efter att ha behandlat bilderna ger ExifEraser dig en fullständig rapport om exakt vad som togs bort från varje bild. Appen erbjuder flera sätt att radera metadata från bilder. Namn: -* Du kan dela en bild från ett annat program med ExifEraser. -* I appen kan du välja en enda bild, flera bilder samtidigt eller till och med en hel katalog. -* Den har ett "kamera"-alternativ som använder operativsystemets kameraapp för att ta ett foto och sedan tar bort metadata från det. -* Du kan dra foton från en annan app till ExifEraser när båda är öppna i delad skärm. -* Slutligen kan du klistra in en bild från klippbordet. +- Du kan dela en bild från ett annat program med ExifEraser. +- I appen kan du välja en enda bild, flera bilder samtidigt eller till och med en hel katalog. +- Den har ett "kamera"-alternativ som använder operativsystemets kameraapp för att ta ett foto och sedan tar bort metadata från det. +- Du kan dra foton från en annan app till ExifEraser när båda är öppna i delad skärm. +- Slutligen kan du klistra in en bild från klippbordet. ### Metapho (iOS) @@ -141,5 +141,5 @@ Appen erbjuder flera sätt att radera metadata från bilder. Namn: Vi arbetar med att fastställa kriterier för varje del av vår webbplats, och detta kan komma att ändras. Om du har några frågor om våra kriterier, vänligen [fråga på vårt forum] (https://discuss.privacyguides.net/latest) och tro inte att vi inte har beaktat något när vi gjorde våra rekommendationer om det inte finns med här. Det finns många faktorer som beaktas och diskuteras när vi rekommenderar ett projekt, och att dokumentera varje enskild faktor är ett pågående arbete. -- Appar som utvecklas för operativsystem med öppen källkod måste vara med öppen källkod. +- Apps developed for open-source operating systems must be open source. - Apparna måste vara gratis och får inte innehålla annonser eller andra begränsningar. diff --git a/i18n/sv/desktop.md b/i18n/sv/desktop.md index a3bb8217..89af8e6f 100644 --- a/i18n/sv/desktop.md +++ b/i18n/sv/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/sv/email-clients.md b/i18n/sv/email-clients.md index f815317c..7ae4a764 100644 --- a/i18n/sv/email-clients.md +++ b/i18n/sv/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimikrav -- Appar som utvecklas för operativsystem med öppen källkod måste vara med öppen källkod. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Våra kriterier för bästa fall representerar vad vi skulle vilja se av det perfekta projektet i denna kategori. Våra rekommendationer kanske inte innehåller alla eller några av dessa funktioner, men de som gör det kan vara högre rankade än andra på den här sidan. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/sv/encryption.md b/i18n/sv/encryption.md index 7cfc72ca..e806e15d 100644 --- a/i18n/sv/encryption.md +++ b/i18n/sv/encryption.md @@ -343,7 +343,7 @@ Vid kryptering med PGP har du möjlighet att konfigurera olika alternativ i din ### Minimikrav -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/sv/frontends.md b/i18n/sv/frontends.md index 786111fd..dae0e426 100644 --- a/i18n/sv/frontends.md +++ b/i18n/sv/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/sv/multi-factor-authentication.md b/i18n/sv/multi-factor-authentication.md index 31a74f51..f51c811b 100644 --- a/i18n/sv/multi-factor-authentication.md +++ b/i18n/sv/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ För de modeller som stöder HOTP och TOTP finns det 3 platser för HOTP och 15 The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey firmware är öppen källkod, till skillnad från YubiKey. Den inbyggda programvaran på moderna NitroKey-modeller (utom **NitroKey Pro 2**) kan uppdateras. +Nitrokey's firmware is open source, unlike the YubiKey. Den inbyggda programvaran på moderna NitroKey-modeller (utom **NitroKey Pro 2**) kan uppdateras. ### Kriterier diff --git a/i18n/sv/notebooks.md b/i18n/sv/notebooks.md index 90e63433..2c164723 100644 --- a/i18n/sv/notebooks.md +++ b/i18n/sv/notebooks.md @@ -132,7 +132,7 @@ Cryptee erbjuder 100 Mb lagring gratis, med betalalternativ om du behöver mer. Vi arbetar med att fastställa kriterier för varje del av vår webbplats, och detta kan komma att ändras. Om du har några frågor om våra kriterier, vänligen [fråga på vårt forum] (https://discuss.privacyguides.net/latest) och tro inte att vi inte har beaktat något när vi gjorde våra rekommendationer om det inte finns med här. Det finns många faktorer som beaktas och diskuteras när vi rekommenderar ett projekt, och att dokumentera varje enskild faktor är ett pågående arbete. -- Klienterna bör ha öppen källkod. +- Clients must be open source. - Alla funktioner för molnsynkronisering måste vara E2EE. - Måste stödja export av dokument till ett standardformat. diff --git a/i18n/sv/os/android-overview.md b/i18n/sv/os/android-overview.md index 5323792a..75b455a4 100644 --- a/i18n/sv/os/android-overview.md +++ b/i18n/sv/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/sv/os/linux-overview.md b/i18n/sv/os/linux-overview.md index fbd4abb2..3d73d581 100644 --- a/i18n/sv/os/linux-overview.md +++ b/i18n/sv/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Bevara [frihet för programvara](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/sv/passwords.md b/i18n/sv/passwords.md index 8eb9d1cd..b91e118c 100644 --- a/i18n/sv/passwords.md +++ b/i18n/sv/passwords.md @@ -160,7 +160,7 @@ Bitwarden har också [Bitwarden Send](https://bitwarden.com/products/send/), vil Du behöver [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) för att kunna dela filer. Gratisabonnemanget tillåter endast textdelning. -Bitwardens kod på serversidan är [öppen källkod](https://github.com/bitwarden/server), så om du inte vill använda Bitwardens moln kan du enkelt vara värd för din egen Bitwarden-synkroniseringsserver. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** är en alternativ implementering av Bitwardens synkroniseringsserver skriven i Rust och kompatibel med officiella Bitwarden-klienter, perfekt för självhostad distribution där körning av den officiella resurstunga tjänsten kanske inte är idealisk. Om du vill vara värd för Bitwarden på din egen server, vill du nästan säkert använda Vaultwarden över Bitwardens officiella serverkod. @@ -238,7 +238,7 @@ Psono tillhandahåller omfattande dokumentation för sin produkt. Webbklienten f Våra kriterier för bästa fall representerar vad vi skulle vilja se av det perfekta projektet i denna kategori. Våra rekommendationer kanske inte innehåller alla eller några av dessa funktioner, men de som gör det kan vara högre rankade än andra på den här sidan. - Telemetri bör vara opt-in (inaktiverad som standard) eller inte samlas in alls. -- Den bör ha öppen källkod och vara någorlunda självhanterlig. +- Should be open source and reasonably self-hostable. ## Lokal lagring diff --git a/i18n/sv/productivity.md b/i18n/sv/productivity.md index ee114ce0..0af68de3 100644 --- a/i18n/sv/productivity.md +++ b/i18n/sv/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimikrav -- Must be open-source. +- Måste vara öppen källkod. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Bästa fall Våra kriterier för bästa fall representerar vad vi skulle vilja se av det perfekta projektet i denna kategori. Våra rekommendationer kanske inte innehåller alla eller några av dessa funktioner, men de som gör det kan vara högre rankade än andra på den här sidan. diff --git a/i18n/sv/router.md b/i18n/sv/router.md index 608e60da..f35ef48c 100644 --- a/i18n/sv/router.md +++ b/i18n/sv/router.md @@ -29,7 +29,7 @@ Du kan se OpenWrts [tabell över maskinvara](https://openwrt.org/toh/start) för ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** är en FreeBSD-baserad brandvägg och routningsplattform med öppen källkod som innehåller många avancerade funktioner, t.ex. trafikformning, belastningsbalansering och VPN-funktioner, med många fler funktioner som finns tillgängliga i form av tilläggsmoduler. OPNsense används vanligen som brandvägg, router, trådlös åtkomstpunkt, DHCP-server, DNS-server och VPN-slutpunkt. