From 1d9c017698a50624ee5e2d26e9b7be63a7a4ebd3 Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Thu, 24 Oct 2024 05:35:33 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ar/about.md | 2 +- i18n/ar/android/general-apps.md | 15 +- i18n/ar/browser-extensions.md | 1 - i18n/ar/cloud.md | 2 +- i18n/ar/data-redaction.md | 4 + i18n/ar/desktop-browsers.md | 9 +- i18n/ar/desktop.md | 20 +- i18n/ar/encryption.md | 2 + i18n/ar/file-sharing.md | 1 - i18n/ar/financial-services.md | 13 +- i18n/ar/frontends.md | 329 ++++++++++++----------- i18n/ar/language-tools.md | 4 +- i18n/ar/mobile-browsers.md | 110 +++++--- i18n/ar/office-suites.md | 4 + i18n/ar/os/android-overview.md | 16 +- i18n/ar/pastebins.md | 4 + i18n/ar/real-time-communication.md | 2 +- i18n/ar/router.md | 7 +- i18n/ar/search-engines.md | 4 + i18n/ar/tools.md | 9 - i18n/bn-IN/about.md | 2 +- i18n/bn-IN/android/general-apps.md | 15 +- i18n/bn-IN/browser-extensions.md | 1 - i18n/bn-IN/cloud.md | 2 +- i18n/bn-IN/data-redaction.md | 4 + i18n/bn-IN/desktop-browsers.md | 9 +- i18n/bn-IN/desktop.md | 20 +- i18n/bn-IN/encryption.md | 2 + i18n/bn-IN/file-sharing.md | 1 - i18n/bn-IN/financial-services.md | 13 +- i18n/bn-IN/frontends.md | 329 ++++++++++++----------- i18n/bn-IN/language-tools.md | 4 +- i18n/bn-IN/mobile-browsers.md | 110 +++++--- i18n/bn-IN/office-suites.md | 4 + i18n/bn-IN/os/android-overview.md | 16 +- i18n/bn-IN/pastebins.md | 4 + i18n/bn-IN/real-time-communication.md | 2 +- i18n/bn-IN/router.md | 7 +- i18n/bn-IN/search-engines.md | 4 + i18n/bn-IN/tools.md | 9 - i18n/bn/about.md | 2 +- i18n/bn/android/general-apps.md | 15 +- i18n/bn/browser-extensions.md | 1 - i18n/bn/cloud.md | 2 +- i18n/bn/data-redaction.md | 4 + i18n/bn/desktop-browsers.md | 9 +- i18n/bn/desktop.md | 20 +- i18n/bn/encryption.md | 2 + i18n/bn/file-sharing.md | 1 - i18n/bn/financial-services.md | 13 +- i18n/bn/frontends.md | 329 ++++++++++++----------- i18n/bn/language-tools.md | 4 +- i18n/bn/mobile-browsers.md | 110 +++++--- i18n/bn/office-suites.md | 4 + i18n/bn/os/android-overview.md | 16 +- i18n/bn/pastebins.md | 4 + i18n/bn/real-time-communication.md | 2 +- i18n/bn/router.md | 7 +- i18n/bn/search-engines.md | 4 + i18n/bn/tools.md | 9 - i18n/cs/about.md | 2 +- i18n/cs/android/general-apps.md | 15 +- i18n/cs/browser-extensions.md | 1 - i18n/cs/cloud.md | 2 +- i18n/cs/data-redaction.md | 4 + i18n/cs/desktop-browsers.md | 9 +- i18n/cs/desktop.md | 20 +- i18n/cs/encryption.md | 2 + i18n/cs/file-sharing.md | 1 - i18n/cs/financial-services.md | 13 +- i18n/cs/frontends.md | 329 ++++++++++++----------- i18n/cs/language-tools.md | 4 +- i18n/cs/mobile-browsers.md | 110 +++++--- i18n/cs/office-suites.md | 4 + i18n/cs/os/android-overview.md | 16 +- i18n/cs/pastebins.md | 4 + i18n/cs/real-time-communication.md | 2 +- i18n/cs/router.md | 7 +- i18n/cs/search-engines.md | 4 + i18n/cs/tools.md | 9 - i18n/de/about.md | 2 +- i18n/de/android/general-apps.md | 17 +- i18n/de/browser-extensions.md | 1 - i18n/de/cloud.md | 2 +- i18n/de/data-redaction.md | 4 + i18n/de/desktop-browsers.md | 21 +- i18n/de/desktop.md | 20 +- i18n/de/encryption.md | 2 + i18n/de/file-sharing.md | 1 - i18n/de/financial-services.md | 13 +- i18n/de/frontends.md | 329 ++++++++++++----------- i18n/de/language-tools.md | 4 +- i18n/de/mobile-browsers.md | 110 +++++--- i18n/de/office-suites.md | 4 + i18n/de/os/android-overview.md | 16 +- i18n/de/pastebins.md | 4 + i18n/de/real-time-communication.md | 2 +- i18n/de/router.md | 7 +- i18n/de/search-engines.md | 4 + i18n/de/tools.md | 9 - i18n/el/about.md | 2 +- i18n/el/android/general-apps.md | 15 +- i18n/el/browser-extensions.md | 1 - i18n/el/cloud.md | 2 +- i18n/el/data-redaction.md | 4 + i18n/el/desktop-browsers.md | 9 +- i18n/el/desktop.md | 20 +- i18n/el/encryption.md | 2 + i18n/el/file-sharing.md | 1 - i18n/el/financial-services.md | 13 +- i18n/el/frontends.md | 329 ++++++++++++----------- i18n/el/language-tools.md | 4 +- i18n/el/mobile-browsers.md | 110 +++++--- i18n/el/office-suites.md | 4 + i18n/el/os/android-overview.md | 16 +- i18n/el/pastebins.md | 4 + i18n/el/real-time-communication.md | 2 +- i18n/el/router.md | 7 +- i18n/el/search-engines.md | 4 + i18n/el/tools.md | 9 - i18n/eo/about.md | 2 +- i18n/eo/android/general-apps.md | 15 +- i18n/eo/browser-extensions.md | 1 - i18n/eo/cloud.md | 2 +- i18n/eo/data-redaction.md | 4 + i18n/eo/desktop-browsers.md | 9 +- i18n/eo/desktop.md | 20 +- i18n/eo/encryption.md | 2 + i18n/eo/file-sharing.md | 1 - i18n/eo/financial-services.md | 13 +- i18n/eo/frontends.md | 329 ++++++++++++----------- i18n/eo/language-tools.md | 4 +- i18n/eo/mobile-browsers.md | 110 +++++--- i18n/eo/office-suites.md | 4 + i18n/eo/os/android-overview.md | 16 +- i18n/eo/pastebins.md | 4 + i18n/eo/real-time-communication.md | 2 +- i18n/eo/router.md | 7 +- i18n/eo/search-engines.md | 4 + i18n/eo/tools.md | 9 - i18n/es/about.md | 2 +- i18n/es/android/general-apps.md | 15 +- i18n/es/browser-extensions.md | 1 - i18n/es/cloud.md | 2 +- i18n/es/data-redaction.md | 4 + i18n/es/desktop-browsers.md | 21 +- i18n/es/desktop.md | 20 +- i18n/es/encryption.md | 2 + i18n/es/file-sharing.md | 1 - i18n/es/financial-services.md | 13 +- i18n/es/frontends.md | 337 +++++++++++------------ i18n/es/language-tools.md | 4 +- i18n/es/mobile-browsers.md | 114 +++++--- i18n/es/office-suites.md | 4 + i18n/es/os/android-overview.md | 16 +- i18n/es/pastebins.md | 4 + i18n/es/real-time-communication.md | 2 +- i18n/es/router.md | 7 +- i18n/es/search-engines.md | 4 + i18n/es/tools.md | 9 - i18n/fa/about.md | 2 +- i18n/fa/android/general-apps.md | 15 +- i18n/fa/browser-extensions.md | 1 - i18n/fa/cloud.md | 2 +- i18n/fa/data-redaction.md | 4 + i18n/fa/desktop-browsers.md | 9 +- i18n/fa/desktop.md | 20 +- i18n/fa/encryption.md | 2 + i18n/fa/file-sharing.md | 1 - i18n/fa/financial-services.md | 13 +- i18n/fa/frontends.md | 329 ++++++++++++----------- i18n/fa/language-tools.md | 4 +- i18n/fa/mobile-browsers.md | 110 +++++--- i18n/fa/office-suites.md | 4 + i18n/fa/os/android-overview.md | 16 +- i18n/fa/pastebins.md | 4 + i18n/fa/real-time-communication.md | 2 +- i18n/fa/router.md | 7 +- i18n/fa/search-engines.md | 4 + i18n/fa/tools.md | 9 - i18n/fr/about.md | 2 +- i18n/fr/android/general-apps.md | 15 +- i18n/fr/browser-extensions.md | 1 - i18n/fr/cloud.md | 2 +- i18n/fr/data-redaction.md | 4 + i18n/fr/desktop-browsers.md | 11 +- i18n/fr/desktop.md | 20 +- i18n/fr/encryption.md | 2 + i18n/fr/file-sharing.md | 1 - i18n/fr/financial-services.md | 13 +- i18n/fr/frontends.md | 333 ++++++++++++----------- i18n/fr/language-tools.md | 4 +- i18n/fr/mobile-browsers.md | 110 +++++--- i18n/fr/office-suites.md | 4 + i18n/fr/os/android-overview.md | 16 +- i18n/fr/pastebins.md | 4 + i18n/fr/real-time-communication.md | 2 +- i18n/fr/router.md | 7 +- i18n/fr/search-engines.md | 4 + i18n/fr/tools.md | 9 - i18n/he/about.md | 2 +- i18n/he/android/general-apps.md | 15 +- i18n/he/browser-extensions.md | 1 - i18n/he/cloud.md | 2 +- i18n/he/data-redaction.md | 6 +- i18n/he/desktop-browsers.md | 13 +- i18n/he/desktop.md | 20 +- i18n/he/encryption.md | 2 + i18n/he/file-sharing.md | 1 - i18n/he/financial-services.md | 13 +- i18n/he/frontends.md | 333 ++++++++++++----------- i18n/he/language-tools.md | 4 +- i18n/he/mobile-browsers.md | 110 +++++--- i18n/he/office-suites.md | 4 + i18n/he/os/android-overview.md | 16 +- i18n/he/pastebins.md | 4 + i18n/he/real-time-communication.md | 2 +- i18n/he/router.md | 7 +- i18n/he/search-engines.md | 4 + i18n/he/tools.md | 9 - i18n/hi/about.md | 2 +- i18n/hi/android/general-apps.md | 15 +- i18n/hi/browser-extensions.md | 1 - i18n/hi/cloud.md | 2 +- i18n/hi/data-redaction.md | 4 + i18n/hi/desktop-browsers.md | 9 +- i18n/hi/desktop.md | 20 +- i18n/hi/encryption.md | 2 + i18n/hi/file-sharing.md | 1 - i18n/hi/financial-services.md | 13 +- i18n/hi/frontends.md | 329 ++++++++++++----------- i18n/hi/language-tools.md | 4 +- i18n/hi/mobile-browsers.md | 110 +++++--- i18n/hi/office-suites.md | 4 + i18n/hi/os/android-overview.md | 16 +- i18n/hi/pastebins.md | 4 + i18n/hi/real-time-communication.md | 2 +- i18n/hi/router.md | 7 +- i18n/hi/search-engines.md | 4 + i18n/hi/tools.md | 9 - i18n/hu/about.md | 2 +- i18n/hu/android/general-apps.md | 15 +- i18n/hu/browser-extensions.md | 1 - i18n/hu/cloud.md | 2 +- i18n/hu/data-redaction.md | 4 + i18n/hu/desktop-browsers.md | 9 +- i18n/hu/desktop.md | 20 +- i18n/hu/encryption.md | 2 + i18n/hu/file-sharing.md | 1 - i18n/hu/financial-services.md | 13 +- i18n/hu/frontends.md | 329 ++++++++++++----------- i18n/hu/language-tools.md | 4 +- i18n/hu/mobile-browsers.md | 110 +++++--- i18n/hu/office-suites.md | 4 + i18n/hu/os/android-overview.md | 16 +- i18n/hu/pastebins.md | 4 + i18n/hu/real-time-communication.md | 2 +- i18n/hu/router.md | 7 +- i18n/hu/search-engines.md | 4 + i18n/hu/tools.md | 9 - i18n/id/about.md | 2 +- i18n/id/android/general-apps.md | 15 +- i18n/id/browser-extensions.md | 1 - i18n/id/cloud.md | 2 +- i18n/id/data-redaction.md | 4 + i18n/id/desktop-browsers.md | 11 +- i18n/id/desktop.md | 20 +- i18n/id/encryption.md | 2 + i18n/id/file-sharing.md | 1 - i18n/id/financial-services.md | 13 +- i18n/id/frontends.md | 329 ++++++++++++----------- i18n/id/language-tools.md | 4 +- i18n/id/mobile-browsers.md | 110 +++++--- i18n/id/office-suites.md | 4 + i18n/id/os/android-overview.md | 16 +- i18n/id/pastebins.md | 4 + i18n/id/real-time-communication.md | 2 +- i18n/id/router.md | 7 +- i18n/id/search-engines.md | 4 + i18n/id/tools.md | 9 - i18n/it/about.md | 2 +- i18n/it/android/general-apps.md | 15 +- i18n/it/browser-extensions.md | 1 - i18n/it/cloud.md | 2 +- i18n/it/data-redaction.md | 4 + i18n/it/desktop-browsers.md | 11 +- i18n/it/desktop.md | 20 +- i18n/it/encryption.md | 2 + i18n/it/file-sharing.md | 1 - i18n/it/financial-services.md | 13 +- i18n/it/frontends.md | 339 +++++++++++------------ i18n/it/language-tools.md | 4 +- i18n/it/mobile-browsers.md | 110 +++++--- i18n/it/office-suites.md | 4 + i18n/it/os/android-overview.md | 16 +- i18n/it/pastebins.md | 4 + i18n/it/real-time-communication.md | 2 +- i18n/it/router.md | 7 +- i18n/it/search-engines.md | 4 + i18n/it/tools.md | 9 - i18n/ja/about.md | 2 +- i18n/ja/android/general-apps.md | 15 +- i18n/ja/browser-extensions.md | 1 - i18n/ja/cloud.md | 2 +- i18n/ja/data-redaction.md | 4 + i18n/ja/desktop-browsers.md | 11 +- i18n/ja/desktop.md | 20 +- i18n/ja/encryption.md | 2 + i18n/ja/file-sharing.md | 1 - i18n/ja/financial-services.md | 13 +- i18n/ja/frontends.md | 329 ++++++++++++----------- i18n/ja/language-tools.md | 4 +- i18n/ja/mobile-browsers.md | 110 +++++--- i18n/ja/office-suites.md | 4 + i18n/ja/os/android-overview.md | 16 +- i18n/ja/pastebins.md | 4 + i18n/ja/real-time-communication.md | 2 +- i18n/ja/router.md | 7 +- i18n/ja/search-engines.md | 4 + i18n/ja/tools.md | 9 - i18n/ko/about.md | 2 +- i18n/ko/android/general-apps.md | 15 +- i18n/ko/browser-extensions.md | 1 - i18n/ko/cloud.md | 2 +- i18n/ko/data-redaction.md | 4 + i18n/ko/desktop-browsers.md | 9 +- i18n/ko/desktop.md | 20 +- i18n/ko/encryption.md | 2 + i18n/ko/file-sharing.md | 1 - i18n/ko/financial-services.md | 13 +- i18n/ko/frontends.md | 333 ++++++++++++----------- i18n/ko/language-tools.md | 4 +- i18n/ko/mobile-browsers.md | 110 +++++--- i18n/ko/office-suites.md | 4 + i18n/ko/os/android-overview.md | 16 +- i18n/ko/pastebins.md | 4 + i18n/ko/real-time-communication.md | 2 +- i18n/ko/router.md | 7 +- i18n/ko/search-engines.md | 4 + i18n/ko/tools.md | 9 - i18n/ku-IQ/about.md | 2 +- i18n/ku-IQ/android/general-apps.md | 15 +- i18n/ku-IQ/browser-extensions.md | 1 - i18n/ku-IQ/cloud.md | 2 +- i18n/ku-IQ/data-redaction.md | 4 + i18n/ku-IQ/desktop-browsers.md | 9 +- i18n/ku-IQ/desktop.md | 20 +- i18n/ku-IQ/encryption.md | 2 + i18n/ku-IQ/file-sharing.md | 1 - i18n/ku-IQ/financial-services.md | 13 +- i18n/ku-IQ/frontends.md | 329 ++++++++++++----------- i18n/ku-IQ/language-tools.md | 4 +- i18n/ku-IQ/mobile-browsers.md | 110 +++++--- i18n/ku-IQ/office-suites.md | 4 + i18n/ku-IQ/os/android-overview.md | 16 +- i18n/ku-IQ/pastebins.md | 4 + i18n/ku-IQ/real-time-communication.md | 2 +- i18n/ku-IQ/router.md | 7 +- i18n/ku-IQ/search-engines.md | 4 + i18n/ku-IQ/tools.md | 9 - i18n/nl/about.md | 2 +- i18n/nl/android/general-apps.md | 15 +- i18n/nl/browser-extensions.md | 1 - i18n/nl/cloud.md | 2 +- i18n/nl/data-redaction.md | 4 + i18n/nl/desktop-browsers.md | 13 +- i18n/nl/desktop.md | 20 +- i18n/nl/encryption.md | 2 + i18n/nl/file-sharing.md | 1 - i18n/nl/financial-services.md | 13 +- i18n/nl/frontends.md | 331 ++++++++++++----------- i18n/nl/language-tools.md | 4 +- i18n/nl/mobile-browsers.md | 110 +++++--- i18n/nl/office-suites.md | 4 + i18n/nl/os/android-overview.md | 16 +- i18n/nl/pastebins.md | 4 + i18n/nl/real-time-communication.md | 2 +- i18n/nl/router.md | 7 +- i18n/nl/search-engines.md | 4 + i18n/nl/tools.md | 9 - i18n/pl/about.md | 2 +- i18n/pl/android/general-apps.md | 15 +- i18n/pl/browser-extensions.md | 1 - i18n/pl/cloud.md | 2 +- i18n/pl/data-redaction.md | 4 + i18n/pl/desktop-browsers.md | 9 +- i18n/pl/desktop.md | 20 +- i18n/pl/encryption.md | 2 + i18n/pl/file-sharing.md | 1 - i18n/pl/financial-services.md | 13 +- i18n/pl/frontends.md | 329 ++++++++++++----------- i18n/pl/language-tools.md | 4 +- i18n/pl/mobile-browsers.md | 110 +++++--- i18n/pl/office-suites.md | 4 + i18n/pl/os/android-overview.md | 16 +- i18n/pl/pastebins.md | 4 + i18n/pl/real-time-communication.md | 2 +- i18n/pl/router.md | 7 +- i18n/pl/search-engines.md | 4 + i18n/pl/tools.md | 9 - i18n/pt-BR/about.md | 2 +- i18n/pt-BR/android/general-apps.md | 15 +- i18n/pt-BR/browser-extensions.md | 1 - i18n/pt-BR/cloud.md | 2 +- i18n/pt-BR/data-redaction.md | 4 + i18n/pt-BR/desktop-browsers.md | 9 +- i18n/pt-BR/desktop.md | 20 +- i18n/pt-BR/encryption.md | 2 + i18n/pt-BR/file-sharing.md | 1 - i18n/pt-BR/financial-services.md | 13 +- i18n/pt-BR/frontends.md | 329 ++++++++++++----------- i18n/pt-BR/language-tools.md | 4 +- i18n/pt-BR/mobile-browsers.md | 110 +++++--- i18n/pt-BR/office-suites.md | 4 + i18n/pt-BR/os/android-overview.md | 16 +- i18n/pt-BR/pastebins.md | 4 + i18n/pt-BR/real-time-communication.md | 2 +- i18n/pt-BR/router.md | 7 +- i18n/pt-BR/search-engines.md | 4 + i18n/pt-BR/tools.md | 9 - i18n/pt/about.md | 2 +- i18n/pt/android/general-apps.md | 15 +- i18n/pt/browser-extensions.md | 1 - i18n/pt/cloud.md | 2 +- i18n/pt/data-redaction.md | 4 + i18n/pt/desktop-browsers.md | 13 +- i18n/pt/desktop.md | 20 +- i18n/pt/encryption.md | 2 + i18n/pt/file-sharing.md | 1 - i18n/pt/financial-services.md | 13 +- i18n/pt/frontends.md | 333 ++++++++++++----------- i18n/pt/language-tools.md | 4 +- i18n/pt/mobile-browsers.md | 110 +++++--- i18n/pt/office-suites.md | 4 + i18n/pt/os/android-overview.md | 16 +- i18n/pt/pastebins.md | 4 + i18n/pt/real-time-communication.md | 2 +- i18n/pt/router.md | 7 +- i18n/pt/search-engines.md | 4 + i18n/pt/tools.md | 9 - i18n/ru/about.md | 2 +- i18n/ru/android/general-apps.md | 15 +- i18n/ru/browser-extensions.md | 1 - i18n/ru/cloud.md | 2 +- i18n/ru/data-redaction.md | 4 + i18n/ru/desktop-browsers.md | 13 +- i18n/ru/desktop.md | 20 +- i18n/ru/encryption.md | 2 + i18n/ru/file-sharing.md | 1 - i18n/ru/financial-services.md | 13 +- i18n/ru/frontends.md | 333 ++++++++++++----------- i18n/ru/language-tools.md | 4 +- i18n/ru/mobile-browsers.md | 110 +++++--- i18n/ru/office-suites.md | 4 + i18n/ru/os/android-overview.md | 16 +- i18n/ru/pastebins.md | 4 + i18n/ru/real-time-communication.md | 2 +- i18n/ru/router.md | 7 +- i18n/ru/search-engines.md | 4 + i18n/ru/tools.md | 9 - i18n/sv/about.md | 2 +- i18n/sv/android/general-apps.md | 15 +- i18n/sv/browser-extensions.md | 1 - i18n/sv/cloud.md | 2 +- i18n/sv/data-redaction.md | 4 + i18n/sv/desktop-browsers.md | 9 +- i18n/sv/desktop.md | 20 +- i18n/sv/encryption.md | 2 + i18n/sv/file-sharing.md | 1 - i18n/sv/financial-services.md | 13 +- i18n/sv/frontends.md | 329 ++++++++++++----------- i18n/sv/language-tools.md | 4 +- i18n/sv/mobile-browsers.md | 110 +++++--- i18n/sv/office-suites.md | 4 + i18n/sv/os/android-overview.md | 16 +- i18n/sv/pastebins.md | 4 + i18n/sv/real-time-communication.md | 2 +- i18n/sv/router.md | 7 +- i18n/sv/search-engines.md | 4 + i18n/sv/tools.md | 9 - i18n/tr/about.md | 2 +- i18n/tr/android/general-apps.md | 15 +- i18n/tr/browser-extensions.md | 1 - i18n/tr/cloud.md | 2 +- i18n/tr/data-redaction.md | 4 + i18n/tr/desktop-browsers.md | 9 +- i18n/tr/desktop.md | 20 +- i18n/tr/encryption.md | 2 + i18n/tr/file-sharing.md | 1 - i18n/tr/financial-services.md | 13 +- i18n/tr/frontends.md | 329 ++++++++++++----------- i18n/tr/language-tools.md | 4 +- i18n/tr/mobile-browsers.md | 110 +++++--- i18n/tr/office-suites.md | 4 + i18n/tr/os/android-overview.md | 16 +- i18n/tr/pastebins.md | 4 + i18n/tr/real-time-communication.md | 2 +- i18n/tr/router.md | 7 +- i18n/tr/search-engines.md | 4 + i18n/tr/tools.md | 9 - i18n/uk/about.md | 2 +- i18n/uk/android/general-apps.md | 15 +- i18n/uk/browser-extensions.md | 1 - i18n/uk/cloud.md | 2 +- i18n/uk/data-redaction.md | 4 + i18n/uk/desktop-browsers.md | 9 +- i18n/uk/desktop.md | 20 +- i18n/uk/encryption.md | 2 + i18n/uk/file-sharing.md | 1 - i18n/uk/financial-services.md | 13 +- i18n/uk/frontends.md | 329 ++++++++++++----------- i18n/uk/language-tools.md | 4 +- i18n/uk/mobile-browsers.md | 110 +++++--- i18n/uk/office-suites.md | 4 + i18n/uk/os/android-overview.md | 16 +- i18n/uk/pastebins.md | 4 + i18n/uk/real-time-communication.md | 2 +- i18n/uk/router.md | 7 +- i18n/uk/search-engines.md | 4 + i18n/uk/tools.md | 9 - i18n/vi/about.md | 2 +- i18n/vi/android/general-apps.md | 15 +- i18n/vi/browser-extensions.md | 1 - i18n/vi/cloud.md | 2 +- i18n/vi/data-redaction.md | 4 + i18n/vi/desktop-browsers.md | 9 +- i18n/vi/desktop.md | 20 +- i18n/vi/encryption.md | 2 + i18n/vi/file-sharing.md | 1 - i18n/vi/financial-services.md | 13 +- i18n/vi/frontends.md | 329 ++++++++++++----------- i18n/vi/language-tools.md | 4 +- i18n/vi/mobile-browsers.md | 110 +++++--- i18n/vi/office-suites.md | 4 + i18n/vi/os/android-overview.md | 16 +- i18n/vi/pastebins.md | 4 + i18n/vi/real-time-communication.md | 2 +- i18n/vi/router.md | 7 +- i18n/vi/search-engines.md | 4 + i18n/vi/tools.md | 9 - i18n/zh-Hant/about.md | 2 +- i18n/zh-Hant/android/general-apps.md | 15 +- i18n/zh-Hant/browser-extensions.md | 1 - i18n/zh-Hant/cloud.md | 2 +- i18n/zh-Hant/data-redaction.md | 4 + i18n/zh-Hant/desktop-browsers.md | 21 +- i18n/zh-Hant/desktop.md | 20 +- i18n/zh-Hant/encryption.md | 2 + i18n/zh-Hant/file-sharing.md | 3 +- i18n/zh-Hant/financial-services.md | 13 +- i18n/zh-Hant/frontends.md | 341 ++++++++++++------------ i18n/zh-Hant/language-tools.md | 4 +- i18n/zh-Hant/mobile-browsers.md | 114 +++++--- i18n/zh-Hant/office-suites.md | 4 + i18n/zh-Hant/os/android-overview.md | 18 +- i18n/zh-Hant/pastebins.md | 4 + i18n/zh-Hant/real-time-communication.md | 2 +- i18n/zh-Hant/router.md | 7 +- i18n/zh-Hant/search-engines.md | 4 + i18n/zh-Hant/tools.md | 9 - i18n/zh/about.md | 2 +- i18n/zh/android/general-apps.md | 15 +- i18n/zh/browser-extensions.md | 1 - i18n/zh/cloud.md | 2 +- i18n/zh/data-redaction.md | 4 + i18n/zh/desktop-browsers.md | 17 +- i18n/zh/desktop.md | 20 +- i18n/zh/encryption.md | 2 + i18n/zh/file-sharing.md | 1 - i18n/zh/financial-services.md | 13 +- i18n/zh/frontends.md | 329 ++++++++++++----------- i18n/zh/language-tools.md | 4 +- i18n/zh/mobile-browsers.md | 110 +++++--- i18n/zh/office-suites.md | 4 + i18n/zh/os/android-overview.md | 16 +- i18n/zh/pastebins.md | 4 + i18n/zh/real-time-communication.md | 2 +- i18n/zh/router.md | 7 +- i18n/zh/search-engines.md | 4 + i18n/zh/tools.md | 9 - 580 files changed, 9493 insertions(+), 6825 deletions(-) diff --git a/i18n/ar/about.md b/i18n/ar/about.md index 043f602f..9bd52282 100644 --- a/i18n/ar/about.md +++ b/i18n/ar/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/ar/android/general-apps.md b/i18n/ar/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/ar/android/general-apps.md +++ b/i18n/ar/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/ar/browser-extensions.md b/i18n/ar/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/ar/browser-extensions.md +++ b/i18n/ar/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/ar/cloud.md b/i18n/ar/cloud.md index f4c81aad..21677604 100644 --- a/i18n/ar/cloud.md +++ b/i18n/ar/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/ar/data-redaction.md b/i18n/ar/data-redaction.md index df662125..3460cd6e 100644 --- a/i18n/ar/data-redaction.md +++ b/i18n/ar/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/ar/desktop-browsers.md b/i18n/ar/desktop-browsers.md index c9f4cc81..b08cd26d 100644 --- a/i18n/ar/desktop-browsers.md +++ b/i18n/ar/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources - ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/ar/desktop.md b/i18n/ar/desktop.md index 13e2c2a0..b9e9874a 100644 --- a/i18n/ar/desktop.md +++ b/i18n/ar/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/ar/encryption.md b/i18n/ar/encryption.md index ac26bb6f..ee80271b 100644 --- a/i18n/ar/encryption.md +++ b/i18n/ar/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/ar/file-sharing.md b/i18n/ar/file-sharing.md index a59bbf59..839a7419 100644 --- a/i18n/ar/file-sharing.md +++ b/i18n/ar/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/ar/financial-services.md b/i18n/ar/financial-services.md index bd24c50a..4af77052 100644 --- a/i18n/ar/financial-services.md +++ b/i18n/ar/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/ar/frontends.md b/i18n/ar/frontends.md index c03c1138..9e83fe5e 100644 --- a/i18n/ar/frontends.md +++ b/i18n/ar/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. + ## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/ar/language-tools.md b/i18n/ar/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/ar/language-tools.md +++ b/i18n/ar/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/ar/mobile-browsers.md b/i18n/ar/mobile-browsers.md index 0ba1400a..739eceed 100644 --- a/i18n/ar/mobile-browsers.md +++ b/i18n/ar/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/ar/office-suites.md b/i18n/ar/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/ar/office-suites.md +++ b/i18n/ar/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/ar/os/android-overview.md b/i18n/ar/os/android-overview.md index 6ab0125f..152e4926 100644 --- a/i18n/ar/os/android-overview.md +++ b/i18n/ar/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/ar/pastebins.md b/i18n/ar/pastebins.md index 66d41268..7ce4f4b3 100644 --- a/i18n/ar/pastebins.md +++ b/i18n/ar/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/ar/real-time-communication.md b/i18n/ar/real-time-communication.md index a5e505d8..54c745ae 100644 --- a/i18n/ar/real-time-communication.md +++ b/i18n/ar/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/ar/router.md b/i18n/ar/router.md index a80c7301..3e8eb49d 100644 --- a/i18n/ar/router.md +++ b/i18n/ar/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/ar/search-engines.md b/i18n/ar/search-engines.md index 98580a66..06aa75c3 100644 --- a/i18n/ar/search-engines.md +++ b/i18n/ar/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## موفِّرو الخدمة الموصى بهم diff --git a/i18n/ar/tools.md b/i18n/ar/tools.md index de548f14..14bac4bc 100644 --- a/i18n/ar/tools.md +++ b/i18n/ar/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/bn-IN/about.md b/i18n/bn-IN/about.md index 043f602f..9bd52282 100644 --- a/i18n/bn-IN/about.md +++ b/i18n/bn-IN/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/bn-IN/android/general-apps.md b/i18n/bn-IN/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/bn-IN/android/general-apps.md +++ b/i18n/bn-IN/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/bn-IN/browser-extensions.md b/i18n/bn-IN/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/bn-IN/browser-extensions.md +++ b/i18n/bn-IN/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/bn-IN/cloud.md b/i18n/bn-IN/cloud.md index f4c81aad..21677604 100644 --- a/i18n/bn-IN/cloud.md +++ b/i18n/bn-IN/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/bn-IN/data-redaction.md b/i18n/bn-IN/data-redaction.md index df662125..3460cd6e 100644 --- a/i18n/bn-IN/data-redaction.md +++ b/i18n/bn-IN/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/bn-IN/desktop-browsers.md b/i18n/bn-IN/desktop-browsers.md index b74767bc..f63165b7 100644 --- a/i18n/bn-IN/desktop-browsers.md +++ b/i18n/bn-IN/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources - ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/bn-IN/desktop.md b/i18n/bn-IN/desktop.md index 13e2c2a0..b9e9874a 100644 --- a/i18n/bn-IN/desktop.md +++ b/i18n/bn-IN/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/bn-IN/encryption.md b/i18n/bn-IN/encryption.md index ac26bb6f..ee80271b 100644 --- a/i18n/bn-IN/encryption.md +++ b/i18n/bn-IN/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/bn-IN/file-sharing.md b/i18n/bn-IN/file-sharing.md index a59bbf59..839a7419 100644 --- a/i18n/bn-IN/file-sharing.md +++ b/i18n/bn-IN/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/bn-IN/financial-services.md b/i18n/bn-IN/financial-services.md index bd24c50a..4af77052 100644 --- a/i18n/bn-IN/financial-services.md +++ b/i18n/bn-IN/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/bn-IN/frontends.md b/i18n/bn-IN/frontends.md index c03c1138..9e83fe5e 100644 --- a/i18n/bn-IN/frontends.md +++ b/i18n/bn-IN/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/bn-IN/language-tools.md b/i18n/bn-IN/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/bn-IN/language-tools.md +++ b/i18n/bn-IN/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/bn-IN/mobile-browsers.md b/i18n/bn-IN/mobile-browsers.md index 0ba1400a..739eceed 100644 --- a/i18n/bn-IN/mobile-browsers.md +++ b/i18n/bn-IN/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/bn-IN/office-suites.md b/i18n/bn-IN/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/bn-IN/office-suites.md +++ b/i18n/bn-IN/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/bn-IN/os/android-overview.md b/i18n/bn-IN/os/android-overview.md index 6ab0125f..152e4926 100644 --- a/i18n/bn-IN/os/android-overview.md +++ b/i18n/bn-IN/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/bn-IN/pastebins.md b/i18n/bn-IN/pastebins.md index 66d41268..7ce4f4b3 100644 --- a/i18n/bn-IN/pastebins.md +++ b/i18n/bn-IN/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/bn-IN/real-time-communication.md b/i18n/bn-IN/real-time-communication.md index a5e505d8..54c745ae 100644 --- a/i18n/bn-IN/real-time-communication.md +++ b/i18n/bn-IN/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/bn-IN/router.md b/i18n/bn-IN/router.md index a80c7301..3e8eb49d 100644 --- a/i18n/bn-IN/router.md +++ b/i18n/bn-IN/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/bn-IN/search-engines.md b/i18n/bn-IN/search-engines.md index 5d268ab2..d48fc25a 100644 --- a/i18n/bn-IN/search-engines.md +++ b/i18n/bn-IN/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Recommended Providers diff --git a/i18n/bn-IN/tools.md b/i18n/bn-IN/tools.md index c3cee197..8b65f8bf 100644 --- a/i18n/bn-IN/tools.md +++ b/i18n/bn-IN/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/bn/about.md b/i18n/bn/about.md index 043f602f..9bd52282 100644 --- a/i18n/bn/about.md +++ b/i18n/bn/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/bn/android/general-apps.md b/i18n/bn/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/bn/android/general-apps.md +++ b/i18n/bn/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/bn/browser-extensions.md b/i18n/bn/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/bn/browser-extensions.md +++ b/i18n/bn/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/bn/cloud.md b/i18n/bn/cloud.md index f4c81aad..21677604 100644 --- a/i18n/bn/cloud.md +++ b/i18n/bn/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/bn/data-redaction.md b/i18n/bn/data-redaction.md index df662125..3460cd6e 100644 --- a/i18n/bn/data-redaction.md +++ b/i18n/bn/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/bn/desktop-browsers.md b/i18n/bn/desktop-browsers.md index b74767bc..f63165b7 100644 --- a/i18n/bn/desktop-browsers.md +++ b/i18n/bn/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources - ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/bn/desktop.md b/i18n/bn/desktop.md index 13e2c2a0..b9e9874a 100644 --- a/i18n/bn/desktop.md +++ b/i18n/bn/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/bn/encryption.md b/i18n/bn/encryption.md index ac26bb6f..ee80271b 100644 --- a/i18n/bn/encryption.md +++ b/i18n/bn/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/bn/file-sharing.md b/i18n/bn/file-sharing.md index a59bbf59..839a7419 100644 --- a/i18n/bn/file-sharing.md +++ b/i18n/bn/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/bn/financial-services.md b/i18n/bn/financial-services.md index bd24c50a..4af77052 100644 --- a/i18n/bn/financial-services.md +++ b/i18n/bn/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/bn/frontends.md b/i18n/bn/frontends.md index c03c1138..9e83fe5e 100644 --- a/i18n/bn/frontends.md +++ b/i18n/bn/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/bn/language-tools.md b/i18n/bn/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/bn/language-tools.md +++ b/i18n/bn/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/bn/mobile-browsers.md b/i18n/bn/mobile-browsers.md index 0ba1400a..739eceed 100644 --- a/i18n/bn/mobile-browsers.md +++ b/i18n/bn/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/bn/office-suites.md b/i18n/bn/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/bn/office-suites.md +++ b/i18n/bn/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/bn/os/android-overview.md b/i18n/bn/os/android-overview.md index 6ab0125f..152e4926 100644 --- a/i18n/bn/os/android-overview.md +++ b/i18n/bn/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/bn/pastebins.md b/i18n/bn/pastebins.md index 66d41268..7ce4f4b3 100644 --- a/i18n/bn/pastebins.md +++ b/i18n/bn/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/bn/real-time-communication.md b/i18n/bn/real-time-communication.md index a5e505d8..54c745ae 100644 --- a/i18n/bn/real-time-communication.md +++ b/i18n/bn/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/bn/router.md b/i18n/bn/router.md index a80c7301..3e8eb49d 100644 --- a/i18n/bn/router.md +++ b/i18n/bn/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/bn/search-engines.md b/i18n/bn/search-engines.md index 5d268ab2..d48fc25a 100644 --- a/i18n/bn/search-engines.md +++ b/i18n/bn/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Recommended Providers diff --git a/i18n/bn/tools.md b/i18n/bn/tools.md index c3cee197..8b65f8bf 100644 --- a/i18n/bn/tools.md +++ b/i18n/bn/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/cs/about.md b/i18n/cs/about.md index 043f602f..9bd52282 100644 --- a/i18n/cs/about.md +++ b/i18n/cs/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/cs/android/general-apps.md b/i18n/cs/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/cs/android/general-apps.md +++ b/i18n/cs/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/cs/browser-extensions.md b/i18n/cs/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/cs/browser-extensions.md +++ b/i18n/cs/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/cs/cloud.md b/i18n/cs/cloud.md index f4c81aad..21677604 100644 --- a/i18n/cs/cloud.md +++ b/i18n/cs/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/cs/data-redaction.md b/i18n/cs/data-redaction.md index df662125..3460cd6e 100644 --- a/i18n/cs/data-redaction.md +++ b/i18n/cs/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/cs/desktop-browsers.md b/i18n/cs/desktop-browsers.md index 9f4121ab..c096f686 100644 --- a/i18n/cs/desktop-browsers.md +++ b/i18n/cs/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources - ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/cs/desktop.md b/i18n/cs/desktop.md index 13e2c2a0..b9e9874a 100644 --- a/i18n/cs/desktop.md +++ b/i18n/cs/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/cs/encryption.md b/i18n/cs/encryption.md index ac26bb6f..ee80271b 100644 --- a/i18n/cs/encryption.md +++ b/i18n/cs/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/cs/file-sharing.md b/i18n/cs/file-sharing.md index a59bbf59..839a7419 100644 --- a/i18n/cs/file-sharing.md +++ b/i18n/cs/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/cs/financial-services.md b/i18n/cs/financial-services.md index bd24c50a..4af77052 100644 --- a/i18n/cs/financial-services.md +++ b/i18n/cs/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/cs/frontends.md b/i18n/cs/frontends.md index c03c1138..9e83fe5e 100644 --- a/i18n/cs/frontends.md +++ b/i18n/cs/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/cs/language-tools.md b/i18n/cs/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/cs/language-tools.md +++ b/i18n/cs/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/cs/mobile-browsers.md b/i18n/cs/mobile-browsers.md index 0ba1400a..739eceed 100644 --- a/i18n/cs/mobile-browsers.md +++ b/i18n/cs/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/cs/office-suites.md b/i18n/cs/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/cs/office-suites.md +++ b/i18n/cs/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/cs/os/android-overview.md b/i18n/cs/os/android-overview.md index 6ab0125f..152e4926 100644 --- a/i18n/cs/os/android-overview.md +++ b/i18n/cs/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/cs/pastebins.md b/i18n/cs/pastebins.md index 66d41268..7ce4f4b3 100644 --- a/i18n/cs/pastebins.md +++ b/i18n/cs/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/cs/real-time-communication.md b/i18n/cs/real-time-communication.md index a5e505d8..54c745ae 100644 --- a/i18n/cs/real-time-communication.md +++ b/i18n/cs/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/cs/router.md b/i18n/cs/router.md index a80c7301..3e8eb49d 100644 --- a/i18n/cs/router.md +++ b/i18n/cs/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/cs/search-engines.md b/i18n/cs/search-engines.md index 5d268ab2..d48fc25a 100644 --- a/i18n/cs/search-engines.md +++ b/i18n/cs/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Recommended Providers diff --git a/i18n/cs/tools.md b/i18n/cs/tools.md index c3cee197..8b65f8bf 100644 --- a/i18n/cs/tools.md +++ b/i18n/cs/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/de/about.md b/i18n/de/about.md index 9a08298f..6bc883b7 100644 --- a/i18n/de/about.md +++ b/i18n/de/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Auch vorgestellt auf: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) und [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## Geschichte diff --git a/i18n/de/android/general-apps.md b/i18n/de/android/general-apps.md index 48887c58..e7124a80 100644 --- a/i18n/de/android/general-apps.md +++ b/i18n/de/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Schützt vor der/den folgenden Bedrohung(en): + +- [:material-bug-outline: Passive Angriffe](../basics/common-threats.md#security-and-privacy){ .pg-orange } + Wir empfehlen auf dieser Website eine Vielzahl von Android-Apps. Die hier aufgeführten Apps sind Android-exklusiv und verbessern oder ersetzen wichtige Systemfunktionen. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter Logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter unterstützt die profilübergreifende Kontaktsuche und Freigabe von Date

Warnung

-Shelter wird gegenüber [Insular](https://secure-system.gitlab.io/Insular) und [Island](https://github.com/oasisfeng/island) empfohlen, da es das [Blockieren der Kontaktsuche](https://secure-system.gitlab.io/Insular/faq.html) unterstützt. - Bei der Verwendung von Shelter vertraust du vollständig dem Entwickler, da Shelter als [Geräteadministrator](https://developer.android.com/guide/topics/admin/device-admin) fungiert, um das Arbeitsprofil zu erstellen, und es hat umfassenden Zugriff auf die Daten, die im Arbeitsprofil gespeichert sind.
+Shelter wird gegenüber [Insular](https://secure-system.gitlab.io/Insular) und [Island](https://github.com/oasisfeng/island) empfohlen, da es das [Blockieren der Kontaktsuche](https://secure-system.gitlab.io/Insular/faq.html) unterstützt. + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera Logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -93,10 +103,9 @@ Die Metadaten zur Bildausrichtung werden nicht gelöscht. Wenn du den Standort ( ### Secure PDF Viewer -Schützt vor der/den folgenden Bedrohung(en): +Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Angriffe](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/de/browser-extensions.md b/i18n/de/browser-extensions.md index c934d1aa..be9b41cf 100644 --- a/i18n/de/browser-extensions.md +++ b/i18n/de/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/de/cloud.md b/i18n/de/cloud.md index f3ff6e1e..af283c20 100644 --- a/i18n/de/cloud.md +++ b/i18n/de/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/de/data-redaction.md b/i18n/de/data-redaction.md index 72eecde4..c9a7055d 100644 --- a/i18n/de/data-redaction.md +++ b/i18n/de/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Schützt vor der/den folgenden Bedrohung(en): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/de/desktop-browsers.md b/i18n/de/desktop-browsers.md index 4cab77fe..f3e95b88 100644 --- a/i18n/de/desktop-browsers.md +++ b/i18n/de/desktop-browsers.md @@ -295,20 +295,20 @@ Brave ermöglicht die Auswahl zusätzlicher Inhaltsfilter auf der internen Seite
-1. Diese Option bietet ähnliche Funktionen wie die erweiterten [Blockierungsmodi](https://github.com/gorhill/uBlock/wiki/Blocking-mode) von uBlock Origin. -2. Wenn du auf einer bestimmten Website, die du häufig besuchst, eingeloggt bleiben möchtest, kannst du Ausnahmen für die einzelnen Websites festlegen, indem du auf das Schildsymbol in der Adressleiste klickst. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Datenschutz und Sicherheit
-- [x] Wähle **Websites dürfen das V8-Optimierungstool nicht verwenden** unter *Sicherheit* → *V8-Sicherheit verwalten* (1) -- [x] Wähle **Berechtigungen für nicht verwendete Websites automatisch entfernen** unter *Website- und Schutzeinstellungen* -- [x] Wähle **Nicht-proxisiertes UDP deaktivieren** unter [WebRTC-IP-Nutzungsrichtlinien](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [ ] Deaktiviere **Nutzen Sie Google-Services für Push-Benachrichtigungen** -- [x] Wähle **AMP-Seiten automatisch umleiten** -- [x] Wähle **Tracking-URLs automatisch umleiten** -- [x] Wähle **Verhindern, dass Websites aufgrund meiner Spracheinstellungen Fingerabdrücke von mir erstellen** +- [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) +- [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Use Google services for push messaging** +- [x] Select **Auto-redirect AMP pages** +- [x] Select **Auto-redirect tracking URLs** +- [x] Select **Prevent sites from fingerprinting me based on my language preferences**
@@ -339,7 +339,6 @@ Die Web3-Funktionen von Brave können deinen Browser-Fingerabdruck und deine Ang - Wähle **Erweiterungen (kein Backup)** unter *Standard-Ethereum-Wallet* - Wähle **Erweiterungen (kein Backup)** unter *Standard-Solana-Wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Erweiterungen @@ -365,8 +364,6 @@ Mit **Brave Rewards** erhältst du Basic Attention Token (BAT), eine Kryptowähr **Brave Wallet** arbeitet lokal auf Ihrem Computer, unterstützt aber keine privaten Kryptowährungen, weshalb wir auch von dieser Funktion abraten würden. -## Zusätzliche Ressourcen - ## Kriterien **Bitte beachte, dass wir mit keinem der Projekte, die wir empfehlen, verbunden sind.** Zusätzlich zu unseren [Standardkriterien](about/criteria.md) haben wir eine Reihe klarer Anforderungen entwickelt, die es uns ermöglichen, objektive Empfehlungen zu geben. Wir empfehlen, sich mit dieser Liste vertraut zu machen, bevor sich für ein Projekt entschieden wird und eigene Nachforschungen anzustellen, um sicherzustellen, dass es die richtige Wahl ist. diff --git a/i18n/de/desktop.md b/i18n/de/desktop.md index d306071c..de556ce2 100644 --- a/i18n/de/desktop.md +++ b/i18n/de/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Schützt vor der/den folgenden Bedrohung(en): + +- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Schützt vor der/den folgenden Bedrohung(en): + +- [:material-bug-outline: Passive Angriffe](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/de/encryption.md b/i18n/de/encryption.md index 62cea3d7..dd74b988 100644 --- a/i18n/de/encryption.md +++ b/i18n/de/encryption.md @@ -78,6 +78,8 @@ In der Dokumentation von Cryptomator werden die angestrebten [Sicherheitsziele](
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Festplatte) Schützt vor der/den folgenden Bedrohung(en): diff --git a/i18n/de/file-sharing.md b/i18n/de/file-sharing.md index 6bcdc2fb..dc58d73d 100644 --- a/i18n/de/file-sharing.md +++ b/i18n/de/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/de/financial-services.md b/i18n/de/financial-services.md index bd24c50a..1c205558 100644 --- a/i18n/de/financial-services.md +++ b/i18n/de/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Schützt vor der/den folgenden Bedrohung(en): + +- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Schützt vor der/den folgenden Bedrohung(en): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Schützt vor der/den folgenden Bedrohung(en): + +- [:material-eye-outline: Massenüberwachung](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/de/frontends.md b/i18n/de/frontends.md index 4f03d8cf..8a78ff5a 100644 --- a/i18n/de/frontends.md +++ b/i18n/de/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Schützt vor der/den folgenden Bedrohung(en): + +- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warnung