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense används vanligen som brandvägg, router, trådlös åtkomstpunkt, DHCP-server, DNS-server och VPN-slutpunkt. [:octicons-home-16: Homepage](https://openwrt.org){ .md-button .md-button--primary } [:octicons-info-16:](https://openwrt.org/docs/start){ .card-link title=Documentation} diff --git a/i18n/sv/vpn.md b/i18n/sv/vpn.md index 1b349283..1883f9c6 100644 --- a/i18n/sv/vpn.md +++ b/i18n/sv/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/tr/about/criteria.md b/i18n/tr/about/criteria.md index 170c0e6e..17dc9604 100644 --- a/i18n/tr/about/criteria.md +++ b/i18n/tr/about/criteria.md @@ -17,7 +17,7 @@ Belirli ürünleri tavsiye ederek para kazanmıyoruz, bağlı kuruluş bağlant Yeni önerileri değerlendirirken bu öncelikleri uygularız: - **Güvenli**: Araçlar, uygun olan her yerde en iyi güvenlik uygulamalarını takip etmelidir. -- **Kaynak Kullanılabilirliği**: Açık kaynak projeleri genellikle eşdeğer tescilli alternatiflere göre tercih edilir. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Çapraz Platform**: Satıcı kilitlenmesini önlemek için genellikle önerilerin çapraz platform olmasını tercih ederiz. - **Aktif Gelişim**: Tavsiye ettiğimiz araçlar aktif olarak geliştirilmeli, çoğu durumda sürdürülmeyen projeler kaldırılacaktır. - **Kullanılabilirlik**: Araçlar çoğu bilgisayar kullanıcısı için erişilebilir olmalı, aşırı teknik bir altyapı gerekmemelidir. diff --git a/i18n/tr/about/index.md b/i18n/tr/about/index.md index ed2e3f91..104fdeba 100644 --- a/i18n/tr/about/index.md +++ b/i18n/tr/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/tr/about/notices.md b/i18n/tr/about/notices.md index 0b61404d..ecbd02c4 100644 --- a/i18n/tr/about/notices.md +++ b/i18n/tr/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides bir hukuk firması değildir. Bu bakımdan, Privacy Guides sitesi Bu siteyi yönetmek, diğer herhangi bir insan gayreti gibi, belirsizlikler ve ödünler içermektedir. Bu web sitenin yardım etmesini umarız, ancak hatalar içerebilir ve her duruma çözüm olmayabilir. Durumunuz hakkında bir sorunuz varsa, kendi araştırmanızı yapmanızı, başka uzmanlara ulaşmanızı ve Privacy Guides topluluğu ile tartışmanızı teşvik ediyoruz. Eğer herhangi bir yasal sorunuz varsa, ilerlemeden önce kendi yasal danışmanınıza başvurmalısınız. -Gizlilik Kılavuzları (Privacy Guides), web sitesinin ve katkıda bulunanların korunması için Gizlilik Kılavuzları Projesi (Privacy Guides Project) ve web sitesinin garanti olmadan sunulduğunu açıkça ortaya koyan şartları içeren lisanslara katkıda bulunan açık kaynaklı bir projedir. Web sitesini kullanmaktan veya dahil edilen herhangi bir öneriyi kullanmaktan kaynaklanan zararlar için sorumluluk kabul etmez. Gizlilik Kılavuzları (Privacy Guides), web sitesinde veya bu sitede bağlantılı herhangi bir üçüncü taraf sitede bu tür materyallerle ilgili olarak materyallerin kullanımının doğruluğunu, olası sonuçları veya güvenilirliği ile ilgili herhangi bir beyanda bulunmaz. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Gizlilik Kılavuzları (Privacy Guides), web sitesinde veya bu sitede bağlantılı herhangi bir üçüncü taraf sitede bu tür materyallerle ilgili olarak materyallerin kullanımının doğruluğunu, olası sonuçları veya güvenilirliği ile ilgili herhangi bir beyanda bulunmaz. Gizlilik kılavuzları (Privacy Guides) ek olarak, bu web sitesinin sürekli olarak kullanılabilir veya hiç kullanılabilir olacağını garanti etmez. diff --git a/i18n/tr/about/privacytools.md b/i18n/tr/about/privacytools.md index a2732062..a2f53bd4 100644 --- a/i18n/tr/about/privacytools.md +++ b/i18n/tr/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/tr/android.md b/i18n/tr/android.md index 645566c6..da78a827 100644 --- a/i18n/tr/android.md +++ b/i18n/tr/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/tr/basics/common-misconceptions.md b/i18n/tr/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/tr/basics/common-misconceptions.md +++ b/i18n/tr/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/tr/cloud.md b/i18n/tr/cloud.md index 8d661e96..f19dd8c0 100644 --- a/i18n/tr/cloud.md +++ b/i18n/tr/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/tr/data-redaction.md b/i18n/tr/data-redaction.md index 3d4e74f2..050fdbca 100644 --- a/i18n/tr/data-redaction.md +++ b/i18n/tr/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/tr/desktop.md b/i18n/tr/desktop.md index c085e848..b64a1598 100644 --- a/i18n/tr/desktop.md +++ b/i18n/tr/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/tr/email-clients.md b/i18n/tr/email-clients.md index 56b63f1c..4a71e628 100644 --- a/i18n/tr/email-clients.md +++ b/i18n/tr/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/tr/encryption.md b/i18n/tr/encryption.md index 8feac571..363e79be 100644 --- a/i18n/tr/encryption.md +++ b/i18n/tr/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/tr/frontends.md b/i18n/tr/frontends.md index 0088089c..dab9d9c2 100644 --- a/i18n/tr/frontends.md +++ b/i18n/tr/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/tr/multi-factor-authentication.md b/i18n/tr/multi-factor-authentication.md index 9818d61e..9f4a625f 100644 --- a/i18n/tr/multi-factor-authentication.md +++ b/i18n/tr/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/tr/notebooks.md b/i18n/tr/notebooks.md index a663462a..ea56e08c 100644 --- a/i18n/tr/notebooks.md +++ b/i18n/tr/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/tr/os/android-overview.md b/i18n/tr/os/android-overview.md index 770bd7c2..db841ce4 100644 --- a/i18n/tr/os/android-overview.md +++ b/i18n/tr/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Android Dağıtımı Seçme -Bir Android telefon satın aldığınızda, cihazın varsayılan işletim sistemi genellikle [Android Açık Kaynak Projesi'nin](https://source.android.com/)parçası olmayan ve gizliliği ihlal eden uygulamalar ve hizmetlerle entegrasyonla birlikte gelir. Dosyalarınıza, rehber depolamanıza, arama kayıtlarınıza, SMS mesajlarınıza, konumunuza, kameranıza, mikrofonunuza, donanım tanımlayıcılarınıza ve benzerlerine erişmek için geri alınamaz ayrıcalıklara sahip olan Google Play Hizmetleri buna bir örnektir. Bu uygulamalar ve hizmetler cihazınızın saldırı yüzeyini artırır ve Android ile ilgili çeşitli gizlilik endişelerinin kaynağıdır. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). Dosyalarınıza, rehber depolamanıza, arama kayıtlarınıza, SMS mesajlarınıza, konumunuza, kameranıza, mikrofonunuza, donanım tanımlayıcılarınıza ve benzerlerine erişmek için geri alınamaz ayrıcalıklara sahip olan Google Play Hizmetleri buna bir örnektir. Bu uygulamalar ve hizmetler cihazınızın saldırı yüzeyini artırır ve Android ile ilgili çeşitli gizlilik endişelerinin kaynağıdır. Bu sorun, bu tür istilacı entegrasyonla gelmeyen özel bir Android dağıtımı kullanılarak çözülebilir. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/tr/os/linux-overview.md b/i18n/tr/os/linux-overview.md index 095c9bfe..069013ce 100644 --- a/i18n/tr/os/linux-overview.md +++ b/i18n/tr/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/tr/passwords.md b/i18n/tr/passwords.md index deb77f55..1d6e4174 100644 --- a/i18n/tr/passwords.md +++ b/i18n/tr/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/tr/productivity.md b/i18n/tr/productivity.md index d35b1b5a..8bdd16bf 100644 --- a/i18n/tr/productivity.md +++ b/i18n/tr/productivity.md @@ -59,7 +59,7 @@ cover: productivity.webp In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Açık Kaynak. +- Open source. - Uçtan uca şifreleme nedeniyle imkansız olmadığı sürece dosyaları WebDAV aracılığıyla erişilebilir hale getirir. - Linux, macOS ve Windows için senkronizasyon uygulamları sağlar. - Belge ve elektronik tablo düzenlemeyi destekler. @@ -161,11 +161,10 @@ Genel olarak, ofis programlarını çoğu ihtiyaç için Microsoft Word'ün yeri #### Minimum Gereksinimler -- Açık kaynak olmalıdır. +- Must be open source. - "Sıfır güven" uçtan uca şifreleme uygulamalıdır. - Parola korumalı dosyaları desteklemelidir. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/tr/router.md b/i18n/tr/router.md index 36fc5aba..0c52b5be 100644 --- a/i18n/tr/router.md +++ b/i18n/tr/router.md @@ -27,10 +27,9 @@ Cihazınızın desteklenip desteklenmediğini kontrol etmek için OpenWrt'nin [d !!! öneri - ![pfSense logo](assets/img/router/pfsense.svg#only-light){ align=right } - ![pfSense logo](assets/img/router/pfsense-dark.svg#only-dark){ align=right } + ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - pfSense; FreeBSD tabanlı, açık kaynak kodlu bir güvenlik duvarı/yönlendirici programıdır. Bir ağ için özel bir güvenlik duvarı/yönlendirici yapmak üzere bir bilgisayara kurulmuştur ve güvenilirliği, genellikle, sadece pahalı ticari güvenlik duvarlarında bulunan özellikler sunmasıyla bilinir. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. Bir ağ için özel bir güvenlik duvarı/yönlendirici yapmak üzere bir bilgisayara kurulmuştur ve güvenilirliği, genellikle, sadece pahalı ticari güvenlik duvarlarında bulunan özellikler sunmasıyla bilinir. pfSense genellikle çevre güvenlik duvarı, yönlendirici, kablosuz erişim noktası, DHCP sunucusu, DNS sunucusu ve VPN noktası olarak dağıtılır. diff --git a/i18n/tr/vpn.md b/i18n/tr/vpn.md index 3e4a0989..49da63b1 100644 --- a/i18n/tr/vpn.md +++ b/i18n/tr/vpn.md @@ -127,7 +127,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -236,7 +236,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/uk/about/criteria.md b/i18n/uk/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/uk/about/criteria.md +++ b/i18n/uk/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/uk/about/index.md b/i18n/uk/about/index.md index a7206117..43472770 100644 --- a/i18n/uk/about/index.md +++ b/i18n/uk/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/uk/about/notices.md b/i18n/uk/about/notices.md index e0e3b8a9..88fa05e7 100644 --- a/i18n/uk/about/notices.md +++ b/i18n/uk/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides не є юридичною фірмою. Таким чином, Керування цим вебсайтом, як і будь-якими людськими зусиллями, передбачає невизначеність та компроміси. Ми сподіваємося, що цей вебсайт допоможе, але він може містити помилки та не може вирішити кожну ситуацію. Якщо в вас виникли запитання щодо вашої ситуації, радимо провести власне дослідження, знайти інших експертів та взяти участь в обговореннях зі спільнотою Privacy Guides. Якщо у вас є які-небудь юридичні питання, вам слід проконсультуватися зі своїм власним юристом, перш ніж рухатись далі. -Privacy Guides-це проект з відкритим вихідним кодом, створений за ліцензіями, які включають умови, які для захисту вебсайту та його учасників чітко вказують, що проект Privacy Guides і вебсайт пропонуються "як є", без гарантій і з відмовою від відповідальності за шкоду, що виникла в результаті використання вебсайту або будь-яких рекомендацій, що містяться в ньому. Privacy Guides не гарантують і не роблять ніяких заяв щодо точності, ймовірних результатів або надійності використання матеріалів на вебсайті або іншим чином пов'язаних з такими матеріалами на вебсайті або на будь-яких сторонніх сайтах, пов'язаних з цим сайтом. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides не гарантують і не роблять ніяких заяв щодо точності, ймовірних результатів або надійності використання матеріалів на вебсайті або іншим чином пов'язаних з такими матеріалами на вебсайті або на будь-яких сторонніх сайтах, пов'язаних з цим сайтом. Крім того, Privacy Guides не гарантують, що цей вебсайт буде постійно або взагалі доступний. diff --git a/i18n/uk/about/privacytools.md b/i18n/uk/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/uk/about/privacytools.md +++ b/i18n/uk/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/uk/android.md b/i18n/uk/android.md index 192c8df0..f66c2684 100644 --- a/i18n/uk/android.md +++ b/i18n/uk/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/uk/basics/common-misconceptions.md b/i18n/uk/basics/common-misconceptions.md index 69b7d4d4..978187b1 100644 --- a/i18n/uk/basics/common-misconceptions.md +++ b/i18n/uk/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Чи безпечне програмне забезпечення з відкритим кодом за своєю суттю? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/uk/cloud.md b/i18n/uk/cloud.md index cda806a8..075d07e6 100644 --- a/i18n/uk/cloud.md +++ b/i18n/uk/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/uk/data-redaction.md b/i18n/uk/data-redaction.md index cc38aea1..fa98041f 100644 --- a/i18n/uk/data-redaction.md +++ b/i18n/uk/data-redaction.md @@ -55,19 +55,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. Namely: -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -143,5 +143,5 @@ The app offers multiple ways to erase metadata from images. Namely: We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/uk/desktop.md b/i18n/uk/desktop.md index ac1b6d40..95d99862 100644 --- a/i18n/uk/desktop.md +++ b/i18n/uk/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/uk/email-clients.md b/i18n/uk/email-clients.md index 5674c3fc..903c6486 100644 --- a/i18n/uk/email-clients.md +++ b/i18n/uk/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/uk/encryption.md b/i18n/uk/encryption.md index 9d449483..a5318550 100644 --- a/i18n/uk/encryption.md +++ b/i18n/uk/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/uk/frontends.md b/i18n/uk/frontends.md index ea86ec82..730da66b 100644 --- a/i18n/uk/frontends.md +++ b/i18n/uk/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/uk/multi-factor-authentication.md b/i18n/uk/multi-factor-authentication.md index 3f645d83..f4f12aa6 100644 --- a/i18n/uk/multi-factor-authentication.md +++ b/i18n/uk/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/uk/notebooks.md b/i18n/uk/notebooks.md index c7faf7cf..70b67139 100644 --- a/i18n/uk/notebooks.md +++ b/i18n/uk/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/uk/os/android-overview.md b/i18n/uk/os/android-overview.md index 5f764757..ef194c4f 100644 --- a/i18n/uk/os/android-overview.md +++ b/i18n/uk/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Вибір прошивки Android -Коли ви купуєте телефон Android, операційна система пристрою за замовчуванням часто постачається з інвазивною інтеграцією з додатками та службами, які не є частиною [Android Open Source Project](https://source.android.com/). Прикладом цього є служби Google Play, які мають безповоротні привілеї для доступу до ваших файлів, зберігання контактів, журналів дзвінків, SMS-повідомлень, місцезнаходження, камери, мікрофона, ідентифікаторів обладнання тощо. Ці програми та сервіси збільшують вразливість вашого пристрою до атак і є джерелом різних проблем з конфіденційністю в Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). Прикладом цього є служби Google Play, які мають безповоротні привілеї для доступу до ваших файлів, зберігання контактів, журналів дзвінків, SMS-повідомлень, місцезнаходження, камери, мікрофона, ідентифікаторів обладнання тощо. Ці програми та сервіси збільшують вразливість вашого пристрою до атак і є джерелом різних проблем з конфіденційністю в Android. Ця проблема може бути вирішена за допомогою користувацької прошивки Android, яка не постачається з такою інвазивною інтеграцією. На жаль, багато користувацьких прошивок Android часто порушують модель безпеки Android, не підтримуючи критичні функції безпеки, такі як AVB, захист від відкату, оновлення мікропрограми тощо. Деякі дистрибутиви також постачають збірки [`налагодження`](https://source.android.com/setup/build/building#choose-a-target), які надають доступ root через [ADB](https://developer.android.com/studio/command-line/adb) та потребують [більш дозвільних](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) політик SELinux для функцій налагодження, в результаті чого це призводить до збільшення поверхні атаки та ослаблення моделі безпеки. diff --git a/i18n/uk/os/linux-overview.md b/i18n/uk/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/uk/os/linux-overview.md +++ b/i18n/uk/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/uk/passwords.md b/i18n/uk/passwords.md index cc095a28..c6c34ed3 100644 --- a/i18n/uk/passwords.md +++ b/i18n/uk/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/uk/productivity.md b/i18n/uk/productivity.md index 5af49df7..9ce498ec 100644 --- a/i18n/uk/productivity.md +++ b/i18n/uk/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/uk/router.md b/i18n/uk/router.md index ffeb21d1..17d862cd 100644 --- a/i18n/uk/router.md +++ b/i18n/uk/router.md @@ -26,10 +26,9 @@ cover: router.webp !!! рекомендації - ![pfSense logo](assets/img/router/pfsense.svg#only-light){ align=right } - ![pfSense logo](assets/img/router/pfsense-dark.svg#only-dark){ align=right } + ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - pfSense - це дистрибутив програмного забезпечення для брандмауера / маршрутизатора з відкритим вихідним кодом, заснований на FreeBSD. Він встановлюється на комп'ютер для створення виділеного брандмауера/маршрутизатора для мережі та відомий своєю надійністю і пропонує функції, які часто зустрічаються тільки в дорогих комерційних брандмауерах. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. Він встановлюється на комп'ютер для створення виділеного брандмауера/маршрутизатора для мережі та відомий своєю надійністю і пропонує функції, які часто зустрічаються тільки в дорогих комерційних брандмауерах. pfSense зазвичай розгортається як брандмауер по периметру, маршрутизатор, бездротова точка доступу, DHCP-сервер, DNS-сервер і кінцева точка VPN. diff --git a/i18n/uk/vpn.md b/i18n/uk/vpn.md index 9ccb63ec..60e29f54 100644 --- a/i18n/uk/vpn.md +++ b/i18n/uk/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/vi/about/criteria.md b/i18n/vi/about/criteria.md index 7914b9bd..80fa649f 100644 --- a/i18n/vi/about/criteria.md +++ b/i18n/vi/about/criteria.md @@ -17,7 +17,7 @@ We do not make money from recommending certain products, we do not use affiliate We apply these priorities when considering new recommendations: - **Secure**: Tools should follow security best-practices wherever applicable. -- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives. +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in. - **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases. - **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required. diff --git a/i18n/vi/about/index.md b/i18n/vi/about/index.md index 6e2fadde..c6abd898 100644 --- a/i18n/vi/about/index.md +++ b/i18n/vi/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/vi/about/notices.md b/i18n/vi/about/notices.md index 8ab67371..e348dca1 100644 --- a/i18n/vi/about/notices.md +++ b/i18n/vi/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides không phải là một công ty luật. Do đó, trang web Priva Điều hành trang web này, giống như bất kỳ nỗ lực nào của con người, liên quan đến sự không chắc chắn và sự đánh đổi. Chúng tôi hy vọng trang web này hữu ích, nhưng nó có thể bao gồm các sai lầm và không thể giải quyết mọi tình huống. Nếu bạn có bất kỳ câu hỏi nào về tình huống của mình, chúng tôi khuyến khích bạn tự nghiên cứu, tìm kiếm các chuyên gia khác và tham gia thảo luận với cộng đồng Privacy Guides. Nếu quý vị có bất kỳ câu hỏi pháp lý nào, quý vị nên tham khảo ý kiến của luật sư riêng của mình trước khi tiếp tục. -Privacy Guides là một dự án nguồn mở được đóng góp theo giấy phép bao gồm các điều khoản, để bảo vệ trang web và những người đóng góp của trang web, nêu rõ rằng dự án và trang web của Privacy Guides được cung cấp "nguyên trạng", không có bảo hành và từ chối trách nhiệm pháp lý đối với các thiệt hại do sử dụng trang web hoặc bất kỳ khuyến nghị nào có trong đó. Privacy Guides không bảo đảm hoặc đưa ra bất kỳ tuyên bố nào liên quan đến tính chính xác, kết quả có thể hoặc độ tin cậy của việc sử dụng các tài liệu trên trang web hoặc liên quan đến các tài liệu đó trên trang web hoặc trên bất kỳ trang web của bên thứ ba nào được liên kết trên trang web này. +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. Privacy Guides không bảo đảm hoặc đưa ra bất kỳ tuyên bố nào liên quan đến tính chính xác, kết quả có thể hoặc độ tin cậy của việc sử dụng các tài liệu trên trang web hoặc liên quan đến các tài liệu đó trên trang web hoặc trên bất kỳ trang web của bên thứ ba nào được liên kết trên trang web này. Ngoài ra, Privacy Guides không đảm bảo rằng trang web này sẽ liên tục khả dụng hoặc có sẵn. diff --git a/i18n/vi/about/privacytools.md b/i18n/vi/about/privacytools.md index 515c21f5..512ebb93 100644 --- a/i18n/vi/about/privacytools.md +++ b/i18n/vi/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now diff --git a/i18n/vi/android.md b/i18n/vi/android.md index f06be281..ffcd3231 100644 --- a/i18n/vi/android.md +++ b/i18n/vi/android.md @@ -178,7 +178,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/vi/basics/common-misconceptions.md b/i18n/vi/basics/common-misconceptions.md index be1928f0..507ce025 100644 --- a/i18n/vi/basics/common-misconceptions.md +++ b/i18n/vi/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: Is open source software inherently secure? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/vi/cloud.md b/i18n/vi/cloud.md index 1804aeff..e4bbf47f 100644 --- a/i18n/vi/cloud.md +++ b/i18n/vi/cloud.md @@ -98,7 +98,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Clients should be open-source. +- Clients should be open source. - Clients should be audited in their entirety by an independent third-party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. diff --git a/i18n/vi/data-redaction.md b/i18n/vi/data-redaction.md index aefdea89..3df816b5 100644 --- a/i18n/vi/data-redaction.md +++ b/i18n/vi/data-redaction.md @@ -58,19 +58,19 @@ When sharing files, be sure to remove associated metadata. Image files commonly The metadata that is erased depends on the image's file type: -* **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. -* **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. -* **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **JPEG**: ICC Profile, Exif, Photoshop Image Resources and XMP/ExtendedXMP metadata will be erased if it exists. +- **PNG**: ICC Profile, Exif and XMP metadata will be erased if it exists. +- **WebP**: ICC Profile, Exif and XMP metadata will be erased if it exists. After processing the images, ExifEraser provides you with a full report about what exactly was removed from each image. The app offers multiple ways to erase metadata from images. chú ý -* You can share an image from another application with ExifEraser. -* Through the app itself, you can select a single image, multiple images at once, or even an entire directory. -* It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. -* It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. -* Lastly, it allows you to paste an image from your clipboard. +- You can share an image from another application with ExifEraser. +- Through the app itself, you can select a single image, multiple images at once, or even an entire directory. +- It features a "Camera" option, which uses your operating system's camera app to take a photo, and then it removes the metadata from it. +- It allows you to drag photos from another app into ExifEraser when they are both open in split-screen mode. +- Lastly, it allows you to paste an image from your clipboard. ### Metapho (iOS) @@ -151,5 +151,5 @@ The app offers multiple ways to erase metadata from images. chú ý - [:fontawesome-brands-docker: Dockerhub](https://hub.docker.com/r/vaultwarden/server) - [:fontawesome-brands-github: Mã nguồn](https://github.com/dani-garcia/vaultwarden) -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Apps must be free and should not include ads or other limitations. diff --git a/i18n/vi/desktop.md b/i18n/vi/desktop.md index d7df802c..ba6578c5 100644 --- a/i18n/vi/desktop.md +++ b/i18n/vi/desktop.md @@ -179,7 +179,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/vi/email-clients.md b/i18n/vi/email-clients.md index 7948a22b..db482c9f 100644 --- a/i18n/vi/email-clients.md +++ b/i18n/vi/email-clients.md @@ -228,7 +228,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- Apps developed for open-source operating systems must be open-source. +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -236,7 +236,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/vi/encryption.md b/i18n/vi/encryption.md index 