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warnung

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warnung

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warnung

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warnung

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warnung

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warnung

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warnung

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/de/language-tools.md b/i18n/de/language-tools.md index 8b718e45..935d0dbe 100644 --- a/i18n/de/language-tools.md +++ b/i18n/de/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Schützt vor der/den folgenden Bedrohung(en): - [:material-server-network: Diensteanbieter](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Massenüberwachung](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Zensur](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Texte, die in Grammatik-, Rechtschreib- und Stilprüfungsprogramme sowie in Übersetzungsdienste eingegeben werden, können vertrauliche Informationen enthalten, die auf ihren Servern auf unbestimmte Zeit gespeichert werden können. Die auf dieser Seite aufgeführten Sprachtools senden den von dir eingegebenen Text nicht an einen Server und können selbst gehostet und offline verwendet werden, um eine maximale Kontrolle über deine Daten zu gewährleisten. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. Die auf dieser Seite aufgeführten Sprachtools senden den von dir eingegebenen Text nicht an einen Server und können selbst gehostet und offline verwendet werden, um eine maximale Kontrolle über deine Daten zu gewährleisten. ## LanguageTool diff --git a/i18n/de/mobile-browsers.md b/i18n/de/mobile-browsers.md index 5d89b484..4d806133 100644 --- a/i18n/de/mobile-browsers.md +++ b/i18n/de/mobile-browsers.md @@ -64,8 +64,8 @@ Brave basiert auf dem Chromium-Webbrowser-Projekt, sollte sich also vertraut anf Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave basiert auf dem Chromium-Webbrowser-Projekt, sollte sich also vertraut anf Tor Browser ist die einzige Möglichkeit, wirklich anonym im Internet zu surfen. Wenn du Brave benutzt, empfehlen wir dir, die folgenden Einstellungen zu ändern, um deine Privatsphäre vor bestimmten Parteien zu schützen, aber alle anderen Browser als der [Tor Browser](tor.md#tor-browser) werden von *irgendjemandem* in irgendeiner Weise verfolgt werden können. -Diese Optionen findest du unter :material-menu: → **Einstellungen** → **Brave Schutz & Datenschutz** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave enthält einige Anti-Fingerabdruck-Maßnahmen in der [Schutz](https://support.brave.com/hc/articles/360022973471-What-is-Shields)-Funktion. Wir empfehlen, diese Optionen [global](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) für alle Seiten zu konfigurieren. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave enthält einige Anti-Fingerabdruck-Maßnahmen in der [Schutz](https://support.brave.com/hc/articles/360022973471-What-is-Shields)-Funktion. Wir empfehlen, diese Optionen [global](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) für alle Seiten zu konfigurieren. + Die Optionen im Schutz-Menü können je nach Bedarf für jede Website heruntergestuft werden, aber als Standardeinstellung empfehlen wir Folgendes: -
+=== "Android" -- [x] Wähle **Aggressiv** unter **Tracker & Anzeigenblockierung** +
-
-Inhaltsfilter + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave ermöglicht die Auswahl zusätzlicher Inhaltsfilter auf der internen Seite `brave://adblock`. Wir raten davon ab diese Funktion zu verwenden. Verwende stattdessen die voreingestellten Filterlisten. Die Verwendung zusätzlicher Listen hebt dich von anderen Brave-Benutzern ab, kann die Angriffsfläche vergrößern, wenn es eine Sicherheitslücke in Brave gibt und eine bösartige Regel zu einer von dir verwendeten Listen hinzugefügt wird. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. Wir raten davon ab diese Funktion zu verwenden. Verwende stattdessen die voreingestellten Filterlisten. Die Verwendung zusätzlicher Listen hebt dich von anderen Brave-Benutzern ab, kann die Angriffsfläche vergrößern, wenn es eine Sicherheitslücke in Brave gibt und eine bösartige Regel zu einer von dir verwendeten Listen hinzugefügt wird. -- [x] Wähle **AMP-Seiten automatisch umleiten** -- [x] Wähle **Tracking-URLs automatisch umleiten** -- [x] Wähle **streng** unter **Verbindungen auf HTTPS upgraden** -- [x] (Optional) Wähle **Skripte blockieren** (1) -- [x] Wähle **Drittanbieter-Cookies blockieren** unter **Cookies blockieren** -- [x] Wähle **Fingerprinting blockieren** -- [x] Wähle **Fingerprinting über die Spracheinstellungen verhindern** +
-
+ - [x] Select **Forget me when I close this site** -1. Diese Option bietet eine ähnliche Funktionalität wie die erweiterten Blockierungsmodi von uBlock Origin [](https://github.com/gorhill/uBlock/wiki/Blocking-mode) oder die Erweiterung [NoScript](https://noscript.net). +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. Wir raten davon ab diese Funktion zu verwenden. Verwende stattdessen die voreingestellten Filterlisten. Die Verwendung zusätzlicher Listen hebt dich von anderen Brave-Benutzern ab, kann die Angriffsfläche vergrößern, wenn es eine Sicherheitslücke in Brave gibt und eine bösartige Regel zu einer von dir verwendeten Listen hinzugefügt wird. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Wähle **Vergiss mich, wenn ich diese Seite schließe** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Deaktiviere alle Social Media Komponenten #### Other privacy settings -
+=== "Android" -- [x] Wähle **Nicht-proxisiertes UDP deaktivieren** unter [WebRTC-IP-Nutzungsrichtlinien](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Wähle **Kein Schutz** unter **Safe Browsing** (1) -- [ ] Deaktiviere **Websites die Abfrage gespeicherter Zahlungsmethoden erlauben** -- [ ] Deaktiviere **IPFS Gateway** (2) -- [x] Wähle **Registerkarten beim Beenden schließen** -- [ ] Deaktiviere **Erlaubt Produktanalyse, die den Datenschutz respektiert (P3A)** -- [ ] Deaktiviere **Automatisch Diagnosebericht senden** -- [ ] Deaktiviere **Ping der täglichen Nutzung automatisch an Brave senden** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Deaktiviere **Erlaubt Produktanalyse, die den Datenschutz respektiert (P3A)** + - [ ] Deaktiviere **Automatisch Diagnoseberichte senden** + - [ ] Deaktiviere **Ping der täglichen Nutzung automatisch an Brave senden** -1. Brave's [Implementierung von Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) auf Android proxyt **nicht**, wie das Desktop-Pendant, [Safe Browsing Netzwerkanfragen](https://developers.google.com/safe-browsing/v4/update-api#checking-urls). Das bedeutet, dass deine IP-Adresse von Google gesehen (und protokolliert) werden kann. Beachte, dass Safe Browsing für Android-Geräte ohne Google Play Services nicht verfügbar ist. -2. InterPlanetary File System (IPFS) ist ein dezentrales Peer-To-Peer-Netzwerk zum Speichern und Teilen von Daten in einem verteilten Dateisystem. Wenn du die Funktion nicht nutzt, deaktiviere sie. +
+ + 1. Brave's [Implementierung von Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) auf Android proxyt **nicht**, wie das Desktop-Pendant, [Safe Browsing Netzwerkanfragen](https://developers.google.com/safe-browsing/v4/update-api#checking-urls). Das bedeutet, dass deine IP-Adresse von Google gesehen (und protokolliert) werden kann. Beachte, dass Safe Browsing für Android-Geräte ohne Google Play Services nicht verfügbar ist. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Deaktiviere **Ping der täglichen Nutzung automatisch an Brave senden** ### Leo -Diese Optionen sind unter :material-menu: → **Einstellungen** → **Leo** zu finden. +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Deaktiviere **Vorschläge zur Autovervollständigung in Adressleiste anzeigen** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/de/office-suites.md b/i18n/de/office-suites.md index 829e816b..287fffff 100644 --- a/i18n/de/office-suites.md +++ b/i18n/de/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/de/os/android-overview.md b/i18n/de/os/android-overview.md index 08c9769b..6fa22795 100644 --- a/i18n/de/os/android-overview.md +++ b/i18n/de/os/android-overview.md @@ -92,19 +92,27 @@ Datenschutzfreundliche Anwendungen wie [Bitwarden](https://reports.exodus-privac ### Benutzerprofile -Mehrere Benutzerprofile finden Sie unter **Einstellungen** → **System** → **Mehrere Benutzer** und sind der einfachste Weg, für Isolierung in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Arbeits-Profil -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Kill-Switch diff --git a/i18n/de/pastebins.md b/i18n/de/pastebins.md index 90fa1f21..833d15b6 100644 --- a/i18n/de/pastebins.md +++ b/i18n/de/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/de/real-time-communication.md b/i18n/de/real-time-communication.md index 935d4bb2..e98f1c1b 100644 --- a/i18n/de/real-time-communication.md +++ b/i18n/de/real-time-communication.md @@ -213,7 +213,7 @@ Nachrichten und Dateien, die in privaten Räumen (für die eine Einladung erford Profilbilder, Reaktionen und Spitznamen sind nicht verschlüsselt. -Gruppen-Sprach- und Videoanrufe sind [nicht](https://github.com/vector-im/element-web/issues/12878) E2EE und verwenden Jitsi, aber dies wird sich mit [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401) ändern. Gruppenanrufe haben derzeit [keine Authentifizierung](https://github.com/vector-im/element-web/issues/13074), d. h., dass auch Personen, die nicht teil des Raumes sind, an den Anrufen teilnehmen können. Wir empfehlen, diese Funktion nicht für private Besprechungen zu verwenden. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. Das Matrix-Protokoll selbst [unterstützt theoretisch Forward Secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1]. Dies wird jedoch [derzeit in Element nicht unterstützt](https://github.com/vector-im/element-web/issues/7101), da es einige Aspekte der Benutzerfreundlichkeit, wie z. B. das Schlüssel-Backup und den gemeinsamen Nachrichtenverlauf, beeinträchtigt. diff --git a/i18n/de/router.md b/i18n/de/router.md index 8c3f07f3..747eaba5 100644 --- a/i18n/de/router.md +++ b/i18n/de/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Nachstehend sind ein paar alternative Betriebssysteme gelistet, die auf Routern, WLAN-Zugangspunkten usw. eingesetzt werden können. +Schützt vor der/den folgenden Bedrohung(en): + +- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Angriffe](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/de/search-engines.md b/i18n/de/search-engines.md index cb2ad636..511ddb83 100644 --- a/i18n/de/search-engines.md +++ b/i18n/de/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Schützt vor der/den folgenden Bedrohung(en): + +- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Empfohlene DNS-Anbieter diff --git a/i18n/de/tools.md b/i18n/de/tools.md index a118196c..5774dd2c 100644 --- a/i18n/de/tools.md +++ b/i18n/de/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/el/about.md b/i18n/el/about.md index 935cff65..1d158ce6 100644 --- a/i18n/el/about.md +++ b/i18n/el/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/el/android/general-apps.md b/i18n/el/android/general-apps.md index 6b4dd411..ad6f62a9 100644 --- a/i18n/el/android/general-apps.md +++ b/i18n/el/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/el/browser-extensions.md b/i18n/el/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/el/browser-extensions.md +++ b/i18n/el/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/el/cloud.md b/i18n/el/cloud.md index f4c81aad..21677604 100644 --- a/i18n/el/cloud.md +++ b/i18n/el/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/el/data-redaction.md b/i18n/el/data-redaction.md index df662125..3460cd6e 100644 --- a/i18n/el/data-redaction.md +++ b/i18n/el/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/el/desktop-browsers.md b/i18n/el/desktop-browsers.md index 1bb63658..e35e4c71 100644 --- a/i18n/el/desktop-browsers.md +++ b/i18n/el/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ If you wish to stay logged in to a particular site you visit often, you can set - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ If you wish to stay logged in to a particular site you visit often, you can set Το **Brave Wallet** λειτουργεί τοπικά στον υπολογιστή σας, αλλά δεν υποστηρίζει ιδιωτικά κρυπτονομίσματα, οπότε θα αποθαρρύναμε τη χρήση και αυτής της δυνατότητας. -## Επιπλέον πόροι - ## Κριτήρια **Σημειώστε ότι δε συσχετιζόμαστε με κανένα από τα project που προτείνουμε.** Εκτός από τα [συνήθη κριτήριά μας](about/criteria.md), έχουμε αναπτύξει ένα σαφές σύνολο απαιτήσεων που μας επιτρέπουν να παρέχουμε αντικειμενικές συστάσεις. Σας προτείνουμε να εξοικειωθείτε με αυτόν τον κατάλογο προτού επιλέξετε να χρησιμοποιήσετε ένα project και να διεξάγετε τη δική σας έρευνα για να βεβαιωθείτε ότι είναι η σωστή επιλογή για εσάς. diff --git a/i18n/el/desktop.md b/i18n/el/desktop.md index 13e2c2a0..b9e9874a 100644 --- a/i18n/el/desktop.md +++ b/i18n/el/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/el/encryption.md b/i18n/el/encryption.md index c548bce4..11eefb95 100644 --- a/i18n/el/encryption.md +++ b/i18n/el/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/el/file-sharing.md b/i18n/el/file-sharing.md index a59bbf59..839a7419 100644 --- a/i18n/el/file-sharing.md +++ b/i18n/el/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/el/financial-services.md b/i18n/el/financial-services.md index bd24c50a..4af77052 100644 --- a/i18n/el/financial-services.md +++ b/i18n/el/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/el/frontends.md b/i18n/el/frontends.md index ea333c7b..ea57a69e 100644 --- a/i18n/el/frontends.md +++ b/i18n/el/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Συμβουλή

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/el/language-tools.md b/i18n/el/language-tools.md index 9da71f7e..378592db 100644 --- a/i18n/el/language-tools.md +++ b/i18n/el/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/el/mobile-browsers.md b/i18n/el/mobile-browsers.md index 4b313b76..3f6fa4b6 100644 --- a/i18n/el/mobile-browsers.md +++ b/i18n/el/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/el/office-suites.md b/i18n/el/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/el/office-suites.md +++ b/i18n/el/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/el/os/android-overview.md b/i18n/el/os/android-overview.md index a7f88380..fc6a48c3 100644 --- a/i18n/el/os/android-overview.md +++ b/i18n/el/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/el/pastebins.md b/i18n/el/pastebins.md index 80dd83c4..9cc7a2f5 100644 --- a/i18n/el/pastebins.md +++ b/i18n/el/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/el/real-time-communication.md b/i18n/el/real-time-communication.md index a5e505d8..54c745ae 100644 --- a/i18n/el/real-time-communication.md +++ b/i18n/el/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/el/router.md b/i18n/el/router.md index 406b0372..d7c5f0c1 100644 --- a/i18n/el/router.md +++ b/i18n/el/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Παρακάτω είναι μερικά εναλλακτικά λειτουργικά συστήματα τα οποία μπορούν να χρησιμοποιηθούν σε δρομολογητές, σημεία πρόσβασης Wi-Fi, κλπ. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/el/search-engines.md b/i18n/el/search-engines.md index 5d268ab2..d48fc25a 100644 --- a/i18n/el/search-engines.md +++ b/i18n/el/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Recommended Providers diff --git a/i18n/el/tools.md b/i18n/el/tools.md index 102c1e3e..91bcfd0a 100644 --- a/i18n/el/tools.md +++ b/i18n/el/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/eo/about.md b/i18n/eo/about.md index 043f602f..9bd52282 100644 --- a/i18n/eo/about.md +++ b/i18n/eo/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/eo/android/general-apps.md b/i18n/eo/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/eo/android/general-apps.md +++ b/i18n/eo/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/eo/browser-extensions.md b/i18n/eo/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/eo/browser-extensions.md +++ b/i18n/eo/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/eo/cloud.md b/i18n/eo/cloud.md index e2863a88..c61f1c87 100644 --- a/i18n/eo/cloud.md +++ b/i18n/eo/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/eo/data-redaction.md b/i18n/eo/data-redaction.md index df662125..941a0e61 100644 --- a/i18n/eo/data-redaction.md +++ b/i18n/eo/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Publika Ekspozicio](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/eo/desktop-browsers.md b/i18n/eo/desktop-browsers.md index b74767bc..f63165b7 100644 --- a/i18n/eo/desktop-browsers.md +++ b/i18n/eo/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources - ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/eo/desktop.md b/i18n/eo/desktop.md index 13e2c2a0..d10295d1 100644 --- a/i18n/eo/desktop.md +++ b/i18n/eo/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Malaktivaj Atakoj](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/eo/encryption.md b/i18n/eo/encryption.md index 2dd018c6..516f11d4 100644 --- a/i18n/eo/encryption.md +++ b/i18n/eo/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/eo/file-sharing.md b/i18n/eo/file-sharing.md index e60030a3..30fe4eff 100644 --- a/i18n/eo/file-sharing.md +++ b/i18n/eo/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/eo/financial-services.md b/i18n/eo/financial-services.md index bd24c50a..8532d1a7 100644 --- a/i18n/eo/financial-services.md +++ b/i18n/eo/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Publika Ekspozicio](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Amasgvatado](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/eo/frontends.md b/i18n/eo/frontends.md index c03c1138..9e83fe5e 100644 --- a/i18n/eo/frontends.md +++ b/i18n/eo/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/eo/language-tools.md b/i18n/eo/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/eo/language-tools.md +++ b/i18n/eo/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/eo/mobile-browsers.md b/i18n/eo/mobile-browsers.md index 0ba1400a..739eceed 100644 --- a/i18n/eo/mobile-browsers.md +++ b/i18n/eo/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/eo/office-suites.md b/i18n/eo/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/eo/office-suites.md +++ b/i18n/eo/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/eo/os/android-overview.md b/i18n/eo/os/android-overview.md index 6ab0125f..152e4926 100644 --- a/i18n/eo/os/android-overview.md +++ b/i18n/eo/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/eo/pastebins.md b/i18n/eo/pastebins.md index 66d41268..7ce4f4b3 100644 --- a/i18n/eo/pastebins.md +++ b/i18n/eo/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/eo/real-time-communication.md b/i18n/eo/real-time-communication.md index e751c364..055fa9c6 100644 --- a/i18n/eo/real-time-communication.md +++ b/i18n/eo/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/eo/router.md b/i18n/eo/router.md index a80c7301..147767bc 100644 --- a/i18n/eo/router.md +++ b/i18n/eo/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Malaktivaj Atakoj](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/eo/search-engines.md b/i18n/eo/search-engines.md index 5d268ab2..d48fc25a 100644 --- a/i18n/eo/search-engines.md +++ b/i18n/eo/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Recommended Providers diff --git a/i18n/eo/tools.md b/i18n/eo/tools.md index c3cee197..8b65f8bf 100644 --- a/i18n/eo/tools.md +++ b/i18n/eo/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/es/about.md b/i18n/es/about.md index d95f3b3d..c8f7ddf4 100644 --- a/i18n/es/about.md +++ b/i18n/es/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/es/android/general-apps.md b/i18n/es/android/general-apps.md index 546618e9..e490dbba 100644 --- a/i18n/es/android/general-apps.md +++ b/i18n/es/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-bug-outline: Ataques Pasivos](../basics/common-threats.md#security-and-privacy){ .pg-orange } + En este sitio web recomendamos una amplia variedad de aplicaciones para Android. Las aplicaciones que se encuentran listadas son exclusivas para Android y están diseñadas para mejorar o reemplazar funcionalidades clave del sistema. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Logo de Shelter](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter permite bloquear la búsqueda de contactos entre perfiles y compartir ar

Advertencia

-Se recomienda Shelter en lugar de [Insular](https://secure-system.gitlab.io/Insular) e [Island](https://github.com/oasisfeng/island), ya que admite [bloqueo de búsqueda de contactos](https://secure-system.gitlab.io/Insular/faq.html). - Al utilizar Shelter, estás depositando toda tu confianza en su desarrollador, ya que Shelter actúa como [Administrador del Dispositivo](https://developer.android.com/guide/topics/admin/device-admin) para crear el Perfil de Trabajo, y tiene un amplio acceso a los datos almacenados dentro del Perfil de Trabajo.
+Se recomienda Shelter en lugar de [Insular](https://secure-system.gitlab.io/Insular) e [Island](https://github.com/oasisfeng/island), ya que admite [bloqueo de búsqueda de contactos](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ Los metadatos de orientación de la imagen no se borran. Si activas la localizac Protege contra la(s) siguiente(s) amenaza(s): - [:material-target-account: Ataques Dirigidos](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Ataques Pasivos](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/es/browser-extensions.md b/i18n/es/browser-extensions.md index e1b27a77..45db65e6 100644 --- a/i18n/es/browser-extensions.md +++ b/i18n/es/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin también tiene una versión "Lite" de su extensión, que ofrece un
Downloads "Descargas" -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md index 01db39d7..2e34d38e 100644 --- a/i18n/es/cloud.md +++ b/i18n/es/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Ejecutar una versión local de Peergos junto con una cuenta registrada en su servicio alojado de pago te permite acceder a tu almacenamiento Peergos sin depender de DNS o autoridades de certificación TLS, y mantener una copia de seguridad de tus datos en su nube. La experiencia del usuario debería ser la misma tanto si ejecutas su servidor de escritorio como si utilizas su interfaz web alojada. -Peergos fue [auditado](https://cure53.de/pentest-report_peergos.pdf) por Cure53 en septiembre de 2019, y todos los problemas encontrados se solucionaron posteriormente. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). La solución actual consiste en utilizar [la PWA](https://peergos.net) móvil en su lugar. diff --git a/i18n/es/data-redaction.md b/i18n/es/data-redaction.md index a6692862..a41e9ec2 100644 --- a/i18n/es/data-redaction.md +++ b/i18n/es/data-redaction.md @@ -6,6 +6,10 @@ description: Utiliza estas herramientas para eliminar metadatos como la ubicaci cover: data-redaction.webp --- +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-account-search: Exposición pública](basics/common-threats.md#limiting-public-information ""){.pg-green} + Cuando compartas archivos, asegúrate de remover los metadatos asociados. Archivos de imagen comúnmente incluyen datos [Exif](https://en.wikipedia.org/wiki/Exif). Fotos a veces incluyen hasta coordenadas GPS en los metadatos del archivo. ## Equipo de escritorio diff --git a/i18n/es/desktop-browsers.md b/i18n/es/desktop-browsers.md index 4d8e2819..81380896 100644 --- a/i18n/es/desktop-browsers.md +++ b/i18n/es/desktop-browsers.md @@ -295,20 +295,20 @@ Brave te permite seleccionar filtros de contenido adicionales en la página inte
-1. Esta opción proporciona una funcionalidad similar a los [modos de bloqueo](https://github.com/gorhill/uBlock/wiki/Blocking-mode) avanzados de uBlock Origin. -2. Si deseas permanecer conectado a un sitio concreto que visitas a menudo, puedes establecer excepciones por sitio haciendo clic en el icono del Escudo de la barra de direcciones. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacidad y seguridad
-- [x] Selecciona **No permitir que los sitios usen el optimizador de V8** en *Seguridad* → *Gestionar la seguridad de V8* (1) -- [x] Selecciona **Quitar automáticamente los permisos de los sitios que no se usan** en *Configuración del sitio y de los Escudos* -- [x] Selecciona **Desactivar el UDP sin proxy** en [Política de gestión de IP de WebRTC](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [ ] Desmarca **Utiliza los servicios de Google para la mensajería push** -- [x] Selecciona **Redirigir automáticamente las páginas AMP** -- [x] Selecciona **URL de seguimiento de redirección automática** -- [x] Selecciona **Impedir que los sitios obtengan mis huellas digitales en función de mis preferencias de idioma** +- [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) +- [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Use Google services for push messaging** +- [x] Select **Auto-redirect AMP pages** +- [x] Select **Auto-redirect tracking URLs** +- [x] Select **Prevent sites from fingerprinting me based on my language preferences**
@@ -339,7 +339,6 @@ Las funciones Web3 de Brave pueden aumentar potencialmente la huella digital de - Selecciona **Extensiones (sin copia de seguridad)** en *Cartera predeterminada de Ethereum* - Selecciona **Extensiones (sin copia de seguridad)** en *Cartera predeterminada de Solana* -- Establece *Método para resolver los recursos IPFS* como **Deshabilitado** #### Extensiones @@ -365,8 +364,6 @@ Las funciones Web3 de Brave pueden aumentar potencialmente la huella digital de **Brave Wallet** funciona localmente en tu ordenador, pero no admite ninguna criptomoneda privada, por lo que desaconsejamos utilizar esta función también. -## Recursos Adicionales - ## Criterios **Por favor, ten en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. diff --git a/i18n/es/desktop.md b/i18n/es/desktop.md index 079fc427..35bc903e 100644 --- a/i18n/es/desktop.md +++ b/i18n/es/desktop.md @@ -5,6 +5,10 @@ description: Las distribuciones de Linux se recomiendan comúnmente para la prot cover: desktop.webp --- +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-account-cash: Capitalismo de Vigilancia](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Las distribuciones de Linux se recomiendan comúnmente para la protección de la privacidad y la libertad del software. Si aún no utiliza Linux, a continuación le sugerimos que pruebe algunas distribuciones, así como algunos consejos generales para mejorar la privacidad y la seguridad que son aplicables a muchas distribuciones de Linux. - [Vista General de Linux :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux tiene un ciclo de actualización continuo. No existe un calendario fi Al ser una distribución DIY, se espera que usted [configure y mantenga](os/linux-overview.md#arch-based-distributions) su sistema por su cuenta. Arch dispone de un [instalador oficial](https://wiki.archlinux.org/title/Archinstall) para facilitar el proceso de instalación. -Gran parte de los [paquetes de Arch Linux](https://reproducible.archlinux.org) son [reproducibles](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Distribuciones Atómicas @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (la fuente principal de paquetes) se encuentra en un único repositorio de GitHub. También puedes definir tus propios paquetes en el mismo idioma e incluirlos fácilmente en tu configuración. -Nix es un gestor de paquetes basado en el código fuente; si no hay ningún paquete preconstruido disponible en la caché de binarios, Nix simplemente construirá el paquete desde el código fuente usando su definición. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix es un gestor de paquetes basado en el código fuente; si no hay ningún paquete preconstruido disponible en la caché de binarios, Nix simplemente construirá el paquete desde el código fuente usando su definición. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Distribuciones Enfocadas en el Anonimato @@ -135,7 +139,7 @@ Nix es un gestor de paquetes basado en el código fuente; si no hay ningún paqu ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** está basado en [Kicksecure](#kicksecure), una bifurcación de Debian centrada en la seguridad. Su objetivo es proporcionar privacidad, seguridad y anonimato en Internet. Whonix se utiliza mejor junto con [Qubes OS](#qubes-os). +**Whonix** está basado en [Kicksecure](#kicksecure), una bifurcación de Debian centrada en la seguridad. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix se utiliza mejor junto con [Qubes OS](#qubes-os). [:octicons-home-16: Página Principal](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Servicio Onion" } @@ -158,7 +162,7 @@ Whonix se utiliza mejor [junto con Qubes](https://whonix.org/wiki/Qubes/Why_use_ ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** es un sistema operativo basado en Debian que enruta todas las comunicaciones a través de Tor, y que puede arrancar en casi cualquier ordenador desde un DVD, una memoria USB o una tarjeta SD. Utiliza [Tor](tor.md) para preservar la privacidad y el anonimato a la vez que elude la censura, y no deja rastro de sí mismo en el ordenador en el que se utiliza una vez apagado. +**Tails** es un sistema operativo basado en Debian que enruta todas las comunicaciones a través de Tor, y que puede arrancar en casi cualquier ordenador desde un DVD, una memoria USB o una tarjeta SD. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Página Principal](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentación} @@ -183,6 +187,10 @@ Tails está diseñado para formatearse por completo después de cada reinicio. E ## Distribuciones Enfocadas en la Seguridad +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-bug-outline: Ataques pasivos](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ Tails está diseñado para formatearse por completo después de cada reinicio. E
-Qubes OS asegura el ordenador aislando subsistemas (por ejemplo, redes, USB, etc.) y aplicaciones en *qubes*separadas. En caso de que una parte del sistema se vea comprometida, es probable que el aislamiento adicional proteja el resto de *qubes* y el sistema central. +Qubes OS asegura el ordenador aislando subsistemas (por ejemplo, redes, USB, etc.) y aplicaciones en *qubes*separadas. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. Para más información sobre el funcionamiento de Qubes, consulta nuestra página [Qubes OS overview](os/qubes-overview.md). @@ -242,3 +250,5 @@ La elección de una distribución Linux adecuada para ti dependerá de una gran - Mantener un sistema operativo es un gran reto, y los proyectos más pequeños tienden a cometer más errores evitables o a retrasar las actualizaciones críticas (o peor aún, a desaparecer por completo). Nos inclinamos por proyectos que probablemente seguirán existiendo dentro de 10 años (ya sea gracias al respaldo de empresas o a un apoyo muy significativo de la comunidad), y nos alejamos de los proyectos construidos a mano o con un número reducido de mantenedores. Además, [nuestros criterios estándar](about/criteria.md) para los proyectos recomendados se siguen aplicando. **Ten en cuenta que no estamos afiliados a ninguno de los proveedores que recomendamos.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/es/encryption.md b/i18n/es/encryption.md index cf232cb1..30a57dbc 100644 --- a/i18n/es/encryption.md +++ b/i18n/es/encryption.md @@ -78,6 +78,8 @@ La documentación de Cryptomator detalla con más detalle su [objetivo de seguri
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disco) Protege contra la(s) siguiente(s) amenaza(s): diff --git a/i18n/es/file-sharing.md b/i18n/es/file-sharing.md index f9c7cbb7..dc30c443 100644 --- a/i18n/es/file-sharing.md +++ b/i18n/es/file-sharing.md @@ -143,7 +143,6 @@ No recomendamos utilizar la [aplicación con cifrado de extremo a extremo](https
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/es/financial-services.md b/i18n/es/financial-services.md index 7ff4535b..93473561 100644 --- a/i18n/es/financial-services.md +++ b/i18n/es/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-account-cash: Capitalismo de Vigilancia](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Realizar pagos en línea es uno de los principales desafíos para la privacidad. Estos servicios pueden ayudarle a proteger su privacidad frente a los comercios y otros rastreadores, siempre que conozca bien cómo realizar pagos privados de forma eficaz. Le recomendamos encarecidamente que primero lea nuestro apartado de pagos antes de realizar cualquier compra: [Hacer Pagos Privados: :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Servicios de Enmascaramiento de Pagos +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-account-search: Exposición pública](basics/common-threats.md#limiting-public-information ""){.pg-green} + Hay una serie de servicios que ofrecen "tarjetas de débito virtuales" que puede utilizar con comercios en línea sin revelar sus datos bancarios o de facturación reales en la mayoría de los casos. Es importante tener en cuenta que estos servicios financieros **no** son anónimos y están sujetos a las leyes de "Conozca a su cliente" (KYC) y pueden requerir su DNI u otra información identificativa. Estos servicios son útiles principalmente para protegerle de las filtraciones de datos de los comercios, del seguimiento menos sofisticado o de la correlación de compras por parte de las agencias de marketing y del robo de datos en línea; y **no** para realizar una compra de forma totalmente anónima.
@@ -67,6 +75,10 @@ Por el momento, las tarjetas virtuales de MySudo solo están disponibles a trav ## Mercados en Línea de Tarjetas Regalo +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-eye-outline: Vigilancia masiva](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + Estos servicios le permiten comprar tarjetas de regalo para una gran variedad de comercios en línea con [criptomonedas](cryptocurrency.md). Algunos de estos servicios ofrecen opciones de verificación de identidad para límites más altos, pero también permiten cuentas con sólo una dirección de correo electrónico. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ Estos servicios le permiten comprar tarjetas de regalo para una gran variedad de
- ### Criterios **Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de elegir utilizar un proyecto y realizar su propia investigación para asegurarse que es la elección ideal para usted. diff --git a/i18n/es/frontends.md b/i18n/es/frontends.md index f2b62938..d6d15e92 100644 --- a/i18n/es/frontends.md +++ b/i18n/es/frontends.md @@ -5,11 +5,15 @@ description: Estas interfaces de código abierto para varios servicios de Intern cover: frontends.webp --- -A veces, los servicios intentarán obligarle a registrarse mediante el bloqueo al acceso a los contenidos con molestas ventanas emergentes. También pueden fallar si no se activa JavaScript. Estas interfaces pueden permitirle eludir estas restricciones. +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-account-cash: Capitalismo de Vigilancia](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +A veces, los servicios intentarán obligarle a registrarse mediante el bloqueo al acceso a los contenidos con molestas ventanas emergentes. También pueden fallar si no se activa JavaScript. These frontends can allow you to circumvent these restrictions. Si decides autoalojar, es importante que otras personas utilicen también tu instancia para que puedas pasar desapercibido. Debes tener cuidado con dónde y cómo alojas, ya que el uso de otras personas estará vinculado a tu alojamiento. -Cuando utilices una instancia gestionada por otra persona, asegúrate de leer la política de privacidad de esa instancia en específico. Pueden ser modificados por sus propietarios y, por lo tanto, pueden no reflejar la política por defecto. Algunas instancias tienen direcciones .onion de [Tor](tor.md) que pueden otorgar algo de privacidad mientras tus búsquedas no contengan PII (Información Personal Identificable). +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). Pueden ser modificados por sus propietarios y, por lo tanto, pueden no reflejar la política por defecto. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ Cuando utilices una instancia gestionada por otra persona, asegúrate de leer la ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -Existen varias instancias públicas, algunas de las cuales disponen de soporte para servicios onion [Tor](tor.md). +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Consejo

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,12 +56,12 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** es un frontend de código abierto para el sitio web [TikTok](https://tiktok.com) que también es autoalojable. -Existen varias instancias públicas, algunas de las cuales disponen de soporte para servicios onion [Tor](tor.md). +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. -[:octicons-repo-16: Repositorio](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Instancias Públicas"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Código Fuente" } +[:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok es útil si quieres desactivar JavaScript en tu navegador, como [Tor Br ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** es una aplicación de escritorio gratuita y de código abierto para [YouTube](https://youtube.com). Al usar FreeTube, su lista de suscripciones y sus listas de reproducción se guardan localmente en su dispositivo. - -Por defecto, FreeTube bloquea todos los anuncios de YouTube. Además, FreeTube se integra opcionalmente con [SponsorBlock](https://sponsor.ajay.app) para ayudarle a saltar segmentos de vídeo patrocinados. - -[:octicons-home-16: Página Principal](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribuir } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Advertencia

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera usar una [VPN](vpn.md) o [Tor](tor.md) si tu [modelo de amenaza](basics/threat-modeling.md) requiere ocultar tu dirección IP. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Página Principal](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribuir } - -
-Downloads "Descargas" - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Advertencia

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera usar una [VPN](vpn.md) o [Tor](tor.md) si tu [modelo de amenaza](basics/threat-modeling.md) requiere ocultar tu dirección IP. - -
- -Por defecto, Yattee bloquea todos los anuncios de YouTube. Además, Yattee se integra opcionalmente con [SponsorBlock](https://sponsor.ajay.app) para ayudarle a saltar segmentos de vídeo patrocinados. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** es una aplicación Android gratuita y de código abierto para [YouTube](https://youtube.com) que utiliza la API [Piped](#piped). - -LibreTube le permite almacenar su lista de suscripciones y listas de reproducción localmente en su dispositivo Android, o en una cuenta de su instancia de Piped preferida, lo que le permite acceder a ellas sin problemas desde otros dispositivos. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads "Descargas" - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Advertencia

- -Cuando uses LibreTube, tu dirección IP será visible para la instancia [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) que elijas y/o [SponsorBlock](https://sponsor.ajay.app) dependiendo de tu configuración. Considera usar una [VPN](vpn.md) o [Tor](tor.md) si tu [modelo de amenaza](basics/threat-modeling.md) requiere ocultar tu dirección IP. - -
- -Por defecto, LibreTube bloquea todos los anuncios de YouTube. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. Puede configurar completamente los tipos de segmentos que SponsorBlock omitirá, o desactivarlo por completo. También hay un botón en el propio reproductor de vídeo para desactivarlo para un vídeo específico si lo desea. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** es una aplicación Android gratuita y de código abierto para [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com) y [PeerTube](https://joinpeertube.org) (1). - -Tu lista de suscripciones y tus listas de reproducción se guardan localmente en tu dispositivo Android. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads "Descargas" - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. La instancia por defecto es [FramaTube](https://framatube.org), sin embargo, se pueden añadir más a través de **Ajustes** → **Contenido** → **Instancias de PeerTube** - -
-

Advertencia

- -Al utilizar NewPipe, su dirección IP será visible para los proveedores de vídeo utilizados. Considera usar una [VPN](vpn.md) o [Tor](tor.md) si tu [modelo de amenaza](basics/threat-modeling.md) requiere ocultar tu dirección IP. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ Al utilizar NewPipe, su dirección IP será visible para los proveedores de víd **Invidious** es una interfaz gratuita y de código abierto para [YouTube](https://youtube.com) que además es autoalojable. -Existen varias instancias públicas, algunas de las cuales disponen de soporte para servicios onion [Tor](tor.md). +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. -[:octicons-home-16: Página Principal](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Instancias Públicas"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious es útil si deseas desactivar JavaScript en tu navegador, como [Tor Br Piped requiere JavaScript para funcionar y existen varias instancias públicas. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** es una aplicación de escritorio gratuita y de código abierto para [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +Al usar FreeTube, su lista de suscripciones y sus listas de reproducción se guardan localmente en su dispositivo. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Advertencia

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera usar una [VPN](vpn.md) o [Tor](tor.md) si tu [modelo de amenaza](basics/threat-modeling.md) requiere ocultar tu dirección IP. + +
+ +Por defecto, FreeTube bloquea todos los anuncios de YouTube. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads "Descargas" + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Advertencia

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera usar una [VPN](vpn.md) o [Tor](tor.md) si tu [modelo de amenaza](basics/threat-modeling.md) requiere ocultar tu dirección IP. + +
+ +Por defecto, Yattee bloquea todos los anuncios de YouTube. Además, Yattee se integra opcionalmente con [SponsorBlock](https://sponsor.ajay.app) para ayudarle a saltar segmentos de vídeo patrocinados. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** es una aplicación Android gratuita y de código abierto para [YouTube](https://youtube.com) que utiliza la API [Piped](#piped). + +Tu lista de suscripciones y tus listas de reproducción se guardan localmente en tu dispositivo Android. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads "Descargas" + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Advertencia

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera usar una [VPN](vpn.md) o [Tor](tor.md) si tu [modelo de amenaza](basics/threat-modeling.md) requiere ocultar tu dirección IP. + +
+ +Por defecto, LibreTube bloquea todos los anuncios de YouTube. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. Puede configurar completamente los tipos de segmentos que SponsorBlock omitirá, o desactivarlo por completo. También hay un botón en el propio reproductor de vídeo para desactivarlo para un vídeo específico si lo desea. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** es una aplicación Android gratuita y de código abierto para [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com) y [PeerTube](https://joinpeertube.org) (1). + +Tu lista de suscripciones y tus listas de reproducción se guardan localmente en tu dispositivo Android. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads "Descargas" + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Advertencia

+ +Al utilizar NewPipe, su dirección IP será visible para los proveedores de vídeo utilizados. Considera usar una [VPN](vpn.md) o [Tor](tor.md) si tu [modelo de amenaza](basics/threat-modeling.md) requiere ocultar tu dirección IP. + +
+ ## Criterios **Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted. -Las interfaces de usuario recomendadas... - -- Deben ser software de código abierto. -- Deben ser autoalojables. -- Deben ofrecer todas las funciones básicas del sitio web a los usuarios anónimos. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Las interfaces de usuario recomendadas... + +- Deben ser software de código abierto. +- Deben ser autoalojables. +- Deben ofrecer todas las funciones básicas del sitio web a los usuarios anónimos. diff --git a/i18n/es/language-tools.md b/i18n/es/language-tools.md index 0d644206..810019f8 100644 --- a/i18n/es/language-tools.md +++ b/i18n/es/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protege contra la(s) siguiente(s) amenaza(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/es/mobile-browsers.md b/i18n/es/mobile-browsers.md index 64af84b7..2f4ac417 100644 --- a/i18n/es/mobile-browsers.md +++ b/i18n/es/mobile-browsers.md @@ -61,11 +61,11 @@ Brave se basa en el proyecto de navegador web Chromium, por lo que debería resu [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
@@ -75,70 +75,110 @@ Brave se basa en el proyecto de navegador web Chromium, por lo que debería resu Tor Browser es la única manera de navegar por Internet de forma verdaderamente anónima. Cuando uses Brave, te recomendamos cambiar los siguiente ajustes para proteger tu privacidad de ciertas partes, pero todos los navegadores que no sean [Tor Browser](tor.md#tor-browser) serán rastreables por *alguien* en un sentido u otro. -Estas opciones se pueden encontrar en :material-menu: → **Configuración** → **Protecciones y privacidad de Brave** +=== "Android" -#### Escudos + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. + +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. + +#### Brave shields global defaults Brave incluye algunas medidas antihuellas en su función [Escudos](https://support.brave.com/hc/articles/360022973471-What-is-Shields). Te sugerimos configurar estas opciones [globalmente](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) en todas las páginas que visites. -#### Valores generales predeterminados de los escudos de Brave - Las opciones de los escudos pueden reducirse según las necesidades de cada sitio, pero por defecto recomendamos configurar lo siguiente: -
+=== "Android" -- [x] Selecciona **Agresivo** en **Bloquear rastreadores y anuncios** +
-
-Usa listas de filtros predeterminadas + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave te permite seleccionar filtros de contenido adicionales en la página interna `brave://adblock`. Desaconsejamos el uso de esta función; en su lugar, mantenga las listas de filtros por defecto. El uso de listas adicionales le hará destacar entre los demás usuarios de Brave y también puede aumentar la superficie de ataque si hay un exploit en Brave y se añade una regla maliciosa a una de las listas que utiliza. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. Desaconsejamos el uso de esta función; en su lugar, mantenga las listas de filtros por defecto. El uso de listas adicionales le hará destacar entre los demás usuarios de Brave y también puede aumentar la superficie de ataque si hay un exploit en Brave y se añade una regla maliciosa a una de las listas que utiliza. -- [x] Selecciona **Redirigir automáticamente las páginas AMP** -- [x] Selecciona **URL de seguimiento de redirección automática** -- [x] Selecciona **estricto** en **Mejorar conexiones a HTTPS** -- [x] (Opcional) Selecciona **Bloquear Scripts** (1) -- [x] Selecciona **Block cookies de terceros** en **Bloquear cookies** -- [x] Selecciona **Bloquear fingerprinting** -- [x] Selecciona **Evita la toma de huellas dactilares mediante los ajustes de idioma** +
-
+ - [x] Select **Forget me when I close this site** -1. Esta opción proporciona una funcionalidad similar a los [modos de bloqueo](https://github.com/gorhill/uBlock/wiki/Blocking-mode) avanzados de uBlock Origin o la extensión [NoScript](https://noscript.net). +
-#### Borrar datos de navegación + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. Desaconsejamos el uso de esta función; en su lugar, mantenga las listas de filtros por defecto. El uso de listas adicionales le hará destacar entre los demás usuarios de Brave y también puede aumentar la superficie de ataque si hay un exploit en Brave y se añade una regla maliciosa a una de las listas que utiliza. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Selecciona **Borrar datos al salir** -#### Bloqueo de redes sociales +##### Social Media Blocking (Android only) - [ ] Desmarca todos los componentes de redes sociales #### Otros ajustes de privacidad -
+=== "Android" -- [x] Selecciona **Desactivar UDP sin proxy** en [Política de gestión de IP de WebRTC](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Opcional) Selecciona **Sin protección** en **Navegación segura** (1) -- [ ] Desmarca **Permite a los sitios comprobar si tienes métodos de pago guardados** -- [ ] Desmarca **Puerta de enlace IPFS** (2) -- [x] Selecciona **Cerrar pestañas al salir** -- [ ] Desmarca **Permitir estadísticas de productos que preservan la privacidad (P3A)** -- [ ] Desmarca **Enviar informes de diagnóstico automáticamente** -- [ ] Desmarca **Enviar automáticamente el ping de uso diario a Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Desmarca **Permitir estadísticas del producto con preservación de la privacidad (P3A)** + - [ ] Desmarca **Enviar informes de diagnóstico automáticamente** + - [ ] Desmarca **Enviar automáticamente el ping de uso diario a Brave** -1. La [implementación de la Navegación Segura](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) de Brave en Android **no** delega [las solicitudes de red de la Navegación Segura](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) como su homólogo de escritorio. Esto significa que tu dirección IP puede ser vista (y registrada) por Google. Ten en cuenta que la Navegación Segura no está disponible para dispositivos Android sin Google Play Services. -2. El Sistema de Archivos InterPlanetario (IPFS) es una red descentralizada, de igual a igual, para almacenar y compartir datos en un sistema de archivos distribuido. A menos que utilices la función, desactívala. +
+ + 1. La [implementación de la Navegación Segura](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) de Brave en Android **no** delega [las solicitudes de red de la Navegación Segura](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) como su homólogo de escritorio. Esto significa que tu dirección IP puede ser vista (y registrada) por Google. Ten en cuenta que la Navegación Segura no está disponible para dispositivos Android sin Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Desmarca **Enviar automáticamente el ping de uso diario a Brave** ### Leo -Estas opciones se encuentran en :material-menu: → **Configuración** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Desmarca **Mostrar sugerencias autocompletadas en la barra de direcciones** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/es/office-suites.md b/i18n/es/office-suites.md index bdc86470..36fbe6a6 100644 --- a/i18n/es/office-suites.md +++ b/i18n/es/office-suites.md @@ -5,6 +5,10 @@ description: Estas suites de ofimática ofrecen todas sus funcionalidades sin un cover: office-suites.webp --- +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Elige una **suite de ofimática** que no requiera iniciar sesión para acceder a todas sus funciones. Las herramientas listadas aquí pueden ser utilizadas sin conexión y, en la mayoría de los casos, podrían reemplazar a Microsoft Office. ## LibreOffice diff --git a/i18n/es/os/android-overview.md b/i18n/es/os/android-overview.md index 1a7e1540..dcd37884 100644 --- a/i18n/es/os/android-overview.md +++ b/i18n/es/os/android-overview.md @@ -92,19 +92,27 @@ Las aplicaciones que respetan la privacidad como [Bitwarden](https://reports.exo ### Perfiles de usuario -Los perfiles de usuario múltiples pueden ser encontrados en **Ajustes** → **Sistema** → **Usuarios múltiples** y son la manera más simple de aislar en Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -Con los perfiles de usuario, puedes imponer restricciones a un perfil específico, como: realizar llamadas, usar SMS o instalar aplicaciones en el dispositivo. Cada perfil se cifra con su propia clave de cifrado y no puede acceder a los datos de ningún otro perfil. Incluso el propietario del dispositivo no puede ver los datos de otros perfiles sin conocer su contraseña. Los perfiles de usuario múltiples son un método más seguro de aislamiento. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Cada perfil se cifra con su propia clave de cifrado y no puede acceder a los datos de ningún otro perfil. Incluso el propietario del dispositivo no puede ver los datos de otros perfiles sin conocer su contraseña. Los perfiles de usuario múltiples son un método más seguro de aislamiento. ### Perfil de trabajo -Los [perfiles de trabajo](https://support.google.com/work/android/answer/6191949) son otra manera de aislar aplicaciones individuales y pueden ser más convenientes que usar perfiles de usuario separados. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. El perfil de trabajo depende de un controlador de dispositivo para funcionar. Características como el *transbordador de archivos* y el *bloqueo de búsqueda de contactos* o cualquier tipo de característica de aislamiento debe ser implementada por el controlador. También debes confiar plenamente en la aplicación del controlador del dispositivo, ya que tiene acceso total a tus datos dentro del perfil de trabajo. -Este método es generalmente menos seguro que un perfil de usuario secundario; sin embargo, le permite la comodidad de ejecutar aplicaciones tanto en el trabajo y perfiles personales simultáneamente. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### "Killswitch" de un VPN diff --git a/i18n/es/pastebins.md b/i18n/es/pastebins.md index ae36c2bd..c4882138 100644 --- a/i18n/es/pastebins.md +++ b/i18n/es/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/es/real-time-communication.md b/i18n/es/real-time-communication.md index a3ea503a..fa1e4af5 100644 --- a/i18n/es/real-time-communication.md +++ b/i18n/es/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Las fotos de perfil, las reacciones y los apodos no están cifrados. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Actualmente, las llamadas grupales [no tienen autenticación](https://github.com/vector-im/element-web/issues/13074), lo que significa que los participantes que no son de la sala también pueden entrar a las llamadas. Le recomendamos que no utilice esta función para las reuniones privadas. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. El propio protocolo Matrix [soporta teóricamente el secreto hacia adelante](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], sin embargo [no está soportado actualmente en Element](https://github.com/vector-im/element-web/issues/7101) debido a que rompe algunos aspectos de la experiencia del usuario como las copias de seguridad de claves y el historial de mensajes compartidos. diff --git a/i18n/es/router.md b/i18n/es/router.md index fc9cd57c..2b020bfd 100644 --- a/i18n/es/router.md +++ b/i18n/es/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -A continuación se presentan algunos sistemas operativos alternativos, que pueden utilizarse en routers, puntos de acceso Wi-Fi, etc. +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-account-cash: Capitalismo de Vigilancia](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Ataques pasivos](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/es/search-engines.md b/i18n/es/search-engines.md index 5f4cb36e..76c3e2ca 100644 --- a/i18n/es/search-engines.md +++ b/i18n/es/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protege contra la(s) siguiente(s) amenaza(s): + +- [:material-account-cash: Capitalismo de Vigilancia](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Proveedores Recomendados diff --git a/i18n/es/tools.md b/i18n/es/tools.md index 0b42a6fa..f7757713 100644 --- a/i18n/es/tools.md +++ b/i18n/es/tools.md @@ -31,15 +31,6 @@ Para obtener más información sobre cada proyecto, por qué han sido elegidos y -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/fa/about.md b/i18n/fa/about.md index 043f602f..9bd52282 100644 --- a/i18n/fa/about.md +++ b/i18n/fa/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/fa/android/general-apps.md b/i18n/fa/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/fa/android/general-apps.md +++ b/i18n/fa/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/fa/browser-extensions.md b/i18n/fa/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/fa/browser-extensions.md +++ b/i18n/fa/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/fa/cloud.md b/i18n/fa/cloud.md index f4c81aad..21677604 100644 --- a/i18n/fa/cloud.md +++ b/i18n/fa/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/fa/data-redaction.md b/i18n/fa/data-redaction.md index df662125..3460cd6e 100644 --- a/i18n/fa/data-redaction.md +++ b/i18n/fa/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/fa/desktop-browsers.md b/i18n/fa/desktop-browsers.md index b9d55cfd..e94d5250 100644 --- a/i18n/fa/desktop-browsers.md +++ b/i18n/fa/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## منابع بیشتر - ## معیار **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/fa/desktop.md b/i18n/fa/desktop.md index 13e2c2a0..b9e9874a 100644 --- a/i18n/fa/desktop.md +++ b/i18n/fa/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/fa/encryption.md b/i18n/fa/encryption.md index ac26bb6f..ee80271b 100644 --- a/i18n/fa/encryption.md +++ b/i18n/fa/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/fa/file-sharing.md b/i18n/fa/file-sharing.md index a59bbf59..839a7419 100644 --- a/i18n/fa/file-sharing.md +++ b/i18n/fa/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/fa/financial-services.md b/i18n/fa/financial-services.md index bd24c50a..4af77052 100644 --- a/i18n/fa/financial-services.md +++ b/i18n/fa/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/fa/frontends.md b/i18n/fa/frontends.md index c03c1138..9e83fe5e 100644 --- a/i18n/fa/frontends.md +++ b/i18n/fa/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/fa/language-tools.md b/i18n/fa/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/fa/language-tools.md +++ b/i18n/fa/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/fa/mobile-browsers.md b/i18n/fa/mobile-browsers.md index 18d3e8ab..21c95593 100644 --- a/i18n/fa/mobile-browsers.md +++ b/i18n/fa/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/fa/office-suites.md b/i18n/fa/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/fa/office-suites.md +++ b/i18n/fa/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/fa/os/android-overview.md b/i18n/fa/os/android-overview.md index 6ab0125f..152e4926 100644 --- a/i18n/fa/os/android-overview.md +++ b/i18n/fa/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/fa/pastebins.md b/i18n/fa/pastebins.md index 66d41268..7ce4f4b3 100644 --- a/i18n/fa/pastebins.md +++ b/i18n/fa/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/fa/real-time-communication.md b/i18n/fa/real-time-communication.md index a5e505d8..54c745ae 100644 --- a/i18n/fa/real-time-communication.md +++ b/i18n/fa/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/fa/router.md b/i18n/fa/router.md index a80c7301..3e8eb49d 100644 --- a/i18n/fa/router.md +++ b/i18n/fa/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/fa/search-engines.md b/i18n/fa/search-engines.md index 5d268ab2..d48fc25a 100644 --- a/i18n/fa/search-engines.md +++ b/i18n/fa/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Recommended Providers diff --git a/i18n/fa/tools.md b/i18n/fa/tools.md index 9ba828f1..32d70204 100644 --- a/i18n/fa/tools.md +++ b/i18n/fa/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/fr/about.md b/i18n/fr/about.md index 043f602f..9bd52282 100644 --- a/i18n/fr/about.md +++ b/i18n/fr/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/fr/android/general-apps.md b/i18n/fr/android/general-apps.md index f746237b..65dc65a9 100644 --- a/i18n/fr/android/general-apps.md +++ b/i18n/fr/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Avertissement