7ba137e4..4e2fb246 100644 --- a/i18n/vi/encryption.md +++ b/i18n/vi/encryption.md @@ -343,7 +343,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/vi/frontends.md b/i18n/vi/frontends.md index 4143e29d..608506ed 100644 --- a/i18n/vi/frontends.md +++ b/i18n/vi/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/vi/multi-factor-authentication.md b/i18n/vi/multi-factor-authentication.md index 81114c9b..047c115d 100644 --- a/i18n/vi/multi-factor-authentication.md +++ b/i18n/vi/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Framadate diff --git a/i18n/vi/notebooks.md b/i18n/vi/notebooks.md index 100657ea..a5343739 100644 --- a/i18n/vi/notebooks.md +++ b/i18n/vi/notebooks.md @@ -126,7 +126,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si - [:fontawesome-brands-docker: Dockerhub](https://hub.docker.com/r/vaultwarden/server) - [:fontawesome-brands-github: Mã nguồn](https://github.com/dani-garcia/vaultwarden) -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/vi/os/android-overview.md b/i18n/vi/os/android-overview.md index 40419033..d32a2ab2 100644 --- a/i18n/vi/os/android-overview.md +++ b/i18n/vi/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### Choosing an Android Distribution -When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open-Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). An example of such is Google Play Services, which has irrevocable privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, hardware identifiers, and so on. These apps and services increase the attack surface of your device and are the source of various privacy concerns with Android. This problem could be solved by using a custom Android distribution that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model. diff --git a/i18n/vi/os/linux-overview.md b/i18n/vi/os/linux-overview.md index 656f95a8..7f97bf43 100644 --- a/i18n/vi/os/linux-overview.md +++ b/i18n/vi/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/vi/passwords.md b/i18n/vi/passwords.md index 3f62a1a8..63723fdf 100644 --- a/i18n/vi/passwords.md +++ b/i18n/vi/passwords.md @@ -171,7 +171,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -255,7 +255,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/vi/productivity.md b/i18n/vi/productivity.md index 34391f0d..a93a8a3d 100644 --- a/i18n/vi/productivity.md +++ b/i18n/vi/productivity.md @@ -66,7 +66,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- Open-source. +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -180,11 +180,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- Must be open-source. +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/vi/router.md b/i18n/vi/router.md index 49203a50..594ed768 100644 --- a/i18n/vi/router.md +++ b/i18n/vi/router.md @@ -26,10 +26,9 @@ Bạn có thể tham khảo OpenWrt's [table of hardware](https://openwrt.org/to !!! khuyến nghị - ![pfSense logo](assets/img/router/pfsense.svg#only-light){ align=right } - ![pfSense logo](assets/img/router/pfsense-dark.svg#only-dark){ align=right } + ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - pfSense là một bản phân phối phần mềm máy tính tường lửa/bộ định tuyến mã nguồn mở dựa trên FreeBSD. Nó được cài đặt trên máy tính để làm tường lửa/bộ định tuyến chuyên dụng cho mạng và được chú ý về độ tin cậy và cung cấp các tính năng thường chỉ có trong các tường lửa thương mại đắt tiền. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. Nó được cài đặt trên máy tính để làm tường lửa/bộ định tuyến chuyên dụng cho mạng và được chú ý về độ tin cậy và cung cấp các tính năng thường chỉ có trong các tường lửa thương mại đắt tiền. pfSense thường được triển khai dưới dạng tường lửa vành đai, bộ định tuyến, điểm truy cập không dây, máy chủ DHCP, máy chủ DNS và điểm cuối VPN. diff --git a/i18n/vi/vpn.md b/i18n/vi/vpn.md index d1c65ec2..d42ce93a 100644 --- a/i18n/vi/vpn.md +++ b/i18n/vi/vpn.md @@ -133,7 +133,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -248,7 +248,7 @@ We require all our recommended VPN providers to provide OpenVPN configuration fi - Support for strong protocols such as WireGuard & OpenVPN. - Killswitch built in to clients. - Multihop support. Multihopping is important to keep data private in case of a single node compromise. -- If VPN clients are provided, they should be [open-source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what your device is actually doing. **Best Case:** diff --git a/i18n/zh-Hant/about/criteria.md b/i18n/zh-Hant/about/criteria.md index 34533319..0e52cfa9 100644 --- a/i18n/zh-Hant/about/criteria.md +++ b/i18n/zh-Hant/about/criteria.md @@ -17,7 +17,7 @@ title: 通用標準 我們在考慮新建議時應用這些優先事項: - **安全**:工具應在合適的地方遵循安全的最佳做法。 -- **源代碼可取得**:開源專案通常比同等商用替代方案更受歡迎。 +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **跨平臺**:我們通常傾向於建議跨平臺,以避免供應商鎖定。 - **積極開發**:我們建議的工具應該積極開發,在大多數情況下,未維護的項目將被移除。 - **可用性**:工具應可讓大多數電腦使用者使用,無需要求過度的技術背景。 diff --git a/i18n/zh-Hant/about/index.md b/i18n/zh-Hant/about/index.md index 23facc64..0d2089bf 100644 --- a/i18n/zh-Hant/about/index.md +++ b/i18n/zh-Hant/about/index.md @@ -81,7 +81,7 @@ Privacy Guides 於2021年9月推出,是 [已解散的](privacytools.md) "Priva - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -此外, [許多人](https://github.com/privacyguides/privacyguides.org/graphs/contributors) 為本專案做出了貢獻。 您也可以,在 GitHub 或 [Crowdin](https://crowdin.com/project/privacyguides)提出翻譯建議。 +此外, [許多人](https://github.com/privacyguides/privacyguides.org/graphs/contributors) 為本專案做出了貢獻。 You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). 團隊成員會審查對網站所做的所有更改,並處理網站託管和財務等管理職責,但他們不會從對本網站的任何貢獻中獲利。 我們的財務資料由 Open Collective Foundation 501 (c) (3) 透過 [opencollective.com/privacyguides](https://opencollective.com/privacyguides)透明地託管。 在美國,對 Privacy Guides 捐贈通常可以減稅。 diff --git a/i18n/zh-Hant/about/notices.md b/i18n/zh-Hant/about/notices.md index 98962467..a981b702 100644 --- a/i18n/zh-Hant/about/notices.md +++ b/i18n/zh-Hant/about/notices.md @@ -8,7 +8,7 @@ Privacy Guides 不是律師事務所。 因此,Privacy Guides 網站和貢獻 運行這個網站,就像任何人的努力一樣,涉及不確定性和權衡。 我們希望這個網站有幫助,但它可能包含錯誤,並不能解決所有情況。 如果您對自己的情況有任何疑問,我們鼓勵您進行自己的研究,尋找其他專家,並與隱私指南社區進行討論。 如果您有任何法律問題,應該繼續前進之前諮詢自己的法律顧問。 -Privacy Guides 是一個開放原始碼專案,貢獻有授權保護,包括保護網站及其貢獻者,明確表示 Privacy Guides 專案和網站是“按原樣”提供的,不提供擔保,對因使用本網站或內部包含的任何建議而造成的損害不承擔責任。 關於網站上材料以及第三方網站上連接本網站的準確性、可能的結果或可靠性 ,Privacy Guides 不作擔保或也不代表這些產品服務。 +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. 關於網站上材料以及第三方網站上連接本網站的準確性、可能的結果或可靠性 ,Privacy Guides 不作擔保或也不代表這些產品服務。 此外,Privacy Guides 不保證本網站將長期或永遠可用。 diff --git a/i18n/zh-Hant/about/privacytools.md b/i18n/zh-Hant/about/privacytools.md index 9d2fe927..b05857dd 100644 --- a/i18n/zh-Hant/about/privacytools.md +++ b/i18n/zh-Hant/about/privacytools.md @@ -77,7 +77,7 @@ BurungHantu 還發布一篇 [推特帖子](https://twitter.com/privacytoolsIO/st 截至 2022年9月25日,我們看到 BurungHantu 全部的打算都出現在privacytools.io ,因此我們決定創建這個解釋頁面。 他經營的網站似乎是重度 SEO 優化版本,以推薦工具來換取經濟補償。 最近 IVPN 和 Mullvad,這兩家受到隱私社群近乎一致[推薦](../vpn.md)的 VPN 供應商,因長期反對推薦人優惠回扣而受瞩目,卻遭到 PrivacyTools 的刪除。 在他们的位置上? NordVPN、Surfshark、ExpressVPN 和 hide.me ;不值得信任的平臺和商業實踐的巨型 VPN 公司,以積極的營銷和推廣折扣而臭名昭著。 -==**PrivacyTools 已成為我們 [過去在2019年 PrivacyTools 部落格所警告](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) 的網站類型。**== 自過渡以來一直試圖與 PrivacyTools 保持距離,但他們對我們項目持續騷擾,現在他們荒謬地濫用原品牌在6年來獲得的可信度開源貢獻,這實在非常令人不安。 我們這些為隱私而戰的人並不是在互相爭鬥,也沒有從出價最高者那裡取得建議。 +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. 我們這些為隱私而戰的人並不是在互相爭鬥,也沒有從出價最高者那裡取得建議。 ## r/privacytoolsIO Now diff --git a/i18n/zh-Hant/android.md b/i18n/zh-Hant/android.md index fd76b109..80556af4 100644 --- a/i18n/zh-Hant/android.md +++ b/i18n/zh-Hant/android.md @@ -180,7 +180,7 @@ Google Pixel 是**唯一** 推薦的手機。 由於對第三方作業系統的 Titan M2 這類安全元件比大多數其他手機處理器的可信執行環境更為有限,因為Titan M2 只用於秘密存儲、硬體證明和速率限制,而不是用於運行 "可信 "程式。 沒有安全元件的手機必須使用 TEE *執行所有這些功能* ,從而導致更大的攻擊面。 -Google Pixel 手機使用名為Trusty 的 TEE 作業系統,它是 [開源](https://source.android.com/security/trusty#whyTrusty),與其他許多手機不同。 +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. Pixel 手機很容易安裝 GrapheneOS 只需依其 [網頁安裝程式](https://grapheneos.org/install/web)即可。 如果不敢自行安裝願意多花一點錢,可以看看 [NitroPhone](https://shop.nitrokey.com/shop) ,它們預裝 GrapheneOS,來自著名的 [Nitrokey](https://www.nitrokey.com/about) 公司。 