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/fr/browser-extensions.md b/i18n/fr/browser-extensions.md index 94e8777c..34b5860d 100644 --- a/i18n/fr/browser-extensions.md +++ b/i18n/fr/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Téléchargements -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md index 945aea91..979d5ca4 100644 --- a/i18n/fr/cloud.md +++ b/i18n/fr/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/fr/data-redaction.md b/i18n/fr/data-redaction.md index 2d52ebae..f337d88c 100644 --- a/i18n/fr/data-redaction.md +++ b/i18n/fr/data-redaction.md @@ -6,6 +6,10 @@ description: Utilisez ces outils pour supprimer les métadonnées telles que la cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Exposition publique](basics/common-threats.md#limiting-public-information ""){.pg-green} + Lorsque vous partagez des fichiers, veillez à supprimer les métadonnées associées. Les fichiers d'image comprennent généralement des données [Exif](https://en.wikipedia.org/wiki/Exif) . Les photos comportent parfois même des coordonnées GPS dans les métadonnées du fichier. ## Bureau diff --git a/i18n/fr/desktop-browsers.md b/i18n/fr/desktop-browsers.md index 7555e77b..4a53510e 100644 --- a/i18n/fr/desktop-browsers.md +++ b/i18n/fr/desktop-browsers.md @@ -295,8 +295,8 @@ Brave vous permet de sélectionner des filtres de contenu supplémentaires dans
-1. Cette option offre des fonctionnalités similaires aux [modes de blocage](https://github.com/gorhill/uBlock/wiki/Blocking-mode) avancés de uBlock Origin. -2. Si vous souhaitez rester connecté à un site particulier que vous visitez souvent, vous pouvez définir des exceptions pour chaque site en cliquant sur l'icône Bouclier dans la barre d'adresse. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave vous permet de sélectionner des filtres de contenu supplémentaires dans - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Les fonctionnalités Web3 de Brave peuvent potentiellement ajouter à l'empreint - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Définir *Méthode de résolution des ressources IPFS* sur **Désactivé** #### Extensions @@ -355,7 +354,7 @@ Les fonctionnalités Web3 de Brave peuvent potentiellement ajouter à l'empreint 1. Cette option n'est pas présente sur toutes les plateformes. -#### Synchronisation Brave +#### Brave Sync La [Synchronisation Brave](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) permet à vos données de navigation (historique, favoris, etc.) d'être accessibles sur tous vos appareils sans nécessiter de compte et les protège avec E2EE. @@ -365,8 +364,6 @@ La [Synchronisation Brave](https://support.brave.com/hc/articles/360059793111-Un Le **Portefeuille Brave** fonctionne localement sur votre ordinateur, mais ne prend pas en charge les crypto-monnaies privées, nous vous déconseillons donc d'utiliser cette fonctionnalité. -## Ressources supplémentaires - ## Critères **Veuillez noter que nous ne sommes affiliés à aucun des projets que nous recommandons.** En plus de [nos critères de base](about/criteria.md), nous avons développé un ensemble d'exigences claires pour nous permettre de fournir des recommandations objectives. Nous vous suggérons de vous familiariser avec cette liste avant de choisir d'utiliser un projet, et de mener vos propres recherches pour vous assurer que c'est le bon choix pour vous. diff --git a/i18n/fr/desktop.md b/i18n/fr/desktop.md index 9aefbed8..8121ec04 100644 --- a/i18n/fr/desktop.md +++ b/i18n/fr/desktop.md @@ -5,6 +5,10 @@ description: Les distributions Linux sont généralement recommandées pour la p cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Capitalisme de surveillance](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Les distributions Linux sont généralement recommandées pour la protection de la vie privée et la liberté logicielle. Si vous n'utilisez pas encore Linux, vous trouverez ci-dessous quelques distributions que nous vous suggérons d'essayer, ainsi que des conseils généraux d'amélioration de la sécurité et de la confidentialité qui s'appliquent à de nombreuses distributions Linux. - [Vue d'ensemble de Linux :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux a un cycle de publication continue. Il n'y a pas de calendrier de pub S'agissant d'une distribution DIY, vous êtes [censé mettre en place et maintenir](os/linux-overview.md#arch-based-distributions) votre système par vous-même. Arch a un [installateur officiel](https://wiki.archlinux.org/title/Archinstall_(Fran%C3%A7ais)) pour rendre le processus d'installation un peu plus facile. -Une grande partie des [paquets d'Arch Linux](https://reproducible.archlinux.org) sont [reproductibles](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Distributions atomiques @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (la source principale des paquets) sont contenus dans un seul dépôt GitHub. Vous pouvez également définir vos propres paquets dans le même langage, puis les inclure facilement dans votre configuration. -Nix est un gestionnaire de paquets basé sur les sources ; s'il n'y a pas de paquet pré-construit disponible dans le cache binaire, Nix construira simplement le paquet à partir des sources en utilisant sa définition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix est un gestionnaire de paquets basé sur les sources ; s'il n'y a pas de paquet pré-construit disponible dans le cache binaire, Nix construira simplement le paquet à partir des sources en utilisant sa définition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Distributions axées sur l'anonymat @@ -135,7 +139,7 @@ Nix est un gestionnaire de paquets basé sur les sources ; s'il n'y a pas de paq ![logo Whonix](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** est basée sur [Kicksecure](#kicksecure), une version de Debian axée sur la sécurité. Il vise à assurer la vie privée, la sécurité et l'anonymat sur Internet. Whonix est utilisé de préférence en conjonction avec [Qubes OS](#qubes-os). +**Whonix** est basée sur [Kicksecure](#kicksecure), une version de Debian axée sur la sécurité. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix est utilisé de préférence en conjonction avec [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Logo de Tails](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** est un système d'exploitation autonome basé sur Debian qui fait passer toutes les communications par Tor, et qui peut démarrer sur presque n'importe quel ordinateur à partir d'un DVD, d'une clé USB ou d'une installation sur carte SD. Il utilise [Tor](tor.md) pour préserver la vie privée et l'anonymat tout en contournant la censure, et il ne laisse aucune trace de son passage sur l'ordinateur sur lequel il est utilisé après avoir été éteint. +**Tails** est un système d'exploitation autonome basé sur Debian qui fait passer toutes les communications par Tor, et qui peut démarrer sur presque n'importe quel ordinateur à partir d'un DVD, d'une clé USB ou d'une installation sur carte SD. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ De par sa conception, Tails est censé se réinitialiser complètement après ch ## Distributions axées sur la sécurité +Protects against the following threat(s): + +- [:material-bug-outline: Attaques passives](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ De par sa conception, Tails est censé se réinitialiser complètement après ch
-Qubes OS sécurise l'ordinateur en isolant les sous-systèmes (par exemple, le réseau, l'USB, etc.) et les applications dans des *qubes* distincts. Si une partie du système est compromise, l'isolation supplémentaire est susceptible de protéger le reste des *qubes* et le système central. +Qubes OS sécurise l'ordinateur en isolant les sous-systèmes (par exemple, le réseau, l'USB, etc.) et les applications dans des *qubes* distincts. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. Pour plus d'informations sur le fonctionnement de Qubes, lisez notre page [Introduction à Qubes](os/qubes-overview.md). @@ -242,3 +250,5 @@ Le choix d'une distribution Linux qui vous convient dépend d'une grande variét - La maintenance d'un système d'exploitation est un défi majeur, et les petits projets ont tendance à faire plus d'erreurs évitables ou à retarder les mises à jour critiques (ou pire, à disparaître complètement). Nous privilégions les projets qui seront probablement toujours présents dans 10 ans (que ce soit grâce au soutien d'une entreprise ou à un soutien communautaire très important), et nous évitons les projets qui sont construits de zéro ou qui ont un petit nombre de mainteneurs. En outre, [nos critères standards](about/criteria.md) pour les projets recommandés s'appliquent toujours. **Veuillez noter que nous ne sommes affiliés à aucun des projets que nous recommandons.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/fr/encryption.md b/i18n/fr/encryption.md index 22f393a5..46e71e72 100644 --- a/i18n/fr/encryption.md +++ b/i18n/fr/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disque) Protects against the following threat(s): diff --git a/i18n/fr/file-sharing.md b/i18n/fr/file-sharing.md index f9bf6b4d..fd75b9d4 100644 --- a/i18n/fr/file-sharing.md +++ b/i18n/fr/file-sharing.md @@ -143,7 +143,6 @@ Nous ne recommandons pas l'utilisation de [l'application E2EE](https://apps.next
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/fr/financial-services.md b/i18n/fr/financial-services.md index aacd6dd5..31877d7a 100644 --- a/i18n/fr/financial-services.md +++ b/i18n/fr/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Capitalisme de surveillance](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Effectuer des paiements en ligne est l'un des plus grands défis en matière de protection de la vie privée. Ces services peuvent vous aider à protéger votre vie privée contre les marchands et autres traqueurs, à condition que vous ayez une bonne compréhension de la façon d'effectuer des paiements privés de manière efficace. Nous vous encourageons vivement à lire notre article sur les paiements avant d'effectuer tout achat : [Effectuer des paiements privés :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Services de masquage des paiements +Protects against the following threat(s): + +- [:material-account-search: Exposition publique](basics/common-threats.md#limiting-public-information ""){.pg-green} + Il existe un certain nombre de services qui fournissent des "cartes de débit virtuelles" que vous pouvez utiliser avec les commerçants en ligne sans révéler vos informations bancaires ou de facturation réelles dans la plupart des cas. Il est important de noter que ces services financiers ne sont **pas** anonymes et qu'ils sont soumis aux lois relatives à la connaissance du client (KYC) et peuvent nécessiter une pièce d'identité ou d'autres informations d'identification. Ces services sont principalement utiles pour vous protéger contre les fuites de données des commerçants, le pistage peu sophistiqué ou la corrélation des achats par les agences de marketing, et le vol de données en ligne ; et **non pas** pour effectuer un achat de manière totalement anonyme.
@@ -67,6 +75,10 @@ Les cartes virtuelles de MySudo ne sont actuellement disponibles que via leur ap ## Marchés de cartes-cadeaux +Protects against the following threat(s): + +- [:material-eye-outline: Surveillance de masse](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + Ces services vous permettent d'acheter des cartes-cadeaux pour une variété de marchands en ligne avec de la [crypto-monnaie](cryptocurrency.md). Certains de ces services proposent des options de vérification d'identité pour des limites plus élevées, mais ils permettent également d'ouvrir des comptes avec une simple adresse email. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ Ces services vous permettent d'acheter des cartes-cadeaux pour une variété de
- ### Critères **Veuillez noter que nous ne sommes affiliés à aucun des projets que nous recommandons.** En plus de [nos critères de base](about/criteria.md), nous avons développé un ensemble d'exigences claires pour nous permettre de fournir des recommandations objectives. Nous vous suggérons de vous familiariser avec cette liste avant de choisir d'utiliser un projet, et de mener vos propres recherches pour vous assurer que c'est le bon choix pour vous. diff --git a/i18n/fr/frontends.md b/i18n/fr/frontends.md index a7afa1ce..b4dd99bf 100644 --- a/i18n/fr/frontends.md +++ b/i18n/fr/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Parfois, des services tentent de vous obliger à créer un compte en bloquant l'accès au contenu par des fenêtres pop-up gênantes. Ils peuvent également ne pas fonctionner sans JavaScript activé. Ces interfaces client peuvent vous permettre de contourner ces restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Capitalisme de surveillance](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Parfois, des services tentent de vous obliger à créer un compte en bloquant l'accès au contenu par des fenêtres pop-up gênantes. Ils peuvent également ne pas fonctionner sans JavaScript activé. These frontends can allow you to circumvent these restrictions. Si vous choisissez d'héberger vous-même ces clients, il est important que d'autres personnes utilisent également votre instance pour que vous puissiez vous fondre dans la masse. Vous devriez faire attention à l'endroit et à la manière dont vous hébergez, car l'utilisation par d'autres personnes sera liée à votre hébergement. -Lorsque vous utilisez une instance gérée par quelqu'un d'autre, veillez à lire la politique de confidentialité de cette instance spécifique. Elles peuvent être modifiées par leurs propriétaires et peuvent donc ne pas refléter la politique par défaut. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). Elles peuvent être modifiées par leurs propriétaires et peuvent donc ne pas refléter la politique par défaut. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ Lorsque vous utilisez une instance gérée par quelqu'un d'autre, veillez à lir ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,12 +56,12 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. -[:octicons-repo-16: Dépôt](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Instances Publiques"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Code Source" } +[:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![Logo FreeTube](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** est une application de bureau gratuite et open-source pour [YouTube](https://youtube.com). Lorsque vous utilisez FreeTube, votre liste d'abonnement et vos listes de lecture sont enregistrées localement sur votre appareil. - -Par défaut, FreeTube bloque toutes les publicités YouTube. En outre, FreeTube intègre en option [SponsorBlock](https://sponsor.ajay.app) pour vous aider à sauter les segments de vidéos sponsorisées. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Avertissement

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Avertissement

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -Par défaut, Yattee bloque toutes les publicités YouTube. En outre, Yattee s'intègre en option à [SponsorBlock](https://sponsor.ajay.app) pour vous aider à sauter les segments vidéo sponsorisés. - -### LibreTube (Android) - -
- -![Logo LibreTube](assets/img/frontends/libretube.svg#only-light){ align=right } -![Logo LibreTube](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** est une application Android gratuite et open-source pour [YouTube](https://youtube.com) qui utilise l'API [Piped](#piped). - -LibreTube vous permet de stocker votre liste d'abonnement et vos listes de lecture localement sur votre appareil Android, ou dans un compte sur l'instance Piped de votre choix, ce qui vous permet d'y accéder de manière transparente sur d'autres appareils également. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Avertissement

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -Par défaut, LibreTube bloque toutes les publicités YouTube. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. Vous pouvez configurer entièrement les types de segments que SponsorBlock va ignorer, ou le désactiver complètement. Il existe également un bouton sur le lecteur vidéo lui-même pour le désactiver pour une vidéo spécifique si vous le souhaitez. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Votre liste d'abonnement et vos listes de lecture sont enregistrées localement sur votre appareil Android. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Avertissement

- -Lorsque vous utilisez NewPipe, votre adresse IP sera visible par les fournisseurs vidéo utilisés. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ Lorsque vous utilisez NewPipe, votre adresse IP sera visible par les fournisseur **Invidious** est une interface gratuite et open-source pour [YouTube](https://youtube.com) qui est également auto-hébergable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped nécessite JavaScript pour fonctionner et il existe un certain nombre d'instances publiques. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![Logo FreeTube](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** est une application de bureau gratuite et open-source pour [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +Lorsque vous utilisez FreeTube, votre liste d'abonnement et vos listes de lecture sont enregistrées localement sur votre appareil. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Avertissement

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +Par défaut, FreeTube bloque toutes les publicités YouTube. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Avertissement

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +Par défaut, Yattee bloque toutes les publicités YouTube. En outre, Yattee s'intègre en option à [SponsorBlock](https://sponsor.ajay.app) pour vous aider à sauter les segments vidéo sponsorisés. + +### LibreTube (Android) + +
+ +![Logo LibreTube](assets/img/frontends/libretube.svg#only-light){ align=right } +![Logo LibreTube](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** est une application Android gratuite et open-source pour [YouTube](https://youtube.com) qui utilise l'API [Piped](#piped). + +Votre liste d'abonnement et vos listes de lecture sont enregistrées localement sur votre appareil Android. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Avertissement

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +Par défaut, LibreTube bloque toutes les publicités YouTube. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. Vous pouvez configurer entièrement les types de segments que SponsorBlock va ignorer, ou le désactiver complètement. Il existe également un bouton sur le lecteur vidéo lui-même pour le désactiver pour une vidéo spécifique si vous le souhaitez. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Votre liste d'abonnement et vos listes de lecture sont enregistrées localement sur votre appareil Android. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Avertissement

+ +Lorsque vous utilisez NewPipe, votre adresse IP sera visible par les fournisseurs vidéo utilisés. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Critères **Veuillez noter que nous ne sommes affiliés à aucun des projets que nous recommandons.** En plus de [nos critères de base](about/criteria.md), nous avons développé un ensemble d'exigences claires pour nous permettre de fournir des recommandations objectives. Nous vous suggérons de vous familiariser avec cette liste avant de choisir d'utiliser un projet, et de mener vos propres recherches pour vous assurer que c'est le bon choix pour vous. -Clients recommandés... - -- Doit être un logiciel open source. -- Doit être auto-hébergeable. -- Doit fournir toutes les fonctionnalités de base du site web accessibles aux utilisateurs anonymes. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Clients recommandés... + +- Doit être un logiciel open source. +- Doit être auto-hébergeable. +- Doit fournir toutes les fonctionnalités de base du site web accessibles aux utilisateurs anonymes. diff --git a/i18n/fr/language-tools.md b/i18n/fr/language-tools.md index 4efaaaa2..d874bae3 100644 --- a/i18n/fr/language-tools.md +++ b/i18n/fr/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/fr/mobile-browsers.md b/i18n/fr/mobile-browsers.md index 439ac768..98382a38 100644 --- a/i18n/fr/mobile-browsers.md +++ b/i18n/fr/mobile-browsers.md @@ -64,8 +64,8 @@ Brave est basé sur le projet de navigateur Web Chromium. Il devrait donc vous Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave est basé sur le projet de navigateur Web Chromium. Il devrait donc vous Le navigateur Tor est le seul moyen de vraiment naviguer anonymement sur Internet. Lorsque vous utilisez Brave, nous vous recommandons de modifier les paramètres suivants afin de protéger votre vie privée de certains tiers, mais tous les navigateurs autres que le [Navigateur Tor](tor.md#tor-browser) seront traçables par *quelqu'un* d'une manière ou d'une autre. -Ces options se trouvent dans :material-menu: → **Paramètres** → **Brave Shields & confidentialité** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave inclut des mesures anti-empreintes digitales dans sa fonction [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields). Nous vous conseillons de configurer ces options de [manière globale](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) sur toutes les pages que vous visitez. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave inclut des mesures anti-empreintes digitales dans sa fonction [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields). Nous vous conseillons de configurer ces options de [manière globale](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) sur toutes les pages que vous visitez. + Les options "Boucliers" peuvent être réduites par site selon les besoins, mais par défaut, nous recommandons de définir les paramètres suivants: -
+=== "Android" -- [x] Sélectionnez **Agressif** dans **Bloquer les traqueurs et les publicités** +
-
-Utiliser les listes de filtres par défaut + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave vous permet de sélectionner des filtres de contenu supplémentaires dans la page interne `brave://adblock`. Nous vous déconseillons d'utiliser cette fonctionnalité ; conservez plutôt les listes de filtres par défaut. L'utilisation de listes supplémentaires vous distinguera des autres utilisateurs de Brave et peut également augmenter la surface d'attaque s'il y a une faille dans Brave et qu'une règle malveillante est ajoutée à l'une des listes que vous utilisez. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. Nous vous déconseillons d'utiliser cette fonctionnalité ; conservez plutôt les listes de filtres par défaut. L'utilisation de listes supplémentaires vous distinguera des autres utilisateurs de Brave et peut également augmenter la surface d'attaque s'il y a une faille dans Brave et qu'une règle malveillante est ajoutée à l'une des listes que vous utilisez. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. Cette option fournit une fonctionnalité similaire aux [modes de blocage](https://github.com/gorhill/uBlock/wiki/Blocking-mode) avancés de uBlock Origin ou l'extension [NoScript](https://noscript.net). +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. Nous vous déconseillons d'utiliser cette fonctionnalité ; conservez plutôt les listes de filtres par défaut. L'utilisation de listes supplémentaires vous distinguera des autres utilisateurs de Brave et peut également augmenter la surface d'attaque s'il y a une faille dans Brave et qu'une règle malveillante est ajoutée à l'une des listes que vous utilisez. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Sélectionner **Effacer les données en quittant** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Décochez toutes les fonctionnalités de médias sociaux #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) est un réseau décentralisé, de pair à pair, permettant de stocker et de partager des données dans un système de fichiers distribué. À moins que vous n'utilisiez cette fonctionnalité, désactivez-la. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/fr/office-suites.md b/i18n/fr/office-suites.md index 9d161299..8f256a84 100644 --- a/i18n/fr/office-suites.md +++ b/i18n/fr/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/fr/os/android-overview.md b/i18n/fr/os/android-overview.md index ac8647ce..f35d84ed 100644 --- a/i18n/fr/os/android-overview.md +++ b/i18n/fr/os/android-overview.md @@ -92,19 +92,27 @@ Des applications respectueuses de la vie privée telles que [Bitwarden](https:// ### Profils utilisateurs -Les profils d'utilisateurs multiples se trouvent dans **Paramètres** → **Système** → **Utilisateurs multiples** et constituent le moyen le plus simple d'isoler dans Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -Avec les profils d'utilisateur, vous pouvez imposer des restrictions à un profil spécifique, par exemple : passer des appels, utiliser des SMS ou installer des applications sur l'appareil. Chaque profil est chiffré à l'aide de sa propre clé de chiffrement et ne peut accéder aux données d'aucun autre profil. Même le propriétaire de l'appareil ne peut pas voir les données des autres profils sans connaître leur mot de passe. Les profils d'utilisateurs multiples est une méthode d'isolement plus sécurisée. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Chaque profil est chiffré à l'aide de sa propre clé de chiffrement et ne peut accéder aux données d'aucun autre profil. Même le propriétaire de l'appareil ne peut pas voir les données des autres profils sans connaître leur mot de passe. Les profils d'utilisateurs multiples est une méthode d'isolement plus sécurisée. ### Profil professionnel -Les [Profils Professionnels](https://support.google.com/work/android/answer/6191949?hl=fr) sont une autre façon d'isoler des applications de manière individuelles et peuvent s'avérer plus pratiques que des profils d'utilisateur séparés. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. Le profil professionnel dépend d'un gestionnaire d'appareil pour fonctionner. Les fonctionnalités telles que la *Navigation de Fichiers* et le *blocage de la recherche de contacts* ou tout autre type de fonctionnalités d'isolation doivent être implémentées par le gestionnaire. Vous devez également faire entièrement confiance à l'application de gestionnaire d'appareil, car elle a un accès total à vos données au sein du profil professionnel. -Cette méthode est généralement moins sûre qu'un profil utilisateur secondaire, mais elle vous permet d'exécuter simultanément des applications dans les profils professionnel et personnel. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### Arrêt d'urgence VPN diff --git a/i18n/fr/pastebins.md b/i18n/fr/pastebins.md index 03ce2f3d..3a7d410b 100644 --- a/i18n/fr/pastebins.md +++ b/i18n/fr/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/fr/real-time-communication.md b/i18n/fr/real-time-communication.md index 1ca6b231..43cc28b1 100644 --- a/i18n/fr/real-time-communication.md +++ b/i18n/fr/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Les photos de profil, les réactions et les surnoms ne sont pas chiffrés. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Les appels de groupe n'ont [pas d'authentification](https://github.com/vector-im/element-web/issues/13074) actuellement, ce qui signifie que les participants ne faisant pas partie de la salle peuvent également se joindre aux appels. Nous vous recommandons de ne pas utiliser cette fonctionnalité pour les réunions privées. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. Le protocole Matrix lui-même [prend théoriquement en charge la confidentialité persistante](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], mais elle [n'est pas prise en charge par Element pour le moment](https://github.com/vector-im/element-web/issues/7101) car elle rompt certains aspects de l'expérience utilisateur tels que la sauvegarde des clés et l'historique des messages partagés. diff --git a/i18n/fr/router.md b/i18n/fr/router.md index ce37a437..158bb5fa 100644 --- a/i18n/fr/router.md +++ b/i18n/fr/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Vous trouverez ci-dessous quelques systèmes d'exploitation alternatifs, qui peuvent être utilisés sur des routeurs, des points d'accès Wi-Fi, etc. +Protects against the following threat(s): + +- [:material-account-cash: Capitalisme de surveillance](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Attaques passives](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/fr/search-engines.md b/i18n/fr/search-engines.md index 82e680c5..6997c94a 100644 --- a/i18n/fr/search-engines.md +++ b/i18n/fr/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Capitalisme de surveillance](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Fournisseurs recommandés diff --git a/i18n/fr/tools.md b/i18n/fr/tools.md index 2073273e..0b80c39a 100644 --- a/i18n/fr/tools.md +++ b/i18n/fr/tools.md @@ -31,15 +31,6 @@ Pour avoir plus de détails sur chaque projet, pour savoir pourquoi ils ont ét -
-

Étiquettes du modèle de menace

- -Vous pouvez trouver l'une des icônes suivantes sur certaines pages de recommandation : :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -Nous testons une nouvelle fonctionnalité qui permet aux lecteurs de mieux identifier et comprendre les types de menaces contre lesquelles les outils de protection de la vie privée sont les plus efficaces. Dites-nous ce que vous pensez de cette fonctionnalité en répondant à ce [fil] du forum dédié (https://discuss.privacyguides.net/t/implement-threat-model-labels/18659) ! - -
- ## Navigateurs Web privés
diff --git a/i18n/he/about.md b/i18n/he/about.md index 043f602f..9bd52282 100644 --- a/i18n/he/about.md +++ b/i18n/he/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/he/android/general-apps.md b/i18n/he/android/general-apps.md index 7d06a9c8..34e4d822 100644 --- a/i18n/he/android/general-apps.md +++ b/i18n/he/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/he/browser-extensions.md b/i18n/he/browser-extensions.md index 078fd0f8..fecd019a 100644 --- a/i18n/he/browser-extensions.md +++ b/i18n/he/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/he/cloud.md b/i18n/he/cloud.md index 99c16dea..d18bdf02 100644 --- a/i18n/he/cloud.md +++ b/i18n/he/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/he/data-redaction.md b/i18n/he/data-redaction.md index 5b44296d..3b74d422 100644 --- a/i18n/he/data-redaction.md +++ b/i18n/he/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: חשיפה ציבורית](basics/common-threats.md#limiting-public-information ""){.pg-green} + בעת שיתוף קבצים, הקפד להסיר מטא נתונים משויכים. קבצי תמונה כוללים בדרך כלל [נתוני Exif](https://en.wikipedia.org/wiki/Exif). תמונות לפעמים אפילו כוללות קואורדינטות GPS במטא-נתונים של הקובץ. ## מחשב שולחני @@ -170,5 +174,5 @@ exiftool -all= *.file_extension **שים לב שאיננו קשורים לאף אחד מהפרויקטים שאנו ממליצים עליהם.** בנוסף ל [הקריטריונים הסטנדרטיים שלנו](about/criteria.md), פיתחנו סט ברור של דרישות כדי לאפשר לנו לספק המלצות אובייקטיביות. אנו מציעים לך להכיר את הרשימה הזו לפני שתבחר להשתמש בפרויקט, ולערוך מחקר משלך כדי להבטיח שזו הבחירה הנכונה עבורך. -- אפליקציות שפותחו עבור מערכות הפעלה בקוד פתוח חייבות להיות בקוד פתוח. +- Apps developed for open-source operating systems must be open source. - יישומים חייבים להיות חינמיים ולא לכלול מודעות או מגבלות אחרות. diff --git a/i18n/he/desktop-browsers.md b/i18n/he/desktop-browsers.md index bd1c1285..1a0f323c 100644 --- a/i18n/he/desktop-browsers.md +++ b/i18n/he/desktop-browsers.md @@ -179,7 +179,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug זה מגן עליך מפני עוגיות מתמשכות, אך אינו מגן עליך מפני עוגיות שנרכשו במהלך כל הפעלת גלישה אחת. כאשר זה מופעל, אפשר לנקות בקלות את קובצי העוגיות של הדפדפן שלך פשוט על ידי הפעלה מחדש של Firefox. אתה יכול להגדיר חריגים על בסיס אתר, אם אתה רוצה להישאר מחובר לאתר מסוים שאתה מבקר בו לעתים קרובות. -##### טלמטריה +##### Telemetry - [ ] בטל את הסימון **לאפשר ל-Firefox לשלוח אל Mozilla מידע טכני ופעולות שבוצעו בדפדפן** - [ ] בטל את הסימון **לאפשר ל-Firefox להתקין ולהריץ מחקרים** @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ If you wish to stay logged in to a particular site you visit often, you can set - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -355,7 +354,7 @@ If you wish to stay logged in to a particular site you visit often, you can set 1. אפשרות זו אינה קיימת בכל הפלטפורמות. -#### סנכרון Brave +#### Brave Sync [Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. @@ -365,8 +364,6 @@ If you wish to stay logged in to a particular site you visit often, you can set **Brave Wallet** פועל באופן מקומי במחשב שלך, אך אינו תומך במטבעות קריפטוגרפיים פרטיים כלשהם, ולכן אנו נמנע משימוש גם בתכונה זו. -## מקורות נוספים - ## קריטריונים **שים לב שאיננו קשורים לאף אחד מהפרויקטים שאנו ממליצים עליהם.** בנוסף ל [הקריטריונים הסטנדרטיים שלנו](about/criteria.md), פיתחנו סט ברור של דרישות כדי לאפשר לנו לספק המלצות אובייקטיביות. אנו מציעים לך להכיר את הרשימה הזו לפני שתבחר להשתמש בפרויקט, ולערוך מחקר משלך כדי להבטיח שזו הבחירה הנכונה עבורך. diff --git a/i18n/he/desktop.md b/i18n/he/desktop.md index 9fc0a486..1831bef9 100644 --- a/i18n/he/desktop.md +++ b/i18n/he/desktop.md @@ -5,6 +5,10 @@ description: הפצות לינוקס מומלצות בדרך כלל להגנה cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: קפיטליזם מעקב](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + הפצות לינוקס מומלצות בדרך כלל להגנה על פרטיות וחופש תוכנה. אם אינך משתמש עדיין בלינוקס, להלן כמה הפצות שאנו מציעים לנסות, כמו גם כמה טיפים כלליים לשיפור פרטיות ואבטחה החלים על הפצות לינוקס רבות. - [סקירה כללית של לינוקס :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Tumbleweed עוקב אחר מודל מהדורה מתגלגל שבו כל עדכ להיות התפלגות DIY, אתה [צפוי להגדיר ולתחזק](os/linux-overview.md#arch-based-distributions) המערכת שלך בעצמך. יש Arch [מתקין רשמי](https://wiki.archlinux.org/title/Archinstall) כדי להפוך את תהליך ההתקנה קצת יותר קל. -חלק גדול מהחבילות של [ארץ' לינוקס](https://reproducible.archlinux.org) הן [לשחזור](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## הפצות ממוקדות אנונימיות @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix לוגו](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** מבוסס על [Kicksecure](#kicksecure), נגזר ממוקד אבטחה של דביאן. מטרתו לספק פרטיות, אבטחה ואנונימיות באינטרנט. כדאי להשתמש ב - Whonix בשילוב עם [Qubes OS](# qubes- os). +**Whonix** מבוסס על [Kicksecure](#kicksecure), נגזר ממוקד אבטחה של דביאן. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. כדאי להשתמש ב - Whonix בשילוב עם [Qubes OS](# qubes- os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails לוגו](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** היא מערכת הפעלה חיה המבוססת על דביאן המנתבת את כל התקשורת דרך Tor, שיכולה לאתחל כמעט כל מחשב מ - DVD, מקל USB או התקנת כרטיס SD. הוא משתמש ב - [Tor](tor.md) כדי לשמור על פרטיות ואנונימיות תוך עקיפת הצנזורה, והוא אינו מותיר עקבות של עצמו במחשב שבו הוא נמצא בשימוש לאחר שהוא כבוי. +**Tails** היא מערכת הפעלה חיה המבוססת על דביאן המנתבת את כל התקשורת דרך Tor, שיכולה לאתחל כמעט כל מחשב מ - DVD, מקל USB או התקנת כרטיס SD. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## הפצות ממוקדות אבטחה +Protects against the following threat(s): + +- [:material-bug-outline: התקפות פסיביות](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - שמירה על מערכת הפעלה היא אתגר מרכזי, ולפרויקטים קטנים יותר יש נטייה לטעויות נמנעות יותר, או לעכב עדכונים קריטיים (או גרוע מכך, להיעלם לחלוטין). אנו נשענים לעבר פרויקטים אשר ככל הנראה יהיו בערך 10 שנים מהיום (בין אם זה נובע מגיבוי תאגידי או תמיכה קהילתית משמעותית מאוד), והרחק מפרויקטים שנבנו בעבודת יד או שיש להם מספר מצומצם של מתחזקים. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/he/encryption.md b/i18n/he/encryption.md index fc5b2070..f8ae9ce5 100644 --- a/i18n/he/encryption.md +++ b/i18n/he/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (דיסק) Protects against the following threat(s): diff --git a/i18n/he/file-sharing.md b/i18n/he/file-sharing.md index 62b091d1..3c2ddd8c 100644 --- a/i18n/he/file-sharing.md +++ b/i18n/he/file-sharing.md @@ -143,7 +143,6 @@ OnionShare provides the option to connect via [Tor bridges](https://docs.onionsh
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/he/financial-services.md b/i18n/he/financial-services.md index 574a27cf..856880ac 100644 --- a/i18n/he/financial-services.md +++ b/i18n/he/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: קפיטליזם מעקב](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + ביצוע תשלומים אונליין הוא אחד האתגרים הגדולים ביותר לפרטיות. שירותים אלה יכולים לסייע לך בהגנה על פרטיותך מפני סוחרים ועוקבים אחרים, בתנאי שיש לך הבנה טובה כיצד לבצע תשלומים פרטיים ביעילות. אנו ממליצים בחום שתקרא תחילה את מאמר סקירת התשלומים שלנו לפני ביצוע רכישות כלשהן: [ביצוע תשלומים פרטיים :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## שירותי מיסוך תשלומים +Protects against the following threat(s): + +- [:material-account-search: חשיפה ציבורית](basics/common-threats.md#limiting-public-information ""){.pg-green} + ישנם מספר שירותים המספקים "כרטיסי חיוב וירטואליים" שבהם אתה יכול להשתמש עם סוחרים מקוונים מבלי לחשוף את פרטי הבנק או החיוב בפועל שלך ברוב המקרים. חשוב לציין ששירותים פיננסיים אלו הם **אינם** אנונימיים וכפופים לחוקי "הכר את הלקוח שלך" (KYC) ועשויים לדרוש את תעודת הזהות שלך או מידע מזהה אחר. שירותים אלה שימושיים בעיקר להגנה עליך מפני הפרות נתונים של סוחרים, מעקב פחות מתוחכם או מתאם רכישה על ידי סוכנויות שיווק וגניבת נתונים מקוונים; ו**לא** לביצוע רכישה באופן אנונימי לחלוטין.
@@ -67,6 +75,10 @@ Privacy.com מספק מידע על הסוחרים מהם אתה רוכש לבנ ## שווקים של כרטיסי מתנה +Protects against the following threat(s): + +- [:material-eye-outline: מעקב המוני](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + שירותים אלו מאפשרים לך לרכוש כרטיסי מתנה עבור מגוון סוחרים באינטרנט באמצעות [מטבע קריפטוגרפי](cryptocurrency.md). חלק מהשירותים הללו מציעים אפשרויות אימות מזהה עבור מגבלות גבוהות יותר, אך הם גם מאפשרים חשבונות עם כתובת אימייל בלבד. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ Privacy.com מספק מידע על הסוחרים מהם אתה רוכש לבנ
- ### קריטריונים **שים לב שאיננו קשורים לאף אחד מהפרויקטים שאנו ממליצים עליהם.** בנוסף ל [הקריטריונים הסטנדרטיים שלנו](about/criteria.md), פיתחנו סט ברור של דרישות כדי לאפשר לנו לספק המלצות אובייקטיביות. אנו מציעים לך להכיר את הרשימה הזו לפני שתבחר להשתמש בפרויקט, ולערוך מחקר משלך כדי להבטיח שזו הבחירה הנכונה עבורך. diff --git a/i18n/he/frontends.md b/i18n/he/frontends.md index d7556d6b..2a28acf5 100644 --- a/i18n/he/frontends.md +++ b/i18n/he/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -לפעמים שירותים ינסו לאלץ אותך להירשם לחשבון על ידי חסימת גישה לתוכן עם חלונות קופצים מעצבנים. הם יכולים להישבר גם ללא הפעלת JavaScript. חזיתות אלה יכולות לאפשר לך לעקוף את ההגבלות הללו. +Protects against the following threat(s): + +- [:material-account-cash: קפיטליזם מעקב](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +לפעמים שירותים ינסו לאלץ אותך להירשם לחשבון על ידי חסימת גישה לתוכן עם חלונות קופצים מעצבנים. הם יכולים להישבר גם ללא הפעלת JavaScript. These frontends can allow you to circumvent these restrictions. אם תבחר לארח בעצמך את החזיתות האלה, חשוב שאנשים אחרים ישתמשו גם במופע שלך כדי שתוכל להשתלב. אתה צריך להיות זהיר עם היכן וכיצד אתה מארח, מכיוון שהשימוש של אנשים אחרים יהיה מקושר לאירוח שלך. -כאשר אתה משתמש במופע המופעל על ידי מישהו אחר, הקפד לקרוא את מדיניות הפרטיות של אותו מופע ספציפי. הם יכולים להשתנות על ידי בעליהם ולכן עשויים שלא לשקף את מדיניות ברירת המחדל. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). הם יכולים להשתנות על ידי בעליהם ולכן עשויים שלא לשקף את מדיניות ברירת המחדל. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ cover: frontends.webp ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,12 +56,12 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. -[:octicons-repo-16: מאגר](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="מופעים ציבוריים"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="קוד מקור" } +[:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## יוטיוב -### FreeTube - -
- -![FreeTube לוגו](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** הוא יישום שולחן עבודה חינם וקוד פתוח עבור [יוטיוב](https://youtube.com). בעת שימוש ב- FreeTube, רשימת המנויים ורשימות ההשמעה שלך נשמרות באופן מקומי במכשיר שלך. - -כברירת מחדל, FreeTube חוסמת את כל הפרסומות של יוטיוב. בנוסף, FreeTube משתלבת באופן אופציונלי עם [SponsorBlock](https://sponsor.ajay.app) כדי לעזור לך לדלג על קטעי וידאו ממומנים. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -כברירת מחדל, Yattee חוסם את כל הפרסומות ב - YouTube. בנוסף, Yattee משתלב באופן אופציונלי עם [SponsorBlock](https://sponsor.ajay.app) כדי לעזור לך לדלג על קטעי וידאו ממומנים. - -### LibreTube (אנדרואיד) - -
- -![LibreTube לוגו](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube לוגו](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** היא אפליקציית אנדרואיד בחינם וקוד פתוח עבור [YouTube](https://youtube.com) המשתמשת בממשק ה-API של [Piped](#piped). - -LibreTube מאפשר לך לאחסן את רשימת המנויים והפלייליסטים שלך באופן מקומי במכשיר האנדרואיד שלך, או בחשבון במופע Piped שבחרת, מה שמאפשר לך לגשת אליהם בצורה חלקה גם במכשירים אחרים. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -כברירת מחדל, LibreTube חוסמת את כל פרסומות יוטיוב. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. אתה יכול להגדיר באופן מלא את סוגי הפלחים שSponsorBlock ידלג עליהם, או להשבית אותו לחלוטין. יש גם כפתור בנגן הווידאו עצמו כדי להשבית אותו עבור סרטון מסוים אם תרצה בכך. - -### NewPipe (אנדרואיד) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -רשימת המנויים והפלייליסטים שלך נשמרים באופן מקומי במכשיר האנדרואיד שלך. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -בעת שימוש ב-NewPipe, כתובת ה-IP שלך תהיה גלויה לספקי הווידאו שבהם נעשה שימוש. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using LibreTube, your IP address will be visible to the [Piped](https://git **Invidious** הוא ממשק קצה חינמי וקוד פתוח עבור [YouTube](https://youtube.com) שמתארח גם בעצמו. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped דורש JavaScript כדי לתפקד ויש מספר מופעים ציבוריים. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube לוגו](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** הוא יישום שולחן עבודה חינם וקוד פתוח עבור [יוטיוב](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +בעת שימוש ב- FreeTube, רשימת המנויים ורשימות ההשמעה שלך נשמרות באופן מקומי במכשיר שלך. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +כברירת מחדל, FreeTube חוסמת את כל הפרסומות של יוטיוב. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +כברירת מחדל, Yattee חוסם את כל הפרסומות ב - YouTube. בנוסף, Yattee משתלב באופן אופציונלי עם [SponsorBlock](https://sponsor.ajay.app) כדי לעזור לך לדלג על קטעי וידאו ממומנים. + +### LibreTube (אנדרואיד) + +
+ +![LibreTube לוגו](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube לוגו](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** היא אפליקציית אנדרואיד בחינם וקוד פתוח עבור [YouTube](https://youtube.com) המשתמשת בממשק ה-API של [Piped](#piped). + +רשימת המנויים והפלייליסטים שלך נשמרים באופן מקומי במכשיר האנדרואיד שלך. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +כברירת מחדל, LibreTube חוסמת את כל פרסומות יוטיוב. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. אתה יכול להגדיר באופן מלא את סוגי הפלחים שSponsorBlock ידלג עליהם, או להשבית אותו לחלוטין. יש גם כפתור בנגן הווידאו עצמו כדי להשבית אותו עבור סרטון מסוים אם תרצה בכך. + +### NewPipe (אנדרואיד) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +רשימת המנויים והפלייליסטים שלך נשמרים באופן מקומי במכשיר האנדרואיד שלך. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +בעת שימוש ב-NewPipe, כתובת ה-IP שלך תהיה גלויה לספקי הווידאו שבהם נעשה שימוש. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## קריטריונים **שים לב שאיננו קשורים לאף אחד מהפרויקטים שאנו ממליצים עליהם.** בנוסף ל [הקריטריונים הסטנדרטיים שלנו](about/criteria.md), פיתחנו סט ברור של דרישות כדי לאפשר לנו לספק המלצות אובייקטיביות. אנו מציעים לך להכיר את הרשימה הזו לפני שתבחר להשתמש בפרויקט, ולערוך מחקר משלך כדי להבטיח שזו הבחירה הנכונה עבורך. -חזיתות מומלצות... - -- חייבת להיות תוכנת קוד פתוח. -- חייב להיות ניתן לאירוח עצמי. -- חייב לספק את כל הפונקציונליות הבסיסית של האתר הזמינה למשתמשים אנונימיים. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +חזיתות מומלצות... + +- חייבת להיות תוכנת קוד פתוח. +- חייב להיות ניתן לאירוח עצמי. +- חייב לספק את כל הפונקציונליות הבסיסית של האתר הזמינה למשתמשים אנונימיים. diff --git a/i18n/he/language-tools.md b/i18n/he/language-tools.md index ec7403dd..123e8766 100644 --- a/i18n/he/language-tools.md +++ b/i18n/he/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/he/mobile-browsers.md b/i18n/he/mobile-browsers.md index 7b8451ba..7496f8bc 100644 --- a/i18n/he/mobile-browsers.md +++ b/i18n/he/mobile-browsers.md @@ -64,8 +64,8 @@ Brave בנוי על פרויקט דפדפן Chromium, כך שהוא אמור ל Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave בנוי על פרויקט דפדפן Chromium, כך שהוא אמור ל דפדפן Tor הוא הדרך היחידה לגלוש באמת באינטרנט באופן אנונימי. כאשר אתה משתמש ב-Brave, אנו ממליצים לשנות את ההגדרות הבאות כדי להגן על פרטיותך מפני גורמים מסוימים, אך כל הדפדפנים מלבד [Tor דפדפן](tor.md#tor-browser) יהיו ניתנים למעקב על ידי *מישהו* בהקשר זה או אחר. -ניתן למצוא אפשרויות אלו ב :material-menu: → **הגדרות** → **Brave Shields & פרטיות** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + ניתן לשדרג לאחור את האפשרויות של Shields על בסיס אתר לפי הצורך, אך כברירת מחדל אנו ממליצים להגדיר את האפשרויות הבאות: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. אנו ממליצים לא להשתמש בתכונה זו; במקום זאת, שמור על רשימות הסינון המוגדרות כברירת מחדל. שימוש ברשימות נוספות יגרום לך להתבלט ממשתמשי Brave אחרים ועלול גם להגדיל את שטח ההתקפה אם יש ניצול ב-Brave וכלל זדוני יתווסף לאחת הרשימות שבהן אתה משתמש. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. אנו ממליצים לא להשתמש בתכונה זו; במקום זאת, שמור על רשימות הסינון המוגדרות כברירת מחדל. שימוש ברשימות נוספות יגרום לך להתבלט ממשתמשי Brave אחרים ועלול גם להגדיל את שטח ההתקפה אם יש ניצול ב-Brave וכלל זדוני יתווסף לאחת הרשימות שבהן אתה משתמש. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. אנו ממליצים לא להשתמש בתכונה זו; במקום זאת, שמור על רשימות הסינון המוגדרות כברירת מחדל. שימוש ברשימות נוספות יגרום לך להתבלט ממשתמשי Brave אחרים ועלול גם להגדיל את שטח ההתקפה אם יש ניצול ב-Brave וכלל זדוני יתווסף לאחת הרשימות שבהן אתה משתמש. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] בחר **נקה נתונים ביציאה** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] בטל את הסימון של כל רכיבי המדיה החברתית #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) היא רשת מבוזרת, עמית לעמית לאחסון ושיתוף נתונים במערכת קבצים מבוזרת. אלא אם אתה משתמש בתכונה, השבת אותה. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/he/office-suites.md b/i18n/he/office-suites.md index cf162383..bfea9e44 100644 --- a/i18n/he/office-suites.md +++ b/i18n/he/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/he/os/android-overview.md b/i18n/he/os/android-overview.md index 406ef228..f21b1f3f 100644 --- a/i18n/he/os/android-overview.md +++ b/i18n/he/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### פרופילי משתמשים -ניתן למצוא פרופילי משתמש מרובים ב**הגדרות** ← **מערכת** ← **משתמש מרובים** והם הדרך הפשוטה ביותר לבודד באנדרואיד. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -עם פרופילי משתמש, אתה יכול להטיל הגבלות על פרופיל ספציפי, כגון: ביצוע שיחות, שימוש ב-SMS או התקנת אפליקציות במכשיר. כל פרופיל מוצפן באמצעות מפתח הצפנה משלו ואינו יכול לגשת לנתונים של אף פרופיל אחר. אפילו בעל המכשיר לא יכול לראות את הנתונים של פרופילים אחרים מבלי לדעת את הסיסמה שלהם. פרופילי משתמשים מרובים הם שיטה בטוחה יותר לבידוד. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. כל פרופיל מוצפן באמצעות מפתח הצפנה משלו ואינו יכול לגשת לנתונים של אף פרופיל אחר. אפילו בעל המכשיר לא יכול לראות את הנתונים של פרופילים אחרים מבלי לדעת את הסיסמה שלהם. פרופילי משתמשים מרובים הם שיטה בטוחה יותר לבידוד. ### פרופיל עבודה -[פרופילי עבודה](https://support.google.com/work/android/answer/6191949) הם דרך נוספת לבודד אפליקציות בודדות ועשויה להיות נוחה יותר מפרופילי משתמשים נפרדים. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. פרופיל העבודה תלוי בבקר התקן כדי לתפקד. תכונות כגון *מעבורת קבצים* ו*חסימת חיפוש אנשי קשר* או כל סוג של תכונות בידוד חייבות להיות מיושמות על ידי הבקר. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -שיטה זו בדרך כלל פחות מאובטחת מפרופיל משתמש משני; עם זאת, זה כן מאפשר לך את הנוחות של הפעלת אפליקציות בפרופיל העבודה וגם בפרופיל האישי בו-זמנית. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### מתג הרג VPN diff --git a/i18n/he/pastebins.md b/i18n/he/pastebins.md index fa6d5a37..ec7cdee7 100644 --- a/i18n/he/pastebins.md +++ b/i18n/he/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/he/real-time-communication.md b/i18n/he/real-time-communication.md index 00b67ca6..706790ad 100644 --- a/i18n/he/real-time-communication.md +++ b/i18n/he/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b תמונות פרופיל, תגובות וכינויים אינם מוצפנים. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). שיחות קבוצתיות כוללות [שיחות ללא אימות](https://github.com/vector-im/element-web/issues/13074) כרגע, כלומר, כל משתתפים יכולים גם להצטרף לשיחות. אנו ממליצים שלא להשתמש בתכונה זו לפגישות פרטיות. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/he/router.md b/i18n/he/router.md index b410428c..4b9e0a55 100644 --- a/i18n/he/router.md +++ b/i18n/he/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -להלן מספר מערכות הפעלה חלופיות, שניתן להשתמש בהן בנתבים, נקודות גישה ל-Wi-Fi וכו'. +Protects against the following threat(s): + +- [:material-account-cash: קפיטליזם מעקב](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: התקפות פסיביות](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/he/search-engines.md b/i18n/he/search-engines.md index 9be80cad..7fe46713 100644 --- a/i18n/he/search-engines.md +++ b/i18n/he/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: קפיטליזם מעקב](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## ספקים מומלצים diff --git a/i18n/he/tools.md b/i18n/he/tools.md index de94c108..b750df73 100644 --- a/i18n/he/tools.md +++ b/i18n/he/tools.md @@ -31,15 +31,6 @@ If you want assistance figuring out the best privacy tools and alternative progr -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/hi/about.md b/i18n/hi/about.md index 043f602f..9bd52282 100644 --- a/i18n/hi/about.md +++ b/i18n/hi/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/hi/android/general-apps.md b/i18n/hi/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/hi/android/general-apps.md +++ b/i18n/hi/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/hi/browser-extensions.md b/i18n/hi/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/hi/browser-extensions.md +++ b/i18n/hi/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/hi/cloud.md b/i18n/hi/cloud.md index f4c81aad..21677604 100644 --- a/i18n/hi/cloud.md +++ b/i18n/hi/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/hi/data-redaction.md b/i18n/hi/data-redaction.md index df662125..3460cd6e 100644 --- a/i18n/hi/data-redaction.md +++ b/i18n/hi/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/hi/desktop-browsers.md b/i18n/hi/desktop-browsers.md index b74767bc..f63165b7 100644 --- a/i18n/hi/desktop-browsers.md +++ b/i18n/hi/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources - ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/hi/desktop.md b/i18n/hi/desktop.md index 13e2c2a0..b9e9874a 100644 --- a/i18n/hi/desktop.md +++ b/i18n/hi/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/hi/encryption.md b/i18n/hi/encryption.md index ac26bb6f..ee80271b 100644 --- a/i18n/hi/encryption.md +++ b/i18n/hi/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/hi/file-sharing.md b/i18n/hi/file-sharing.md index a59bbf59..839a7419 100644 --- a/i18n/hi/file-sharing.md +++ b/i18n/hi/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/hi/financial-services.md b/i18n/hi/financial-services.md index bd24c50a..4af77052 100644 --- a/i18n/hi/financial-services.md +++ b/i18n/hi/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/hi/frontends.md b/i18n/hi/frontends.md index c03c1138..9e83fe5e 100644 --- a/i18n/hi/frontends.md +++ b/i18n/hi/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/hi/language-tools.md b/i18n/hi/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/hi/language-tools.md +++ b/i18n/hi/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/hi/mobile-browsers.md b/i18n/hi/mobile-browsers.md index 0ba1400a..739eceed 100644 --- a/i18n/hi/mobile-browsers.md +++ b/i18n/hi/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/hi/office-suites.md b/i18n/hi/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/hi/office-suites.md +++ b/i18n/hi/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/hi/os/android-overview.md b/i18n/hi/os/android-overview.md index 6ab0125f..152e4926 100644 --- a/i18n/hi/os/android-overview.md +++ b/i18n/hi/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/hi/pastebins.md b/i18n/hi/pastebins.md index 66d41268..7ce4f4b3 100644 --- a/i18n/hi/pastebins.md +++ b/i18n/hi/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/hi/real-time-communication.md b/i18n/hi/real-time-communication.md index a5e505d8..54c745ae 100644 --- a/i18n/hi/real-time-communication.md +++ b/i18n/hi/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/hi/router.md b/i18n/hi/router.md index a80c7301..3e8eb49d 100644 --- a/i18n/hi/router.md +++ b/i18n/hi/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/hi/search-engines.md b/i18n/hi/search-engines.md index 5d268ab2..d48fc25a 100644 --- a/i18n/hi/search-engines.md +++ b/i18n/hi/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Recommended Providers diff --git a/i18n/hi/tools.md b/i18n/hi/tools.md index c3cee197..8b65f8bf 100644 --- a/i18n/hi/tools.md +++ b/i18n/hi/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/hu/about.md b/i18n/hu/about.md index 7abad3b0..4c662116 100644 --- a/i18n/hu/about.md +++ b/i18n/hu/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/hu/android/general-apps.md b/i18n/hu/android/general-apps.md index 609a890a..9f0ae43c 100644 --- a/i18n/hu/android/general-apps.md +++ b/i18n/hu/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Figyelmeztetés

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/hu/browser-extensions.md b/i18n/hu/browser-extensions.md index f53fa84f..76c1c7b3 100644 --- a/i18n/hu/browser-extensions.md +++ b/i18n/hu/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/hu/cloud.md b/i18n/hu/cloud.md index d410dc5f..c4ea25c7 100644 --- a/i18n/hu/cloud.md +++ b/i18n/hu/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/hu/data-redaction.md b/i18n/hu/data-redaction.md index 10d4303a..4aa3a06a 100644 --- a/i18n/hu/data-redaction.md +++ b/i18n/hu/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + Fájlok megosztásakor ügyelj a kapcsolódó metaadatok eltávolítsára. A képfájlok gyakran tartalmaznak [Exif](https://en.wikipedia.org/wiki/Exif) adatokat. A fényképek időnként még GPS-koordinátákat is tartalmaznak a fájl metaadataiban. ## Asztal diff --git a/i18n/hu/desktop-browsers.md b/i18n/hu/desktop-browsers.md index 23783e6f..05c7083e 100644 --- a/i18n/hu/desktop-browsers.md +++ b/i18n/hu/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Android - ## Követelmények **Tartsd figyelemben, hogy nem állunk kapcsolatban az általunk ajánlott projektek egyikével sem.** Az [alap kritériumaink mellett](about/criteria.md), egyértelmű követelményrendszert dolgoztunk ki, hogy objektív ajánlásokat tudjunk tenni. Javasoljuk, hogy ismerkedj meg ezzel a listával, mielőtt kiválasztanál egy projektet, és végezz saját kutatásokat, hogy megbizonyosodj arról, hogy ez a megfelelő választás számodra. diff --git a/i18n/hu/desktop.md b/i18n/hu/desktop.md index 80d952d4..5ee9645f 100644 --- a/i18n/hu/desktop.md +++ b/i18n/hu/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/hu/encryption.md b/i18n/hu/encryption.md index 89f672a5..5c9fc0db 100644 --- a/i18n/hu/encryption.md +++ b/i18n/hu/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/hu/file-sharing.md b/i18n/hu/file-sharing.md index 635000ed..fdc9d7de 100644 --- a/i18n/hu/file-sharing.md +++ b/i18n/hu/file-sharing.md @@ -143,7 +143,6 @@ A **Syncthing** egy nyílt forráskódú peer-to-peer folyamatos fájlszinkroniz
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/hu/financial-services.md b/i18n/hu/financial-services.md index dc04c5e5..7bcfc5b8 100644 --- a/i18n/hu/financial-services.md +++ b/i18n/hu/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Követelmények **Tartsd figyelemben, hogy nem állunk kapcsolatban az általunk ajánlott projektek egyikével sem.** Az [alap kritériumaink mellett](about/criteria.md), egyértelmű követelményrendszert dolgoztunk ki, hogy objektív ajánlásokat tudjunk tenni. Javasoljuk, hogy ismerkedj meg ezzel a listával, mielőtt kiválasztanál egy projektet, és végezz saját kutatásokat, hogy megbizonyosodj arról, hogy ez a megfelelő választás számodra. diff --git a/i18n/hu/frontends.md b/i18n/hu/frontends.md index b866425f..93a26720 100644 --- a/i18n/hu/frontends.md +++ b/i18n/hu/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Figyelmeztetés