diff --git a/i18n/zh-Hant/basics/common-misconceptions.md b/i18n/zh-Hant/basics/common-misconceptions.md index fb171e37..c46bd16f 100644 --- a/i18n/zh-Hant/basics/common-misconceptions.md +++ b/i18n/zh-Hant/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: 開源軟件本質上安全嗎? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/zh-Hant/cloud.md b/i18n/zh-Hant/cloud.md index f8fb36a6..3e272052 100644 --- a/i18n/zh-Hant/cloud.md +++ b/i18n/zh-Hant/cloud.md @@ -92,7 +92,7 @@ Tresorit 已獲得多項獨立安全稽核: 最佳案例標準代表了我們希望從這個類別的完美項目應具備的條件。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 -- 客戶端應是開源的。 +- Clients should be open source. - 客戶端軟體應由獨立的第三方進行全面審計。 - 應提供 Linux、Android、Windows、macOS 和 iOS 的原生客戶端。 - 這些用戶端應與雲端儲存供應商的原生作業系統工具整合,例如整合 iOS 的 Files app,或 Android 的 DocumentsProvider 功能。 diff --git a/i18n/zh-Hant/data-redaction.md b/i18n/zh-Hant/data-redaction.md index ba3cdae6..9d415dc0 100644 --- a/i18n/zh-Hant/data-redaction.md +++ b/i18n/zh-Hant/data-redaction.md @@ -55,19 +55,19 @@ cover: data-redaction.webp 被清除的元資料取決於影像的檔案類型: -* **JPEG**:可清除 ICC Profile、Exif、Photoshop Image Resources 和 XMP/ExtendedXMP 等中繼資料。 -* **PNG**:可清除 ICC Profile、Exif和XMP等中繼資料。 -* **WebP**: 可清除 ICC Profile、Exif 和XMP 等中繼資料。 +- **JPEG**:可清除 ICC Profile、Exif、Photoshop Image Resources 和 XMP/ExtendedXMP 等中繼資料。 +- **PNG**:可清除 ICC Profile、Exif和XMP等中繼資料。 +- **WebP**: 可清除 ICC Profile、Exif 和XMP 等中繼資料。 處理完影像後, ExifEraser會為您提供一份完整的報告,說明每張影像中究竟刪除了哪些內容。 該應用程式提供了多種方式來清除圖像中的中繼數據。 亦即: -* 您可以使用 ExifEraser 分享其他應用程序的圖像。 -* 通過應用程序本身,可以一次選擇單個圖像,多個圖像,甚至是整個目錄。 -* 它具有“相機”選項,該選項使用操作系統的相機應用程序拍攝照片,然後從中刪除中繼數據。 -* 在應用分屏模式下,它可以從另一個應用程式拖放圖片到 ExifEraser 。 -* 最後,它允許您從剪貼板黏貼圖像。 +- 您可以使用 ExifEraser 分享其他應用程序的圖像。 +- 通過應用程序本身,可以一次選擇單個圖像,多個圖像,甚至是整個目錄。 +- 它具有“相機”選項,該選項使用操作系統的相機應用程序拍攝照片,然後從中刪除中繼數據。 +- 在應用分屏模式下,它可以從另一個應用程式拖放圖片到 ExifEraser 。 +- 最後,它允許您從剪貼板黏貼圖像。 ### Metapho (iOS) @@ -143,5 +143,5 @@ cover: data-redaction.webp 我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。 -- 為開源作業系統開發的應用程式必須是開源的。 +- Apps developed for open-source operating systems must be open source. - 應用程式必須是免費的,不應包含廣告或其他限制。 diff --git a/i18n/zh-Hant/desktop.md b/i18n/zh-Hant/desktop.md index 78da1c0f..195d53e2 100644 --- a/i18n/zh-Hant/desktop.md +++ b/i18n/zh-Hant/desktop.md @@ -200,7 +200,7 @@ Qubes OS 作業系統將子系統(例如網絡、USB等)和應用程式隔 選擇適合您的 Linux 發行版取決於個人喜好差異,本頁**並非**是每一款發行版的詳盡列表。 我們在 Linux 介紹頁有更詳細的 [如何選擇發行版本](os/linux-overview.md#choosing-your-distribution) 的說明。 *這個*頁面上的發行版通常都遵循我們介紹的指南,且都滿足以下標準: -- 免費且開放原始碼。 +- Free and open source. - 必須定期接收軟體和內核更新。 - [Avoids X11](os/linux-overview.md#wayland). - 這裡值得注意的例外是 Qubes,但虛擬化可以避免 X11 常發生的隔離問題。 其隔離僅適用於*在不同 qube*(虛擬機)中運行的應用程式,在*同一個* qube 運行的應用程式則無法保護。 diff --git a/i18n/zh-Hant/email-clients.md b/i18n/zh-Hant/email-clients.md index 902383c9..ac82476a 100644 --- a/i18n/zh-Hant/email-clients.md +++ b/i18n/zh-Hant/email-clients.md @@ -226,7 +226,7 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客 ### 最低合格要求 -- 為開源作業系統開發的應用程式必須是開源的。 +- Apps developed for open-source operating systems must be open source. - 必須不收集遙測,或有一個簡單的方法來禁用所有遙測。 - 必須支援OpenPGP訊息加密。 @@ -234,7 +234,7 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客 最佳案例標準代表了我們希望從這個類別的完美項目應具備的功能。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 -- 應該為開源的。 +- Should be open source. - 應為跨平臺。 - 預設情況下不應收集任何遙測。 - 應該原生支持OpenPGP ,即沒有擴展。 diff --git a/i18n/zh-Hant/encryption.md b/i18n/zh-Hant/encryption.md index c92a70c2..6fb69220 100644 --- a/i18n/zh-Hant/encryption.md +++ b/i18n/zh-Hant/encryption.md @@ -416,7 +416,7 @@ OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件 ### 最低合格要求 -- 跨平臺加密應用程序必須是開源的。 +- Cross-platform encryption apps must be open source. - 檔案加密應用程式必須支援 Linux、macOS 和 Windows 的解密。 - 外部磁碟加密應用程式必須支援 Linux、macOS 和 Windows 的解密。 - 作業系統內部磁碟加密應用程式必須是跨平臺或原生內建作業系統。 diff --git a/i18n/zh-Hant/frontends.md b/i18n/zh-Hant/frontends.md index 7ca62e7a..2ec47292 100644 --- a/i18n/zh-Hant/frontends.md +++ b/i18n/zh-Hant/frontends.md @@ -41,7 +41,7 @@ cover: frontends.webp ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** 是 [TikTok](https://www.tiktok.com)網站的開源前端,也可自主託管。 + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. 有許多公共實例,其中一些實例支援 [Tor](https://www.torproject.org) onion 服務。 diff --git a/i18n/zh-Hant/multi-factor-authentication.md b/i18n/zh-Hant/multi-factor-authentication.md index 609a2f03..e03187e2 100644 --- a/i18n/zh-Hant/multi-factor-authentication.md +++ b/i18n/zh-Hant/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp [比較表](https://www.yubico.com/store/compare/) 顯示了各型號 YubiKeys 功能比較。 我們強烈建議您從YubiKey 5系列中挑選。 -YubiKeys可以利用 [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) 或 [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/)來收授指令。 若要管理 TOTP 代碼,您可以使用 [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)。 Yubico 所有客戶端軟體都是開源。 +YubiKeys可以利用 [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) 或 [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/)來收授指令。 若要管理 TOTP 代碼,您可以使用 [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)。 All of Yubico's clients are open source. 支持 HOTP 和 TOTP 的機型, OTP 介面中有2個插槽可用於HOTP 和32個插槽來存儲 TOTP 機密。 這些機密經加密後存儲在密鑰上,永遠不會將它們暴露在插入的設備上。 一旦向 Yubico Authenticator 提供種子(共享祕密) ,它將只會給出六位數的代碼,但永遠不會提供種子。 此安全模型有助於限制攻擊者,即便運行 Yubico Authenticator的設備受到破壞,讓受到物理攻擊時 Yubikey 仍具抵抗力。 -!!! warning "警告" - YubiKey 軔體沒有開源,不可更新。 如果您想要使用較新韌體版本的功能,或者使用中的韌體版本存在漏洞,則需要購買新的金鑰。 +!!! warning + The firmware of YubiKey is not open source and is not updatable. 如果您想要使用較新韌體版本的功能,或者使用中的韌體版本存在漏洞,則需要購買新的金鑰。 ### Nitrokey @@ -58,7 +58,7 @@ YubiKeys可以利用 [YubiKey Manager](https://www.yubico.com/support/download/y Nitrokey Pro 2、Nitrokey Storage 2 和即將推出的 Nitrokey 3 支持筆記型電腦的 [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) 軔體與系統完整性驗證。 -不同於 YubiKey,Nitrokey 軔體是開源。 NitroKey 型號可( **NitroKey Pro 2**除外)可更新軔體。 +Nitrokey's firmware is open source, unlike the YubiKey. NitroKey 型號可( **NitroKey Pro 2**除外)可更新軔體。 ### 標準 diff --git a/i18n/zh-Hant/notebooks.md b/i18n/zh-Hant/notebooks.md index 0b682c0b..d4ab3bbc 100644 --- a/i18n/zh-Hant/notebooks.md +++ b/i18n/zh-Hant/notebooks.md @@ -132,7 +132,7 @@ Cryptee 免費提供100MB 的儲存空間,如果需要更多容量,則另有 我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。 -- 客戶端應是開源的。 +- Clients must be open source. - 任何雲端同步都必須是 E2EE。 - 必須支援將文件匯出為標準格式。 diff --git a/i18n/zh-Hant/os/android-overview.md b/i18n/zh-Hant/os/android-overview.md index 1df5d2ce..e2755b96 100644 --- a/i18n/zh-Hant/os/android-overview.md +++ b/i18n/zh-Hant/os/android-overview.md @@ -12,7 +12,7 @@ description: Android是一個開源作業系統,具有強大的安全保護, ### 選擇Android 發佈版本 -當購買 Android 手機時,該設備的預設作業系統通常放入非 [Android 開源專案](https://source.android.com/)的應用程式與服務,成為侵入性整合。 例如, Google Play 服務擁有不可撤銷的權限,可存取您的檔案、聯絡人儲存空間、通話記錄、SMS訊息、位置、攝影機、麥克風、硬體識別碼等。 這些應用程式和服務增加了設備的攻擊面,成為 Android 各種隱私問題的來源。 +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). 例如, Google Play 服務擁有不可撤銷的權限,可存取您的檔案、聯絡人儲存空間、通話記錄、SMS訊息、位置、攝影機、麥克風、硬體識別碼等。 這些應用程式和服務增加了設備的攻擊面,成為 Android 各種隱私問題的來源。 這個問題可以通過使用自訂的 Android 發行版來解決,而這些發行版不會附帶這種侵入性整合。 不幸的是,許多自定義 Android 發行版常常違反 Android 安全模式,不支持重要的安全功能,如 AVB 、回滾保護、韌體更新等。 一些發行版還提供了 [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) 版本,這類版本可通過 [ ADB ](https://developer.android.com/studio/command-line/adb) 暴露了根目錄,且要求 [更寬鬆的](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux政策以適應調試,導致進一步增加攻擊面並削弱安全模型。 diff --git a/i18n/zh-Hant/os/linux-overview.md b/i18n/zh-Hant/os/linux-overview.md index 668e73d6..f6afd8f3 100644 --- a/i18n/zh-Hant/os/linux-overview.md +++ b/i18n/zh-Hant/os/linux-overview.md @@ -18,7 +18,7 @@ description: Linux 為開源、以隱私為中心的桌面作業系統替代選 - 保持 [軟體自由](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - 有專注隱私保護的作業系統,如 [Whonix](https://www.whonix.org) 或 [Tails](https://tails.boum.org/) -### 開源安全 +### Open-Source Security 人們往往[迷思](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure)認為 Linux 與其它開源軟體本較安全,因為源代碼可以公開取得。 人們期望定期進行社群驗證;然而這種情況 [並不常見](https://seirdy.one/posts/2022/02/02/floss-security/)。 diff --git a/i18n/zh-Hant/passwords.md b/i18n/zh-Hant/passwords.md index fe94a165..a989a6a4 100644 --- a/i18n/zh-Hant/passwords.md +++ b/i18n/zh-Hant/passwords.md @@ -161,7 +161,7 @@ Bitwarden還具有 [Bitwarden Send](https://bitwarden.com/products/send/)功能 您需要使用 [高級付費方案](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) 才能共享檔案。 