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Figyelmeztetés

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Figyelmeztetés

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Figyelmeztetés

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Figyelmeztetés

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Figyelmeztetés

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Figyelmeztetés

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Figyelmeztetés

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Követelmények **Tartsd figyelemben, hogy nem állunk kapcsolatban az általunk ajánlott projektek egyikével sem.** Az [alap kritériumaink mellett](about/criteria.md), egyértelmű követelményrendszert dolgoztunk ki, hogy objektív ajánlásokat tudjunk tenni. Javasoljuk, hogy ismerkedj meg ezzel a listával, mielőtt kiválasztanál egy projektet, és végezz saját kutatásokat, hogy megbizonyosodj arról, hogy ez a megfelelő választás számodra. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/hu/language-tools.md b/i18n/hu/language-tools.md index 8553df4a..578f541b 100644 --- a/i18n/hu/language-tools.md +++ b/i18n/hu/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/hu/mobile-browsers.md b/i18n/hu/mobile-browsers.md index de5e8220..21c86574 100644 --- a/i18n/hu/mobile-browsers.md +++ b/i18n/hu/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/hu/office-suites.md b/i18n/hu/office-suites.md index 3b164cac..8868cc12 100644 --- a/i18n/hu/office-suites.md +++ b/i18n/hu/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/hu/os/android-overview.md b/i18n/hu/os/android-overview.md index 9f301bb0..1899557c 100644 --- a/i18n/hu/os/android-overview.md +++ b/i18n/hu/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### Felhasználói Profilok -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -A felhasználói profilok segítségével korlátozásokat szabhatsz meg egy adott profilra vonatkozóan, például: hívások kezdeményezése, SMS használata vagy alkalmazások telepítése a készülékre. Minden profil a saját titkosítási kulcsával van titkosítva, és nem tud hozzáférni más profilok adataihoz. Még a készülék tulajdonosa sem tekintheti meg más profilok adatait a jelszó ismerete nélkül. A több felhasználói profil az izoláció biztonságosabb módja. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Minden profil a saját titkosítási kulcsával van titkosítva, és nem tud hozzáférni más profilok adataihoz. Még a készülék tulajdonosa sem tekintheti meg más profilok adatait a jelszó ismerete nélkül. A több felhasználói profil az izoláció biztonságosabb módja. ### Munkaprofil -A [Munkaprofilok](https://support.google.com/work/android/answer/6191949) egy másik módja egyes alkalmazások elkülönítésének, és kényelmesebb lehet, mint a különálló felhasználói profilok használata. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/hu/pastebins.md b/i18n/hu/pastebins.md index 18529bfd..28f7f49f 100644 --- a/i18n/hu/pastebins.md +++ b/i18n/hu/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/hu/real-time-communication.md b/i18n/hu/real-time-communication.md index c52a5c37..96c00f1c 100644 --- a/i18n/hu/real-time-communication.md +++ b/i18n/hu/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/hu/router.md b/i18n/hu/router.md index ad303c12..a8f45981 100644 --- a/i18n/hu/router.md +++ b/i18n/hu/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Lejjebb bemutatunk néhány alternatív operációs rendszert, amelyek használhatók routereken, Wi-Fi hozzáférési pontokon, stb. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/hu/search-engines.md b/i18n/hu/search-engines.md index f9a37e43..d30ebe19 100644 --- a/i18n/hu/search-engines.md +++ b/i18n/hu/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Ajánlott Szolgáltatók diff --git a/i18n/hu/tools.md b/i18n/hu/tools.md index da0f109e..53cbab15 100644 --- a/i18n/hu/tools.md +++ b/i18n/hu/tools.md @@ -31,15 +31,6 @@ Ha további információt szeretnél megtudni az egyes projektekről, hogy miér -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/id/about.md b/i18n/id/about.md index 043f602f..9bd52282 100644 --- a/i18n/id/about.md +++ b/i18n/id/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/id/android/general-apps.md b/i18n/id/android/general-apps.md index d8eb8f97..d91f99e8 100644 --- a/i18n/id/android/general-apps.md +++ b/i18n/id/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/id/browser-extensions.md b/i18n/id/browser-extensions.md index ca4f1c6e..79dd0b20 100644 --- a/i18n/id/browser-extensions.md +++ b/i18n/id/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/id/cloud.md b/i18n/id/cloud.md index 616da96e..26fb6ff7 100644 --- a/i18n/id/cloud.md +++ b/i18n/id/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/id/data-redaction.md b/i18n/id/data-redaction.md index 97a427da..65ebb504 100644 --- a/i18n/id/data-redaction.md +++ b/i18n/id/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Paparan Publik](basics/common-threats.md#limiting-public-information ""){.pg-green} + Saat berbagi file, pastikan untuk menghapus metadata terkait. File gambar biasanya menyertakan data [Exif](https://en.wikipedia.org/wiki/Exif). Foto terkadang bahkan menyertakan koordinat GPS dalam metadata file. ## Desktop diff --git a/i18n/id/desktop-browsers.md b/i18n/id/desktop-browsers.md index 9b6d30d0..b6f8df42 100644 --- a/i18n/id/desktop-browsers.md +++ b/i18n/id/desktop-browsers.md @@ -269,7 +269,7 @@ Brave menambahkan "[kode rujukan](https://github.com/brave/brave-browser/wiki/Br These options can be found in :material-menu: → **Settings**. -#### Perisai +#### Shields Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Sumber Daya Tambahan - ## Kriteria **Harap diperhatikan bahwa kami tidak berafiliasi dengan proyek-proyek yang kami rekomendasikan.** Selain [kriteria standar kami](about/criteria.md), kami telah mengembangkan serangkaian persyaratan yang jelas untuk memungkinkan kami memberikan rekomendasi yang objektif. Kami sarankan Anda membiasakan diri dengan daftar ini sebelum memilih untuk menggunakan sebuah proyek, dan melakukan penelitian sendiri untuk memastikan bahwa itu adalah pilihan yang tepat untuk Anda. diff --git a/i18n/id/desktop.md b/i18n/id/desktop.md index dff4d215..a7ee82ca 100644 --- a/i18n/id/desktop.md +++ b/i18n/id/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Kapitalisme Pengawasan](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Serangan Pasif](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/id/encryption.md b/i18n/id/encryption.md index 2801effd..a01049a1 100644 --- a/i18n/id/encryption.md +++ b/i18n/id/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/id/file-sharing.md b/i18n/id/file-sharing.md index 4f143344..d44c2446 100644 --- a/i18n/id/file-sharing.md +++ b/i18n/id/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/id/financial-services.md b/i18n/id/financial-services.md index 8fbe8f71..c6c9f866 100644 --- a/i18n/id/financial-services.md +++ b/i18n/id/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Kapitalisme Pengawasan](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Layanan Penyamaran Pembayaran +Protects against the following threat(s): + +- [:material-account-search: Paparan Publik](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Pengawasan Massal](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Kriteria **Harap diperhatikan bahwa kami tidak berafiliasi dengan proyek-proyek yang kami rekomendasikan.** Selain [kriteria standar kami](about/criteria.md), kami telah mengembangkan serangkaian persyaratan yang jelas untuk memungkinkan kami memberikan rekomendasi yang objektif. Kami sarankan Anda membiasakan diri dengan daftar ini sebelum memilih untuk menggunakan sebuah proyek, dan melakukan penelitian sendiri untuk memastikan bahwa itu adalah pilihan yang tepat untuk Anda. diff --git a/i18n/id/frontends.md b/i18n/id/frontends.md index e0e18017..77318bec 100644 --- a/i18n/id/frontends.md +++ b/i18n/id/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Kapitalisme Pengawasan](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Kriteria **Harap diperhatikan bahwa kami tidak berafiliasi dengan proyek-proyek yang kami rekomendasikan.** Selain [kriteria standar kami](about/criteria.md), kami telah mengembangkan serangkaian persyaratan yang jelas untuk memungkinkan kami memberikan rekomendasi yang objektif. Kami sarankan Anda membiasakan diri dengan daftar ini sebelum memilih untuk menggunakan sebuah proyek, dan melakukan penelitian sendiri untuk memastikan bahwa itu adalah pilihan yang tepat untuk Anda. -Recommended frontends... - -- Harus berupa perangkat lunak sumber terbuka. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Harus berupa perangkat lunak sumber terbuka. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/id/language-tools.md b/i18n/id/language-tools.md index 17f740f7..a1104b1f 100644 --- a/i18n/id/language-tools.md +++ b/i18n/id/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/id/mobile-browsers.md b/i18n/id/mobile-browsers.md index 8528c1fb..f3a3a8d4 100644 --- a/i18n/id/mobile-browsers.md +++ b/i18n/id/mobile-browsers.md @@ -64,8 +64,8 @@ Brave dibuat berdasarkan proyek peramban web Chromium, sehingga seharusnya teras Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave dibuat berdasarkan proyek peramban web Chromium, sehingga seharusnya teras Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -Opsi-opsi ini dapat ditemukan di :material-menu: → **Pengaturan** → **Perisai Brave& privasi** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/id/office-suites.md b/i18n/id/office-suites.md index 06868e6a..986a5bcc 100644 --- a/i18n/id/office-suites.md +++ b/i18n/id/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/id/os/android-overview.md b/i18n/id/os/android-overview.md index 7817bb5d..049d33f7 100644 --- a/i18n/id/os/android-overview.md +++ b/i18n/id/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### Profil Pengguna -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/id/pastebins.md b/i18n/id/pastebins.md index fce72911..2a6b126d 100644 --- a/i18n/id/pastebins.md +++ b/i18n/id/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/id/real-time-communication.md b/i18n/id/real-time-communication.md index c2246f7c..7c0621bc 100644 --- a/i18n/id/real-time-communication.md +++ b/i18n/id/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/id/router.md b/i18n/id/router.md index 3a7ea7a7..4a202f9b 100644 --- a/i18n/id/router.md +++ b/i18n/id/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: Kapitalisme Pengawasan](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Serangan Pasif](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/id/search-engines.md b/i18n/id/search-engines.md index 7cfca0e7..362c32b2 100644 --- a/i18n/id/search-engines.md +++ b/i18n/id/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Kapitalisme Pengawasan](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Penyedia yang Direkomendasikan diff --git a/i18n/id/tools.md b/i18n/id/tools.md index 08193fe7..ea5a7773 100644 --- a/i18n/id/tools.md +++ b/i18n/id/tools.md @@ -31,15 +31,6 @@ Untuk detail lebih lanjut tentang setiap proyek, mengapa proyek tersebut dipilih -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/it/about.md b/i18n/it/about.md index 043f602f..9bd52282 100644 --- a/i18n/it/about.md +++ b/i18n/it/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/it/android/general-apps.md b/i18n/it/android/general-apps.md index bed242dd..c96c81d2 100644 --- a/i18n/it/android/general-apps.md +++ b/i18n/it/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Avviso

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/it/browser-extensions.md b/i18n/it/browser-extensions.md index a3489d7a..7bfffbf7 100644 --- a/i18n/it/browser-extensions.md +++ b/i18n/it/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Scarica -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/it/cloud.md b/i18n/it/cloud.md index d0ddf414..b92c86d1 100644 --- a/i18n/it/cloud.md +++ b/i18n/it/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md index a07c7d89..35c5ed66 100644 --- a/i18n/it/data-redaction.md +++ b/i18n/it/data-redaction.md @@ -6,6 +6,10 @@ description: Utilizza questi strumenti per rimuovere metadati come la posizione cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Esposizione pubblica](basics/common-threats.md#limiting-public-information ""){.pg-green} + Condividendo dei file, assicurati di rimuovere i metadati associati. I file immagine includono comunemente dati [Exif](https://en.wikipedia.org/wiki/Exif). Talvolta, le foto, includono persino le coordinate GPS nei metadati del file. ## Desktop diff --git a/i18n/it/desktop-browsers.md b/i18n/it/desktop-browsers.md index 0dc4b624..4bd5ab7f 100644 --- a/i18n/it/desktop-browsers.md +++ b/i18n/it/desktop-browsers.md @@ -179,7 +179,7 @@ Se vuoi mantenere l'accesso per alcuni siti in particolare, puoi consentire le e Ciò ti protegge dai cookie persistenti, ma non da quelli acquisiti durante ogni sessione di navigazione. Con questa opzione attiva, è possibile eliminare facilmente i cookie del browser riavviando Firefox. Puoi impostare delle eccezioni a seconda del sito, se desideri rimanere connesso a un sito in particolare, che visiti spesso. -##### Telemetria +##### Telemetry - [ ] Rimuovi la spunta da **Consenti a Firefox di inviare a Mozilla dati tecnici e relativi all’interazione con il browser** - [ ] Rimuovi la spunta da **Consenti a Firefox di installare e condurre studi** @@ -295,8 +295,8 @@ Brave consente di selezionare filtri aggiuntivi per i contenuti nella pagina int
-1. Questa opzione offre una funzionalità simile alle [modalità di blocco](https://github.com/gorhill/uBlock/wiki/Blocking-mode) avanzate di uBlock Origin. -2. Se desideri mantenere l'accesso in un particolare sito che visiti spesso, puoi selezionare le eccezioni per ogni sito cliccando sull'icona dello scudo sulla barra degli indirizzi. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave consente di selezionare filtri aggiuntivi per i contenuti nella pagina int - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Le funzionalità Web3 di Brave possono potenzialmente aumentare il fingerprint d - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Le funzionalità Web3 di Brave possono potenzialmente aumentare il fingerprint d **Brave Wallet** opera localmente sul tuo computer, ma non supporta alcuna criptovaluta privata, quindi, scoraggiamo l'utilizzo di questa funzione. -## Risorse Aggiuntive - ## Criteri **Ti preghiamo di notare che non siamo affiliati con alcuno dei progetti consigliati.** Oltre ai [nostri criteri standard](about/criteria.md), abbiamo sviluppato una serie chiara di requisiti per consentirci di fornire consigli oggettivi. Ti suggeriamo di familiarizzare con questi elenchi, prima di scegliere di utilizzare un progetto e di condurre le tue ricerche per assicurarti che si tratti della scelta migliore per te. diff --git a/i18n/it/desktop.md b/i18n/it/desktop.md index b5cf32c6..1797283c 100644 --- a/i18n/it/desktop.md +++ b/i18n/it/desktop.md @@ -5,6 +5,10 @@ description: Le distribuzioni di Linux sono comunemente consigliate per la prote cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Capitalismo di sorveglianza](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Le distribuzioni di Linux sono comunemente consigliate per la protezione della privacy e la libertà dei software. Se non utilizzi già Linux, seguono alcune distribuzioni che suggeriamo di provare, nonché consigli generali sul miglioramento della privacy e della sicurezza, applicabili a molte distribuzioni di Linux. - [Panoramica generale di Linux :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux ha un ciclo di rilascio continuo. Non esiste un piano di rilascio fis Essendo una distribuzione fai da te, [dovresti configurare e mantenere](#arch-based-distributions) il tuo sistema per conto tuo. Arch dispone di un [installatore ufficiale](https://wiki.archlinux.org/title/Archinstall) per semplificare il processo di installazione. -Gran parte dei [pacchetti di Arch Linux](https://reproducible.archlinux.org) sono [riproducibili](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Distribuzioni atomiche @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (la fonte principale dei pacchetti) è contenuto in un unico repository di GitHub. Inoltre, puoi definire i tuoi pacchetti nello stesso linguaggio, quindi, includerli facilmente nella tua configurazione. -Nix è un gestore di pacchetti basato sul codice sorgente; se non ne esiste alcuna binary-cache pre-buildata, Nix creerà semplicemente il pacchetto dal sorgente, utilizzando le istruzioni di build. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix è un gestore di pacchetti basato sul codice sorgente; se non ne esiste alcuna binary-cache pre-buildata, Nix creerà semplicemente il pacchetto dal sorgente, utilizzando le istruzioni di build. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Distribuzioni incentrate sull'anonimato @@ -135,7 +139,7 @@ Nix è un gestore di pacchetti basato sul codice sorgente; se non ne esiste alcu ![Logo di Whonix](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** si basa su [Kicksecure](#kicksecure), una biforcazione incentrata sulla sicurezza di Debian. Mira a fornire privacy, sicurezza e anonimato su Internet. Whonix è meglio utilizzato insieme a [Qubes OS](#qubes-os). +**Whonix** si basa su [Kicksecure](#kicksecure), una biforcazione incentrata sulla sicurezza di Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix è meglio utilizzato insieme a [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Logo di Tails](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** è un sistema operativo live basato su Debian che instrada tutte le comunicazioni attraverso Tor, che può essere avviato su quasi tutti i computer da un'installazione su DVD, chiavetta USB o scheda SD. Utilizza [Tor](tor.md) per preservare la privacy e l'anonimato, aggirando la censura e non lasciando traccia di sé sul computer utilizzato, una volta spento. +**Tails** è un sistema operativo live basato su Debian che instrada tutte le comunicazioni attraverso Tor, che può essere avviato su quasi tutti i computer da un'installazione su DVD, chiavetta USB o scheda SD. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ Di design, Tails dovrebbe resettarsi completamente dopo ogni riavvio. Encrypted ## Distribuzioni incentrate sulla sicurezza +Protects against the following threat(s): + +- [:material-bug-outline: Attacchi Passivi](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ Di design, Tails dovrebbe resettarsi completamente dopo ogni riavvio. Encrypted
-Qubes OS protegge il computer isolando i sottosistemi (ad esempio, rete, USB, ecc.) e applicazioni in *qubes* separati. Se una parte del sistema dovesse essere compromessa, l'isolamento aggiuntivo potrebbe proteggere il resto dei *qubes* e il sistema centrale. +Qubes OS protegge il computer isolando i sottosistemi (ad esempio, rete, USB, ecc.) e applicazioni in *qubes* separati. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. Per ulteriori informazioni sul funzionamento di Qubes, leggi la nostra pagina [Panoramica su Qubes OS](os/qubes-overview.md). @@ -242,3 +250,5 @@ La scelta di una distro Linux adatta a te dipende da una grande varietà di pref - Mantenere un sistema operativo è un sfida importante e, i progetti più piccoli, tendono a compiere errori evitabili o a ritardare gli aggiornamenti critici (o peggio, scomparire interamente). Ci orientiamo verso progetti che, tra 10 anni, potrebbero essere ancora presenti (che sia grazie a supporto aziendale o supporto della community molto significativo), e ci allontaniamo da progetti costruiti a mano o aventi un numero ridotto di manutentori. Inoltre, [i nostri criteri standard](about/criteria.md) per i progetti raccomandati sono ancora validi. **Si prega di notare che non siamo affiliati a nessuno dei progetti che raccomandiamo.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index a6554cf9..a858d19c 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disco) Protects against the following threat(s): diff --git a/i18n/it/file-sharing.md b/i18n/it/file-sharing.md index 94c7020a..8467a8d2 100644 --- a/i18n/it/file-sharing.md +++ b/i18n/it/file-sharing.md @@ -143,7 +143,6 @@ Sconsigliamo di utilizzare l'[App E2EE](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/it/financial-services.md b/i18n/it/financial-services.md index 8c587ccd..94461859 100644 --- a/i18n/it/financial-services.md +++ b/i18n/it/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Capitalismo di sorveglianza](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Effettuare pagamenti online è una delle maggiori sfide per la privacy. Questi servizi possono assisterti nel proteggere la tua privacy da commercianti e altri tracciatori, ammesso che tu abbia una buona comprensione di come effettuare efficientemente i pagamenti privati. Ti incoraggiamo vivamente a leggere prima il nostro articolo di panoramica sui pagamenti, prima di effettuare qualsiasi acquisto: [Effettuare pagamenti privati :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Servizi di Mascheramento dei Pagamenti +Protects against the following threat(s): + +- [:material-account-search: Esposizione pubblica](basics/common-threats.md#limiting-public-information ""){.pg-green} + Esistono numerosi servizi che forniscono "carte di debito virtuali", che puoi utilizzare con i commercianti online, senza rivelare le tue informazioni bancarie o di fatturazione reali, in gran parte dei casi. È importante notare che questi servizi finanziari **non** sono anonimi e sono soggetti alle leggi di "Conoscenza del Cliente" (KYC) e potrebbero richiedere il tuo ID o altre informazioni identificative. Questi servizi sono principalmente utili per proteggerti dalle violazioni di dati dei commercianti, dal tracciamento meno sofisticato o dalla correlazione degli acquisti dalle agenzie di marketing, nonché dal furto di dati online; e **non** per effettuare un acquisto in completo anonimato.
@@ -67,6 +75,10 @@ Le carte virtuali di MySudo sono attualmente disponibili solo tramite la loro ap ## Mercati di Carte Regalo +Protects against the following threat(s): + +- [:material-eye-outline: Sorveglianza di massa](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + Questi servizi ti consentono di acquistare carte regalo per numerosi commercianti online, con le [criptovalute](cryptocurrency.md). Alcuni offrono opzioni di verifica dell'ID per i limiti superiori, ma consentono anche la creazione di profili utilizzando soltanto un indirizzo email. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ Questi servizi ti consentono di acquistare carte regalo per numerosi commerciant
- ### Criteri **Ti preghiamo di notare che non siamo affiliati con alcun progetto consigliato.** Oltre ai [nostri criteri standard](about/criteria.md), abbiamo sviluppato una serie chiara di requisiti per consentirci di fornire consigli oggettivi. Ti suggeriamo di familiarizzare con questo elenco prima di scegliere di utilizzare un progetto e di condurre le tue ricerche per assicurarti che si tratti della scelta adatta a te. diff --git a/i18n/it/frontends.md b/i18n/it/frontends.md index 572cb9fa..c4853206 100644 --- a/i18n/it/frontends.md +++ b/i18n/it/frontends.md @@ -5,11 +5,15 @@ description: Questi frontend open source per vari servizi Internet ti consentono cover: frontends.webp --- -Talvolta, i servizi, proveranno a forzarti a iscriverti per un profilo, bloccando l'accesso ai contenuti con dei fastidiosi popup. Potrebbero anche corrompersi, se JavaScript è disabilitato. Questi frontend possono consentirti di aggirare queste restrizioni. +Protects against the following threat(s): + +- [:material-account-cash: Capitalismo di sorveglianza](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Talvolta, i servizi, proveranno a forzarti a iscriverti per un profilo, bloccando l'accesso ai contenuti con dei fastidiosi popup. Potrebbero anche corrompersi, se JavaScript è disabilitato. These frontends can allow you to circumvent these restrictions. Se scegli di ospitare autonomamente tali frontend, è importante che tu disponga di altre persone che utilizzino la tua istanza, affinché tu possa confonderti. Dovresti stare attento a dove e come ospiti, poiché l'utilizzo di altre persone sarà collegato al tuo hosting. -Utilizzando un'istanza gestita da altri, assicurati di leggere la politica sulla privacy di quell'istanza nello specifico. Possono anche essere modificate dai proprietari e, dunque, potrebbero non riflettere la politica predefinita. Alcune istanze dispongono di indirizzi .onion di [Tor](tor.md), che potrebbero garantire della privacy, finché le tue richieste di ricerca non contengono PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). Possono anche essere modificate dai proprietari e, dunque, potrebbero non riflettere la politica predefinita. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,14 +23,12 @@ Utilizzando un'istanza gestita da altri, assicurati di leggere la politica sulla ![Logo di Redlib](assets/img/frontends/redlib.svg){ align=right } -**Redlib** è un frontend open source per il sito web [Reddit](https://reddit.com) che è anche auto-ospitabile. - -Esistono numerose istanze pubbliche, alcune dotate del supporto ai servizi onion di [Tor](tor.md). +**Redlib** è un frontend open source per il sito web [Reddit](https://reddit.com) che è anche auto-ospitabile. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Istanze Pubbliche"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Codice Sorgente" } +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ Il sito web [Old Reddit](https://old.reddit.com) non richiede tanto JavaScript q

Suggerimento

Redlib è utile se desideri disabilitare JavaScript nel tuo browser, come [Tor Browser](tor.md#tor-browser) al livello di sicurezza "Il più sicuro". +
## TikTok @@ -53,12 +56,12 @@ Redlib è utile se desideri disabilitare JavaScript nel tuo browser, come [Tor B **ProxiTok** è un frontend open source per il sito web [TikTok](https://tiktok.com) che è anche auto-ospitabile. -Esistono numerose istanze pubbliche, alcune dotate del supporto ai servizi onion di [Tor](tor.md). +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Istanze Pubbliche"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Codice Sorgente" } +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok è utile se desideri disabilitare JavaScript nel tuo browser, come [Tor ## YouTube -### FreeTube - -
- -![Logo di FreeTube](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** è un'applicazione desktop gratuita e open source per [YouTube](https://youtube.com). Utilizzando FreeTube, il tuo elenco di iscrizioni e playlist è salvato localmente sul tuo dispositivo. - -Di default, FreeTube blocca tutte le inserzioni di YouTube. Inoltre, FreeTube integra facoltativamente [SponsorBlock](https://sponsor.ajay.app), per aiutarti a saltare i segmenti sponsorizzati dei video. - -[:octicons-home-16: Pagina Principale](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribuisci } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Avviso

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera l'utilizzo di una [VPN](vpn.md) o di [Tor](tor.md) se il tuo [modello di minaccia](basics/threat-modeling.md) richiede di nascondere il tuo indirizzo IP. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Pagina Principale](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Codiice Sorgente" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribuisci } - -
-Scarica - -- [:simple-apple: App Store](https://apps.apple.com/it/app/yattee/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Avviso

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera l'utilizzo di una [VPN](vpn.md) o di [Tor](tor.md) se il tuo [modello di minaccia](basics/threat-modeling.md) richiede di nascondere il tuo indirizzo IP. - -
- -Di default, Yattee blocca tutte le inserzioni di YouTube. Inoltre, Yattee integra facoltativamente [SponsorBlock](https://sponsor.ajay.app) per aiutarti a saltare i segmenti sponsorizzati dei video. - -### LibreTube (Android) - -
- -![Logo di LibreTube](assets/img/frontends/libretube.svg#only-light){ align=right } -![Logo di LibreTube](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** è un'applicazione Android gratuita e open source per [YouTube](https://youtube.com) che utilizza l'API di [Piped](#piped). - -LibreTube ti consente di memorizzare il tuo elenco di iscrizioni e playlist localmente sul tuo dispositivo Android, o su un profilo sulla tua istanza di Piped di scelta, che ti consente di accedervi senza problemi, anche su altri dispositivi. - -[:octicons-home-16: Pagina Principale](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribuisci } - -
-Scarica - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Avviso

- -Quando utilizzi LibreTube, il tuo indirizzo IP sarà visibile all'istanza [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) da te scelta e/o [SponsorBlock](https://sponsor.ajay.app) a seconda della tua configurazione. Considera l'utilizzo di una [VPN](vpn.md) o di [Tor](tor.md) se il tuo [modello di minaccia](basics/threat-modeling.md) richiede di nascondere il tuo indirizzo IP. - -
- -Di default, LibreTube blocca tutte le inserzioni di YouTube. Inoltre, LibreTube utilizza [SponsorBlock](https://sponsor.ajay.app) per aiutarti a saltare i segmenti video sponsorizzati. Puoi configurare interamente i tipi di segmenti che SponsorBlock salterà, o disabilitarli interamente. È inoltre presente un pulsante, sul lettore dei video stesso, per disabilitarlo per un video specifico, se desiderato. - -### NewPipe (Android) - -
- -![Logo di Newpipe](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** è un'applicazione Android gratuita e open source per [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com) e [PeerTube](https://joinpeertube.org/it) (1). - -Il tuo elenco delle iscrizioni e le playlist sono salvate localmente sul tuo dispositivo Android. - -[:octicons-home-16: Pagina Principale](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribuisci } - -
-Scarica - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. L'istanza predefinita è [FramaTube](https://framatube.org), ma se ne possono aggiungere altre tramite **Impostazioni** → **Contenuto** → **Istanze PeerTube** - -
-

Avviso

- -Utilizzando NewPipe, il tuo indirizzo IP sarà visibile ai fornitori di video utilizzati. Considera l'utilizzo di una [VPN](vpn.md) o di [Tor](tor.md) se il tuo [modello di minaccia](basics/threat-modeling.md) richiede di nascondere il tuo indirizzo IP. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ Utilizzando NewPipe, il tuo indirizzo IP sarà visibile ai fornitori di video ut **Invidious** è un frontend gratuito e open source per [YouTube](https://youtube.com), che puoi anche ospitare autonomamente. -Esistono numerose istanze pubbliche, alcune dotate del supporto ai servizi onion di [Tor](tor.md). +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. -[:octicons-home-16: Pagina Principale](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Istanze Pubbliche"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious è utile se desideri disabilitare JavaScript nel tuo browser, come [To Piped richiede JavaScript per funzionare e dispone di numerose istanze pubbliche. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Istanze Pubbliche"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribuisci } +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![Logo di FreeTube](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** è un'applicazione desktop gratuita e open source per [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +Utilizzando FreeTube, il tuo elenco di iscrizioni e playlist è salvato localmente sul tuo dispositivo. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Avviso

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera l'utilizzo di una [VPN](vpn.md) o di [Tor](tor.md) se il tuo [modello di minaccia](basics/threat-modeling.md) richiede di nascondere il tuo indirizzo IP. + +
+ +Di default, FreeTube blocca tutte le inserzioni di YouTube. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Scarica + +- [:simple-apple: App Store](https://apps.apple.com/it/app/yattee/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Avviso