免費方案只允許文字分享。 -Bitwarden 伺服器端代碼是 [開源](https://github.com/bitwarden/server),因此如果不想使用 Bitwarden 雲端,可以輕鬆地託管自己的 Bitwarden 同步伺服器。 +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** 是以Rust 編寫的Bitwarden 同步伺服器的替代實作,相容官方 Bitwarden 客戶端,非常適合自託管部署取代 Bitwarden 官方資源過載的情況。 如果你想在自己的伺服器上自我託管 Bitwarden ,你幾乎肯定想在 Bitwarden 的官方伺服器代碼上使用 Vaultwarden。 @@ -239,7 +239,7 @@ Psono為其產品提供廣泛的文檔。 Psono 的網頁用戶端可以自行 最佳案例標準代表了我們希望從這個類別的完美項目應具備的功能。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 - 遙測應選擇加入(預設情況下禁用)或根本不收集。 -- 應該是開源的,並且可以合理地自我託管。 +- Should be open source and reasonably self-hostable. ## 本地儲存 diff --git a/i18n/zh-Hant/productivity.md b/i18n/zh-Hant/productivity.md index 4f539b27..104578a2 100644 --- a/i18n/zh-Hant/productivity.md +++ b/i18n/zh-Hant/productivity.md @@ -60,7 +60,7 @@ cover: productivity.webp 一般來說,我們將協作平臺定義為成熟的套件,可以合理地替代Google Drive 等協作平臺。 -- 開源。 +- Open source. - 使檔案可透過 WebDAV 訪問,除非因 E2EE 緣故。 - 具有Linux、macOS和Windows的同步客戶端。 - 支援文件和試算表編輯。 @@ -162,11 +162,10 @@ cover: productivity.webp #### 最低合格要求 -- 必須是開源的。 +- 它必須是開源的。 - 必須落實"零信任"端對端加密。 - 必須支援密碼保護檔案。 - #### 最佳案例 最佳案例標準代表了我們希望從這個類別的完美項目應具備的功能。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 diff --git a/i18n/zh-Hant/router.md b/i18n/zh-Hant/router.md index deb91a1d..9d8c1f4a 100644 --- a/i18n/zh-Hant/router.md +++ b/i18n/zh-Hant/router.md @@ -29,7 +29,7 @@ cover: router.webp ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** 是開源的、基於FreeBSD 的防火牆和路由平臺,它包含許多進階功能,如流量整形、負載平衡和 VPN 功能,且有插件的形式提供更多功能。 OPNsense 通常部署作邊界防火牆、路由器、無線存取點、DHCP伺服器、DNS伺服器和 VPN 端點。 + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense 通常部署作邊界防火牆、路由器、無線存取點、DHCP伺服器、DNS伺服器和 VPN 端點。 [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/zh-Hant/vpn.md b/i18n/zh-Hant/vpn.md index 57284c61..33ed6d05 100644 --- a/i18n/zh-Hant/vpn.md +++ b/i18n/zh-Hant/vpn.md @@ -137,7 +137,7 @@ IVPN 通過 Cure53 的 #### :material-check:{ .pg-green } 開源客戶端 -2020 二月後 [IVPN 應用程式已公開其源代碼](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source)。 源代碼可以從他們的 [GitHub組織](https://github.com/ivpn)獲得。 +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). 源代碼可以從他們的 [GitHub組織](https://github.com/ivpn)獲得。 @@ -293,7 +293,7 @@ Mullvad 對 [自有或租用](https://mullvad.net/en/servers/)的節點非常透 - 支援強固的協議,如 WireGuard & OpenVPN。 - 客戶端內建 Killswitch。 - Multihop支持。 萬一單個節點受損,多跳方式就非常重要,才能保持數據的私密性。 -- 如果提供 VPN 用戶端,它們應該為 [開源](https://en.wikipedia.org/wiki/Open_source),就如同所內置的 VPN 軟體。 我們相信, 可取得的[源代碼](https://en.wikipedia.org/wiki/Source_code) 可為用戶設備實際運作提供更高的透明度。 +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. 我們相信, 可取得的[源代碼](https://en.wikipedia.org/wiki/Source_code) 可為用戶設備實際運作提供更高的透明度。 **最佳案例:** diff --git a/i18n/zh/about/criteria.md b/i18n/zh/about/criteria.md index 4e906a8c..10ec60f8 100644 --- a/i18n/zh/about/criteria.md +++ b/i18n/zh/about/criteria.md @@ -17,7 +17,7 @@ title: 通用标准 我们在考虑新的建议时采用这些优先事项。 - **安全**:工具应该在适用的地方遵循安全的最佳做法。 -- **来源的可用性**: 开放源码项目通常比同等的专有替代品更受欢迎。 +- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives. - **跨平台**:我们通常倾向于建议跨平台,以避免厂商锁定。 - **积极开发**:我们推荐的工具应该积极开发,未维护的项目在大多数情况下会被删除。 - **可用性**:工具应该是大多数计算机用户可以使用的,不应该要求有过度的技术背景。 diff --git a/i18n/zh/about/index.md b/i18n/zh/about/index.md index dc3e44e7..532b9a39 100644 --- a/i18n/zh/about/index.md +++ b/i18n/zh/about/index.md @@ -81,7 +81,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/hook9 "@hook9") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me} -Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). +Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. diff --git a/i18n/zh/about/notices.md b/i18n/zh/about/notices.md index 7bee873f..7a094c98 100644 --- a/i18n/zh/about/notices.md +++ b/i18n/zh/about/notices.md @@ -8,7 +8,7 @@ title: "Notices and Disclaimers" 与任何人类努力一样,运行此网站都涉及不确定性和权衡。 我们希望这个网站有所帮助,但它可能包含错误,无法解决所有问题。 如果您对自己的情况有任何疑问,我们建议您自己进行研究,寻求其他专家,并与隐私指南社区进行讨论。 如果您有任何法律问题,请先咨询您自己的法律顾问,然后再继续。 -隐私指南是一个开放源码项目,根据许可证做出贡献,其中包括为了保护网站及其贡献者,明确规定隐私指南项目和网站可“按原样”提供,不提供保证,并且不对使用网站或网站中的任何建议所造成的损害承担责任。 此外, 隐私指南不保证、不代表使用本网站、或其他与资料相关,或任何关联本网站的其他网站上资料的准确性,可能导致的结果或可靠性。 +Privacy Guides is an open-source project contributed to under licenses that include terms that, for the protection of the website and its contributors, make clear that the Privacy Guides project and website is offered "as-is", without warranty, and disclaiming liability for damages resulting from using the website or any recommendations contained within. 此外, 隐私指南不保证、不代表使用本网站、或其他与资料相关,或任何关联本网站的其他网站上资料的准确性,可能导致的结果或可靠性。 此外,隐私指南不保证本网站将始终可用或完全可用。 diff --git a/i18n/zh/about/privacytools.md b/i18n/zh/about/privacytools.md index 3891280e..23d34708 100644 --- a/i18n/zh/about/privacytools.md +++ b/i18n/zh/about/privacytools.md @@ -90,7 +90,7 @@ BurungHantu还在Twitter上发了一篇 [的帖子](https://twitter.com/privacyt 截至2022年9月25日,我们看到BurungHantu的整体计划在privacytools.io上实现,而这正是我们今天决定创建这个解释页的原因。 他运营的网站似乎是该网站的SEO优化版本,该网站推荐工具以换取经济补偿。 [最近,IVPN和Mullvad这两个VPN供应商几乎被隐私社区普遍推荐为](../vpn.md) ,并因其反对联盟计划的立场而备受关注,被从PrivacyTools中删除。 在他们的位置上? NordVPN、Surfshark、ExpressVPN和hide.me;巨大的VPN公司拥有不值得信赖的平台和商业行为,因其积极的营销和联盟计划而臭名昭著。 -==**PrivacyTools正是成为了我们 [,在2019年的PrivacyTools博客上警告过的那种网站](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) 。**== 自转型以来,我们一直试图与PrivacyTools保持距离,但他们对我们项目的持续骚扰,以及现在对他们的品牌在6年的开源贡献中获得的信誉的荒谬滥用,令我们感到非常不安。 我们这些真正为隐私而战的人并不是在相互斗争,也不是从出价最高的人那里得到我们的建议。 +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. 我们这些真正为隐私而战的人并不是在相互斗争,也不是从出价最高的人那里得到我们的建议。 diff --git a/i18n/zh/android.md b/i18n/zh/android.md index 2cdf2980..214bb97a 100644 --- a/i18n/zh/android.md +++ b/i18n/zh/android.md @@ -180,7 +180,7 @@ Google Pixel phones are the **only** devices we recommend for purchase. Pixel ph Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. -Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. +Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. diff --git a/i18n/zh/basics/common-misconceptions.md b/i18n/zh/basics/common-misconceptions.md index 4a7ef38f..b225d0aa 100644 --- a/i18n/zh/basics/common-misconceptions.md +++ b/i18n/zh/basics/common-misconceptions.md @@ -9,7 +9,7 @@ schema: mainEntity: - "@type": Question - name: 开源软件一定安全吗? + name: Is open-source software inherently secure? acceptedAnswer: "@type": Answer text: | diff --git a/i18n/zh/cloud.md b/i18n/zh/cloud.md index 1d7078e9..e67164f4 100644 --- a/i18n/zh/cloud.md +++ b/i18n/zh/cloud.md @@ -92,7 +92,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- 客户端应是开源的。 +- Clients should be open source. - 客户端应由独立的第三方对其进行全面的审计。 - 应提供Linux、Android、Windows、macOS和iOS的本地客户端。 - 这些客户端应该与云存储供应商的本地操作系统工具集成,如iOS上的Files应用集成,或Android上的DocumentsProvider功能。 diff --git a/i18n/zh/data-redaction.md b/i18n/zh/data-redaction.md index 1c6e84cf..ceb454bf 100644 --- a/i18n/zh/data-redaction.md +++ b/i18n/zh/data-redaction.md @@ -55,19 +55,19 @@ cover: data-redaction.webp 被删除的元数据取决于图像的文件类型。 -* **JPEG**: ICC Profile、Exif、Photoshop Image Resources和XMP/ExtendedXMP元数据如果存在,将被删除。 -* **PNG**:ICC Profile、Exif和XMP元数据如果存在,将被删除。 -* **WebP**:ICC Profile、Exif和XMP元数据如果存在,将被删除。 +- **JPEG**: ICC Profile、Exif、Photoshop Image Resources和XMP/ExtendedXMP元数据如果存在,将被删除。 +- **PNG**:ICC Profile、Exif和XMP元数据如果存在,将被删除。 +- **WebP**:ICC Profile、Exif和XMP元数据如果存在,将被删除。 在处理完图像后,ExifEraser会向你提供一份完整的报告,说明每张图像中到底有哪些被删除。 该应用程序提供多种方法来消除图像中的元数据。 名称: -* 你可以用ExifEraser分享另一个应用程序的图像。 -* 通过应用程序本身,你可以选择一张图片,一次选择多张图片,甚至是整个目录。 -* 它有一个 "相机 "选项,它使用你的操作系统的相机应用程序来拍摄照片,然后它将元数据从照片中删除。 -* 它允许你将照片从另一个应用程序拖入ExifEraser,当它们都以分屏模式打开时。 -* 最后,它允许你从剪贴板上粘贴图片。 +- 你可以用ExifEraser分享另一个应用程序的图像。 +- 通过应用程序本身,你可以选择一张图片,一次选择多张图片,甚至是整个目录。 +- 它有一个 "相机 "选项,它使用你的操作系统的相机应用程序来拍摄照片,然后它将元数据从照片中删除。 +- 它允许你将照片从另一个应用程序拖入ExifEraser,当它们都以分屏模式打开时。 +- 最后,它允许你从剪贴板上粘贴图片。 ### Metapho (iOS) @@ -143,5 +143,5 @@ cover: data-redaction.webp We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- 为开源操作系统开发的应用程序必须是开源的。 +- Apps developed for open-source operating systems must be open source. - 应用程序必须是免费的,不应包括广告或其他限制。 diff --git a/i18n/zh/desktop.md b/i18n/zh/desktop.md index c1bc7006..2af0b1a5 100644 --- a/i18n/zh/desktop.md +++ b/i18n/zh/desktop.md @@ -185,7 +185,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou Choosing a Linux distro that is right for you will come down to a huge variety of personal preferences, and this page is **not** meant to be an exhaustive list of every viable distribution. Our Linux overview page has some advice on [choosing a distro](os/linux-overview.md#choosing-your-distribution) in more detail. The distros on *this* page do all generally follow the guidelines we covered there, and all meet these standards: -- Free and open-source. +- Free and open source. - Receives regular software and kernel updates. - [Avoids X11](os/linux-overview.md#wayland). - The notable exception here is Qubes, but the isolation issues which X11 typically has are avoided by virtualization. This isolation only applies to apps *running in different qubes* (virtual machines), apps running in the *same* qube are not protected from each other. diff --git a/i18n/zh/email-clients.md b/i18n/zh/email-clients.md index 6a428594..15d40307 100644 --- a/i18n/zh/email-clients.md +++ b/i18n/zh/email-clients.md @@ -226,7 +226,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ### Minimum Qualifications -- 为开源操作系统开发的应用程序必须是开源的。 +- Apps developed for open-source operating systems must be open source. - Must not collect telemetry, or have an easy way to disable all telemetry. - Must support OpenPGP message encryption. @@ -234,7 +234,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should be open-source. +- Should be open source. - Should be cross-platform. - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. diff --git a/i18n/zh/encryption.md b/i18n/zh/encryption.md index e4846b5e..f98730cb 100644 --- a/i18n/zh/encryption.md +++ b/i18n/zh/encryption.md @@ -345,7 +345,7 @@ When encrypting with PGP, you have the option to configure different options in ### Minimum Qualifications -- Cross-platform encryption apps must be open-source. +- Cross-platform encryption apps must be open source. - File encryption apps must support decryption on Linux, macOS, and Windows. - External disk encryption apps must support decryption on Linux, macOS, and Windows. - Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively. diff --git a/i18n/zh/frontends.md b/i18n/zh/frontends.md index c6cb01c3..5821d321 100644 --- a/i18n/zh/frontends.md +++ b/i18n/zh/frontends.md @@ -41,7 +41,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } - **ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. + **ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support. diff --git a/i18n/zh/multi-factor-authentication.md b/i18n/zh/multi-factor-authentication.md index d28f6ea6..09a0fa45 100644 --- a/i18n/zh/multi-factor-authentication.md +++ b/i18n/zh/multi-factor-authentication.md @@ -23,12 +23,12 @@ cover: multi-factor-authentication.webp The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open-source. +YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. !!! warning - The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. + The firmware of YubiKey is not open source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. ### Nitrokey @@ -58,7 +58,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. -Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. +Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. ### Criteria diff --git a/i18n/zh/notebooks.md b/i18n/zh/notebooks.md index fa318b5c..37448109 100644 --- a/i18n/zh/notebooks.md +++ b/i18n/zh/notebooks.md @@ -132,7 +132,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. -- Clients must be open-source. +- Clients must be open source. - Any cloud sync functionality must be E2EE. - Must support exporting documents into a standard format. diff --git a/i18n/zh/os/android-overview.md b/i18n/zh/os/android-overview.md index c86490b2..ca8515de 100644 --- a/i18n/zh/os/android-overview.md +++ b/i18n/zh/os/android-overview.md @@ -12,7 +12,7 @@ The **Android Open Source Project** is a secure mobile operating system featurin ### 挑选安卓 ROM -你买到的安卓手机多半已经预装了能侵犯隐私的应用与服务,而这些服务并不属于 [AOSP](https://source.android.com/)。 例如 Google Play 服务:它有权访问你的文件、联系人、通话记录、短信、定位、相机、麦克风、硬件身份码等。且这些权限无法收回。 这类应用与服务扩大了你的设备的攻击面,也是安卓系统的各种隐私问题的源头。 +When you buy an Android phone, the device's default operating system often comes with invasive integration with apps and services that are not part of the [Android Open Source Project](https://source.android.com/). 例如 Google Play 服务:它有权访问你的文件、联系人、通话记录、短信、定位、相机、麦克风、硬件身份码等。且这些权限无法收回。 这类应用与服务扩大了你的设备的攻击面,也是安卓系统的各种隐私问题的源头。 换用一个不预装这类软件的安卓 ROM 可以解决这个问题。 不巧,很多安卓 ROM 不支持 AVB、回滚保护、系统更新、等这些关键的安全功能,破坏了安卓的安全模型。 某些 ROM 发布的版本属于 [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) 构建版本。这个版本通过 [ADB](https://developer.android.com/studio/command-line/adb) 来提供 root 访问,并且为了支持调试,[放宽](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code)了 SELinux 规则。这进一步扩大了攻击面,弱化了安全模型。 diff --git a/i18n/zh/os/linux-overview.md b/i18n/zh/os/linux-overview.md index e10f34a5..e5ef2ae9 100644 --- a/i18n/zh/os/linux-overview.md +++ b/i18n/zh/os/linux-overview.md @@ -18,7 +18,7 @@ There are some notable privacy concerns with Linux which you should be aware of. - 保持 [软件自由](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) - Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) -### Open Source Security +### Open-Source Security It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). diff --git a/i18n/zh/passwords.md b/i18n/zh/passwords.md index d8154d1f..2b18a988 100644 --- a/i18n/zh/passwords.md +++ b/i18n/zh/passwords.md @@ -161,7 +161,7 @@ Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. -Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. +Bitwarden's server-side code is [open source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server. **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. @@ -239,7 +239,7 @@ Psono provides extensive documentation for their product. The web-client for Pso Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Telemetry should be opt-in (disabled by default) or not collected at all. -- Should be open-source and reasonably self-hostable. +- Should be open source and reasonably self-hostable. ## Local Storage diff --git a/i18n/zh/productivity.md b/i18n/zh/productivity.md index 206cc93d..a27975f6 100644 --- a/i18n/zh/productivity.md +++ b/i18n/zh/productivity.md @@ -60,7 +60,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac In general, we define collaboration platforms as full-fledged suites which could reasonably act as a replacement to collaboration platforms like Google Drive. -- 开源 +- Open source. - Makes files accessible via WebDAV unless it is impossible due to E2EE. - Has sync clients for Linux, macOS, and Windows. - Supports document and spreadsheet editing. @@ -162,11 +162,10 @@ In general, we define office suites as applications which could reasonably act a #### Minimum Requirements -- 必须是开源的。 +- Must be open source. - Must implement "zero-trust" end-to-end encryption. - Must support password-protected files. - #### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. diff --git a/i18n/zh/router.md b/i18n/zh/router.md index 2772ea8d..a2177a45 100644 --- a/i18n/zh/router.md +++ b/i18n/zh/router.md @@ -29,7 +29,7 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to ![OPNsense logo](assets/img/router/opnsense.svg){ align=right } - **OPNsense** is an open source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. + **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} diff --git a/i18n/zh/vpn.md b/i18n/zh/vpn.md index 9c9545de..2f21c311 100644 --- a/i18n/zh/vpn.md +++ b/i18n/zh/vpn.md @@ -128,7 +128,7 @@ IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-repo #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -237,7 +237,7 @@ Mullvad is very transparent about which nodes they [own or rent](https://mullvad - 支持强大的协议,如WireGuard & OpenVPN。 - 客户端内置的杀毒软件。 - 多跳支持。 多重跳转对于在单个节点受损的情况下保持数据的私密性非常重要。 -- 如果提供VPN客户端,它们应该是 [开源的](https://en.wikipedia.org/wiki/Open_source),就像它们一般内置的VPN软件。 我们相信, [源代码](https://en.wikipedia.org/wiki/Source_code) 的可用性提供了更大的透明度,了解你的设备实际上在做什么。 +- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. 我们相信, [源代码](https://en.wikipedia.org/wiki/Source_code) 的可用性提供了更大的透明度,了解你的设备实际上在做什么。 **Best Case:**