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera l'utilizzo di una [VPN](vpn.md) o di [Tor](tor.md) se il tuo [modello di minaccia](basics/threat-modeling.md) richiede di nascondere il tuo indirizzo IP. + +
+ +Di default, Yattee blocca tutte le inserzioni di YouTube. Inoltre, Yattee integra facoltativamente [SponsorBlock](https://sponsor.ajay.app) per aiutarti a saltare i segmenti sponsorizzati dei video. + +### LibreTube (Android) + +
+ +![Logo di LibreTube](assets/img/frontends/libretube.svg#only-light){ align=right } +![Logo di LibreTube](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** è un'applicazione Android gratuita e open source per [YouTube](https://youtube.com) che utilizza l'API di [Piped](#piped). + +Il tuo elenco delle iscrizioni e le playlist sono salvate localmente sul tuo dispositivo Android. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Scarica + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Avviso

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera l'utilizzo di una [VPN](vpn.md) o di [Tor](tor.md) se il tuo [modello di minaccia](basics/threat-modeling.md) richiede di nascondere il tuo indirizzo IP. + +
+ +Di default, LibreTube blocca tutte le inserzioni di YouTube. Inoltre, LibreTube utilizza [SponsorBlock](https://sponsor.ajay.app) per aiutarti a saltare i segmenti video sponsorizzati. Puoi configurare interamente i tipi di segmenti che SponsorBlock salterà, o disabilitarli interamente. È inoltre presente un pulsante, sul lettore dei video stesso, per disabilitarlo per un video specifico, se desiderato. + +### NewPipe (Android) + +
+ +![Logo di Newpipe](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** è un'applicazione Android gratuita e open source per [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com) e [PeerTube](https://joinpeertube.org/it) (1). + +Il tuo elenco delle iscrizioni e le playlist sono salvate localmente sul tuo dispositivo Android. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Scarica + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Avviso

+ +Utilizzando NewPipe, il tuo indirizzo IP sarà visibile ai fornitori di video utilizzati. Considera l'utilizzo di una [VPN](vpn.md) o di [Tor](tor.md) se il tuo [modello di minaccia](basics/threat-modeling.md) richiede di nascondere il tuo indirizzo IP. + +
+ ## Criteri **Ti preghiamo di notare che non siamo affiliati con alcun progetto consigliato.** Oltre ai [nostri criteri standard](about/criteria.md), abbiamo sviluppato una serie chiara di requisiti per consentirci di fornire consigli oggettivi. Ti suggeriamo di familiarizzare con questo elenco prima di scegliere di utilizzare un progetto e di condurre le tue ricerche per assicurarti che si tratti della scelta adatta a te. -Frontend consigliati... - -- Deve essere un software open source. -- Deve essere ospitabile autonomamente. -- Deve fornire tutte le funzionalità di base del sito web a utenti anonimi. - Consideriamo i frontend solo se una delle seguenti condizioni è vera per una piattaforma: - Normalmente accessibile solo con JavaScript abilitato. - Normalmente accessibile solo con un account. - Blocca l'accesso dalle [VPN](vpn.md) commerciali. + +Frontend consigliati... + +- Deve essere un software open source. +- Deve essere ospitabile autonomamente. +- Deve fornire tutte le funzionalità di base del sito web a utenti anonimi. diff --git a/i18n/it/language-tools.md b/i18n/it/language-tools.md index 935e1135..b3bcf4a6 100644 --- a/i18n/it/language-tools.md +++ b/i18n/it/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md index da3064d4..ee97eb60 100644 --- a/i18n/it/mobile-browsers.md +++ b/i18n/it/mobile-browsers.md @@ -64,8 +64,8 @@ Brave si basa sul progetto del browser web di Chromium, quindi, dovrebbe sembrar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave si basa sul progetto del browser web di Chromium, quindi, dovrebbe sembrar Il Tor Browser è l'unico che veramente permette di navigare Internet anonimamente. Quando utilizzi Brave, consigliamo di modificare le seguenti informazioni per proteggere la tua privacy da certe parti, ma tutti i browser tranne [Tor Browser](tor.md#tor-browser) saranno tracciabili da *qualcuno*, in un modo o nell'altro. -Queste opzioni si possono trovare in :material-menu: → **Impostazioni** → **Protezioni Brave e privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave include delle misure anti-impronta digitale nella sua funzionalità, [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields). Suggeriamo di configurare queste opzioni [globalmente](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) tra tutte le pagine che visiti. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave include delle misure anti-impronta digitale nella sua funzionalità, [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields). Suggeriamo di configurare queste opzioni [globalmente](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) tra tutte le pagine che visiti. + Le funzionalità di Shields possono essere ridotte per ogni sito se necessario; ciò nonostante, raccomandiamo le seguenti impostazioni: -
+=== "Android" -- [x] Seleziona **Aggressivo** sotto **Blocca tracker e annunci** +
-
-Utilizza gli elenchi di filtri predefiniti + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave consente di selezionare filtri aggiuntivi per i contenuti nella pagina interna `brave://adblock`. Sconsigliamo di utilizzare questa funzionalità; piuttosto, mantieni gli elenchi di filtri predefiniti. Utilizzare ulteriori elenchi ti distinguerà dagli altri utenti di Brave e potrebbe inoltre incrementare la superficie di attacco, se è presente un exploit su Brave e una regola dannosa viene aggiunta a uno degli elenchi che utilizzi. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. Sconsigliamo di utilizzare questa funzionalità; piuttosto, mantieni gli elenchi di filtri predefiniti. Utilizzare ulteriori elenchi ti distinguerà dagli altri utenti di Brave e potrebbe inoltre incrementare la superficie di attacco, se è presente un exploit su Brave e una regola dannosa viene aggiunta a uno degli elenchi che utilizzi. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. Questa opzione fornisce una funzionalità simile alle [modalità di blocco](https://github.com/gorhill/uBlock/wiki/Blocking-mode) avanzate di uBlock Origin o all'estensione [NoScript](https://noscript.net). +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. Sconsigliamo di utilizzare questa funzionalità; piuttosto, mantieni gli elenchi di filtri predefiniti. Utilizzare ulteriori elenchi ti distinguerà dagli altri utenti di Brave e potrebbe inoltre incrementare la superficie di attacco, se è presente un exploit su Brave e una regola dannosa viene aggiunta a uno degli elenchi che utilizzi. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Seleziona **Cancella dati all'uscita** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Rimuovi la spunta da tutti i componenti social #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. L'InterPlanetary File System (IPFS) è una rete peer-to-peer e decentralizzata, utilizzata per archiviare e condividere dati in un filesystem distribuito. A meno che tu non utilizzi questa funziona, disabilitala. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/it/office-suites.md b/i18n/it/office-suites.md index 8db27fe3..a4e939d8 100644 --- a/i18n/it/office-suites.md +++ b/i18n/it/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/it/os/android-overview.md b/i18n/it/os/android-overview.md index 09d457a8..3b701214 100644 --- a/i18n/it/os/android-overview.md +++ b/i18n/it/os/android-overview.md @@ -92,19 +92,27 @@ Le applicazioni che rispettano la privacy come [Bitwarden](https://reports.exodu ### Profili Utente -I profili utente multipli si trovano in **Impostazioni** → **Sistema** → **Utenti multipli** e sono il metodo più semplice per isolare in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -Con i profili utente, puoi imporre limitazioni a un profilo specifico, come: effettuare chiamate, utilizzare gli SMS o installare app sul dispositivo. Ogni profilo è crittografato con la sua chiave crittografica e non può accedere ai dati di qualsiasi altro profilo. Anche il proprietario del dispositivo non può visualizzare i dati di altri profili, senza conoscerne la password. I profili utente multipli sono un metodo di isolamento più sicuro. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Ogni profilo è crittografato con la sua chiave crittografica e non può accedere ai dati di qualsiasi altro profilo. Anche il proprietario del dispositivo non può visualizzare i dati di altri profili, senza conoscerne la password. I profili utente multipli sono un metodo di isolamento più sicuro. ### Profilo di lavoro -I [Profili di Lavoro](https://support.google.com/work/android/answer/6191949) sono un altro metodo per isolare le singole app e potrebbe essere più comodo dei profili utente separati. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. Il profilo di lavoro dipende da un controllore del dispositivo per funzionare. Le funzionalità come *File Shuttle* e *blocco della ricerca dei contatti* o qualsiasi tipo di funzionalità d'isolamento, devono essere implementate dal controllore. È inoltre necessario fidarsi completamente dell'app di controllo del dispositivo, che ha pieno accesso ai dati dell'utente all'interno del profilo di lavoro. -Questo metodo, generalmente, è meno sicuro di un profilo utente secondario; tuttavia, ti consente la comodità di eseguire le app nei profili lavorativi e personali, simultaneamente. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### Killswitch per VPN diff --git a/i18n/it/pastebins.md b/i18n/it/pastebins.md index e94c87ca..57876c5a 100644 --- a/i18n/it/pastebins.md +++ b/i18n/it/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index 06a0c7a2..1231078b 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Le immagini del profilo, le reazioni e i nomi utente non sono crittografati. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Le chiamate di gruppo, correntemente, non dispongono di [autenticazione](https://github.com/vector-im/element-web/issues/13074), a significare che i non partecipanti alla stanza, possono anche unirsi alle chiamate. Consigliamo di non utilizzare questa funzionalità per le riunioni private. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. Il protocollo Matrix stesso [teoricamente supporta la segretezza in avanti](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], tuttavia questo è [attualmente non supportato in Element](https://github.com/vector-im/element-web/issues/7101) a causa dell'interruzione di alcuni aspetti dell'esperienza utente, come i backup delle chiavi e la cronologia dei messaggi condivisi. diff --git a/i18n/it/router.md b/i18n/it/router.md index c9313bf5..0a0847b3 100644 --- a/i18n/it/router.md +++ b/i18n/it/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Di seguito sono elencati alcuni sistemi operativi alternativi, utilizzabili sui router, punti d'accesso della Wi-Fi, etc. +Protects against the following threat(s): + +- [:material-account-cash: Capitalismo di sorveglianza](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Attacchi Passivi](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/it/search-engines.md b/i18n/it/search-engines.md index eef67bcf..e3e3a06b 100644 --- a/i18n/it/search-engines.md +++ b/i18n/it/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Capitalismo di sorveglianza](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Fornitori consigliati diff --git a/i18n/it/tools.md b/i18n/it/tools.md index 53a4df57..cce55f87 100644 --- a/i18n/it/tools.md +++ b/i18n/it/tools.md @@ -31,15 +31,6 @@ Per ulteriori dettagli su ogni progetto, perché è stato scelto e ulteriori con -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/ja/about.md b/i18n/ja/about.md index 043f602f..9bd52282 100644 --- a/i18n/ja/about.md +++ b/i18n/ja/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/ja/android/general-apps.md b/i18n/ja/android/general-apps.md index 91f52320..1dd0c16f 100644 --- a/i18n/ja/android/general-apps.md +++ b/i18n/ja/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/ja/browser-extensions.md b/i18n/ja/browser-extensions.md index 15325492..9b5caaf4 100644 --- a/i18n/ja/browser-extensions.md +++ b/i18n/ja/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/ja/cloud.md b/i18n/ja/cloud.md index 6418c1bf..9ba00748 100644 --- a/i18n/ja/cloud.md +++ b/i18n/ja/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/ja/data-redaction.md b/i18n/ja/data-redaction.md index ae103d79..682936d5 100644 --- a/i18n/ja/data-redaction.md +++ b/i18n/ja/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## デスクトップ diff --git a/i18n/ja/desktop-browsers.md b/i18n/ja/desktop-browsers.md index 6d9f860c..3f30b27d 100644 --- a/i18n/ja/desktop-browsers.md +++ b/i18n/ja/desktop-browsers.md @@ -269,7 +269,7 @@ Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave% これらのオプションは :material-menu: → **設定**にあります。 -#### シールド +#### Shields Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ BraveのWeb3機能はブラウザのフィンガープリントなど攻撃面 - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ BraveのWeb3機能はブラウザのフィンガープリントなど攻撃面 **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## 追加のリソース - ## 規準 **私たちは、推薦するどのプロジェクトとも提携していません。**客観的に推薦できるよう、[標準となる規準](about/criteria.md)に加えて、一連の明確な要件を定めています。 プロジェクトを利用する前に、このリストをよく理解し、ご自身で調査を行って、そのプロジェクトがあなたにとって適切な選択かどうかをご確認ください。 diff --git a/i18n/ja/desktop.md b/i18n/ja/desktop.md index f41a1f8c..dc49a77f 100644 --- a/i18n/ja/desktop.md +++ b/i18n/ja/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [Linuxの概要 :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linuxには、ローリングリリースサイクルがあります。 The Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: パッシブ攻撃](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/ja/encryption.md b/i18n/ja/encryption.md index 4c2eb210..724a19e1 100644 --- a/i18n/ja/encryption.md +++ b/i18n/ja/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt(ディスク) Protects against the following threat(s): diff --git a/i18n/ja/file-sharing.md b/i18n/ja/file-sharing.md index 26a9ddba..7beba6eb 100644 --- a/i18n/ja/file-sharing.md +++ b/i18n/ja/file-sharing.md @@ -143,7 +143,6 @@ Nextcloudでの[E2EEアプリ](https://apps.nextcloud.com/apps/end_to_end_encryp
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/ja/financial-services.md b/i18n/ja/financial-services.md index c90f3fa7..5778bab1 100644 --- a/i18n/ja/financial-services.md +++ b/i18n/ja/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [プライベートな支払い :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## 支払いマスキングサービス +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### 規準 **私たちは、推薦するどのプロジェクトとも提携していません。**客観的に推薦できるよう、[標準となる規準](about/criteria.md)に加えて、一連の明確な要件を定めています。 プロジェクトを利用する前に、このリストをよく理解し、ご自身で調査を行って、そのプロジェクトがあなたにとって適切な選択かどうかをご確認ください。 diff --git a/i18n/ja/frontends.md b/i18n/ja/frontends.md index 097e7272..bcb7cb6d 100644 --- a/i18n/ja/frontends.md +++ b/i18n/ja/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -デフォルトでは、Yatteeは全てのYouTubeの広告をブロックします。 In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -購読リストとプレイリストは、Android端末にローカル保存されます。 - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -NewPipeを使用すると、使用している動画プロバイダーにあなたのIPアドレスが表示されます。 Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ NewPipeを使用すると、使用している動画プロバイダーにあな **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +デフォルトでは、Yatteeは全てのYouTubeの広告をブロックします。 In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +購読リストとプレイリストは、Android端末にローカル保存されます。 + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +購読リストとプレイリストは、Android端末にローカル保存されます。 + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +NewPipeを使用すると、使用している動画プロバイダーにあなたのIPアドレスが表示されます。 Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## 規準 **私たちは、推薦するどのプロジェクトとも提携していません。**客観的に推薦できるよう、[標準となる規準](about/criteria.md)に加えて、一連の明確な要件を定めています。 プロジェクトを利用する前に、このリストをよく理解し、ご自身で調査を行って、そのプロジェクトがあなたにとって適切な選択かどうかをご確認ください。 -Recommended frontends... - -- オープンソースのソフトウェアであること。 -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- オープンソースのソフトウェアであること。 +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/ja/language-tools.md b/i18n/ja/language-tools.md index 267fdb13..933fbc7b 100644 --- a/i18n/ja/language-tools.md +++ b/i18n/ja/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/ja/mobile-browsers.md b/i18n/ja/mobile-browsers.md index 535ff449..787037a0 100644 --- a/i18n/ja/mobile-browsers.md +++ b/i18n/ja/mobile-browsers.md @@ -64,8 +64,8 @@ BraveはChromiumウェブブラウザープロジェクトに基づいて構築 Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ BraveはChromiumウェブブラウザープロジェクトに基づいて構築 本当に匿名でインターネットを閲覧する唯一の方法は、Tor Browserを使うことです。 Braveを使用する際は、特定の相手からプライバシーを保護するために以下の設定を変更することをお勧めしますが、 [Tor Browser](tor.md#tor-browser) 以外のブラウザーについては、*誰か*が何らかの形で追跡することができます。 -これらのオプションは、 :material-menu: → **設定** → **Braveシールド & プライバシー**にあります。 +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + シールドのオプションは、必要に応じてサイトごとにダウングレードできますが、デフォルトでは以下の設定をおすすめします。 -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. この機能は使わず、デフォルトのフィルターの一覧のままにしておくことをお勧めします。 追加のリストを使用すると、他のBraveユーザーから目立つようになり、また、Braveの脆弱性によってリストに悪意のあるルールが追加された場合、攻撃対象となる領域が増えるおそれがあります。 +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. この機能は使わず、デフォルトのフィルターの一覧のままにしておくことをお勧めします。 追加のリストを使用すると、他のBraveユーザーから目立つようになり、また、Braveの脆弱性によってリストに悪意のあるルールが追加された場合、攻撃対象となる領域が増えるおそれがあります。 -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. この機能は使わず、デフォルトのフィルターの一覧のままにしておくことをお勧めします。 追加のリストを使用すると、他のBraveユーザーから目立つようになり、また、Braveの脆弱性によってリストに悪意のあるルールが追加された場合、攻撃対象となる領域が増えるおそれがあります。 + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] すべてのソーシャルメディアコンポーネントのチェックを外すこと #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/ja/office-suites.md b/i18n/ja/office-suites.md index f9656a07..429c0c12 100644 --- a/i18n/ja/office-suites.md +++ b/i18n/ja/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/ja/os/android-overview.md b/i18n/ja/os/android-overview.md index 4e212826..5ce285a0 100644 --- a/i18n/ja/os/android-overview.md +++ b/i18n/ja/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### ユーザープロフィール -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### 仕事用プロフィール -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN キルスイッチ diff --git a/i18n/ja/pastebins.md b/i18n/ja/pastebins.md index cf7e9217..24e09757 100644 --- a/i18n/ja/pastebins.md +++ b/i18n/ja/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/ja/real-time-communication.md b/i18n/ja/real-time-communication.md index 000f40e9..72b413c5 100644 --- a/i18n/ja/real-time-communication.md +++ b/i18n/ja/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/ja/router.md b/i18n/ja/router.md index 83472dd8..9d4c964d 100644 --- a/i18n/ja/router.md +++ b/i18n/ja/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: パッシブ攻撃](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/ja/search-engines.md b/i18n/ja/search-engines.md index 541d3e2c..de2a8b61 100644 --- a/i18n/ja/search-engines.md +++ b/i18n/ja/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## 推奨するサービスプロバイダー diff --git a/i18n/ja/tools.md b/i18n/ja/tools.md index bc50e8b4..fd9a6876 100644 --- a/i18n/ja/tools.md +++ b/i18n/ja/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/ko/about.md b/i18n/ko/about.md index 043f602f..9bd52282 100644 --- a/i18n/ko/about.md +++ b/i18n/ko/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/ko/android/general-apps.md b/i18n/ko/android/general-apps.md index ba2b937c..5ff904f1 100644 --- a/i18n/ko/android/general-apps.md +++ b/i18n/ko/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/ko/browser-extensions.md b/i18n/ko/browser-extensions.md index 6eaa3059..e6e773da 100644 --- a/i18n/ko/browser-extensions.md +++ b/i18n/ko/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/ko/cloud.md b/i18n/ko/cloud.md index b57fccb0..1160f0da 100644 --- a/i18n/ko/cloud.md +++ b/i18n/ko/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/ko/data-redaction.md b/i18n/ko/data-redaction.md index 8da0fc39..a9579331 100644 --- a/i18n/ko/data-redaction.md +++ b/i18n/ko/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: 공개 노출(Public Exposure)](basics/common-threats.md#limiting-public-information ""){.pg-green} + 파일을 공유할 때에는 관련 메타데이터를 제거해야 합니다. 이미지 파일에는 보통 [Exif](https://en.wikipedia.org/wiki/Exif) 데이터가 포함되어 있습니다. 사진 파일 메타데이터에는 GPS 좌표가 포함될 때도 있습니다. ## 데스크톱 diff --git a/i18n/ko/desktop-browsers.md b/i18n/ko/desktop-browsers.md index dfb3949e..51f3535d 100644 --- a/i18n/ko/desktop-browsers.md +++ b/i18n/ko/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave의 Web3 기능은 잠재적으로 브라우저의 핑거프린트와 공 - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave의 Web3 기능은 잠재적으로 브라우저의 핑거프린트와 공 **Brave 월렛**은 사용자 컴퓨터 로컬에서 작동하지만, 프라이버시 암호화폐를 지원하지 않으므로 이 또한 사용을 권장하지 않습니다. -## 추가 자료 - ## 평가 기준 **Privacy Guides는 권장 목록의 어떠한 프로젝트와도 제휴를 맺지 않았습니다.** 객관적인 권장 목록을 제공하기 위해, [일반적인 평가 기준](about/criteria.md)에 더해 명확한 요구 사항을 정립하였습니다. 어떠한 프로젝트를 선택해 사용하기 전에, 이러한 요구 사항들을 숙지하고 여러분 스스로 조사하는 과정을 거쳐 적절한 선택을 하시기 바랍니다. diff --git a/i18n/ko/desktop.md b/i18n/ko/desktop.md index 458d0ed6..d42dff10 100644 --- a/i18n/ko/desktop.md +++ b/i18n/ko/desktop.md @@ -5,6 +5,10 @@ description: 프라이버시 보호와 자유 소프트웨어를 이유로, 일 cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: 감시 자본주의(Surveillance Capitalism)](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + 프라이버시 보호와 자유 소프트웨어를 이유로, 일반적으로 Linux 배포판이 권장됩니다. 아직 Linux를 사용하지 않는 분을 위해, 사용해볼 만한 몇 가지 배포판을 추천드립니다. 대부분의 Linux 배포판에 적용 가능한 기본 프라이버시 및 보안 개선 안내도 찾아보실 수 있습니다. - [Linux 기본 개요 :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux는 롤링 릴리스 방식입니다. 정해진 릴리스가 존재하 DIY 배포판이므로 여러분은 자신의 시스템을 여러분 자신이 [직접 구성하고 관리](os/linux-overview.md#arch-based-distributions)해야 합니다. Arch Linux에는 설치 과정을 보다 쉽게 만들어주는 [공식 설치 프로그램](https://wiki.archlinux.org/title/Archinstall)이 존재합니다. -[Arch Linux의 패키지](https://reproducible.archlinux.org)는 대부분 [재현성](https://reproducible-builds.org)을 제공합니다. +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## 익명성 중점 배포판 @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## 보안성 중점 배포판 +Protects against the following threat(s): + +- [:material-bug-outline: 수동적 공격(Passive Attacks)](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/ko/encryption.md b/i18n/ko/encryption.md index 00d0601b..9eaa91b1 100644 --- a/i18n/ko/encryption.md +++ b/i18n/ko/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (디스크) Protects against the following threat(s): diff --git a/i18n/ko/file-sharing.md b/i18n/ko/file-sharing.md index 5ca3532e..a435e187 100644 --- a/i18n/ko/file-sharing.md +++ b/i18n/ko/file-sharing.md @@ -143,7 +143,6 @@ Privacy Guides는 Nextcloud용 [E2EE 앱](https://apps.nextcloud.com/apps/end_to
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/ko/financial-services.md b/i18n/ko/financial-services.md index 03fcf203..03bc291a 100644 --- a/i18n/ko/financial-services.md +++ b/i18n/ko/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: 감시 자본주의(Surveillance Capitalism)](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: 공개 노출(Public Exposure)](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## 기프트 카드 마켓플레이스 +Protects against the following threat(s): + +- [:material-eye-outline: 대중 감시(Mass Surveillance)](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### 평가 기준 **Privacy Guides는 권장 목록의 어떠한 프로젝트와도 제휴를 맺지 않았습니다.** 객관적인 권장 목록을 제공하기 위해, [일반적인 평가 기준](about/criteria.md)에 더해 명확한 요구 사항을 정립하였습니다. 어떠한 프로젝트를 선택해 사용하기 전에, 이러한 요구 사항들을 숙지하고 여러분 스스로 조사하는 과정을 거쳐 적절한 선택을 하시기 바랍니다. diff --git a/i18n/ko/frontends.md b/i18n/ko/frontends.md index ae7a64cb..299f2b39 100644 --- a/i18n/ko/frontends.md +++ b/i18n/ko/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: 감시 자본주의(Surveillance Capitalism)](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,12 +56,12 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. -[:octicons-repo-16: 저장소](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="공개 인스턴스"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=문서} -[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="소스 코드" } +[:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## 평가 기준 **Privacy Guides는 권장 목록의 어떠한 프로젝트와도 제휴를 맺지 않았습니다.** 객관적인 권장 목록을 제공하기 위해, [일반적인 평가 기준](about/criteria.md)에 더해 명확한 요구 사항을 정립하였습니다. 어떠한 프로젝트를 선택해 사용하기 전에, 이러한 요구 사항들을 숙지하고 여러분 스스로 조사하는 과정을 거쳐 적절한 선택을 하시기 바랍니다. -Recommended frontends... - -- 오픈 소스 소프트웨어여야 합니다. -- 자체 호스팅이 가능해야 합니다. -- 익명 사용자도 웹사이트의 기본적인 기능을 모두 사용할 수 있어야 합니다. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- 오픈 소스 소프트웨어여야 합니다. +- 자체 호스팅이 가능해야 합니다. +- 익명 사용자도 웹사이트의 기본적인 기능을 모두 사용할 수 있어야 합니다. diff --git a/i18n/ko/language-tools.md b/i18n/ko/language-tools.md index 38a30954..dc411453 100644 --- a/i18n/ko/language-tools.md +++ b/i18n/ko/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/ko/mobile-browsers.md b/i18n/ko/mobile-browsers.md index 074433e8..2432654f 100644 --- a/i18n/ko/mobile-browsers.md +++ b/i18n/ko/mobile-browsers.md @@ -64,8 +64,8 @@ Brace는 Chromium 웹 브라우저 프로젝트 기반으로 구축되었으므 Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brace는 Chromium 웹 브라우저 프로젝트 기반으로 구축되었으므 진정한 익명 인터넷 탐색이 가능한 유일한 방법은 Tor 브라우저입니다. 다음 설정들은 여러분이 Brave를 사용할 때 특정 주체로부터 프라이버시를 보호할 수 있도록 권장드리는 사항입니다. [Tor 브라우저](tor.md#tor-browser) 이외의 모든 브라우저는 어떤 식으로든 누군가는 특정 대상을 추적할 수 있음을 명심해야 합니다. -이러한 옵션은 :material-menu: → **설정** → **Brave Shields 및 프라이버시**에서 확인할 수 있습니다. +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + 필요에 따라 사이트별로 보호 옵션을 낮출 수 있으나, 기본적으로 다음과 같이 설정할 것을 권장드립니다: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. 이 기능을 사용하지 말고 기본 필터 목록을 유지할 것을 권장드립니다. 추가적인 목록을 사용하면 다른 Brave 사용자에 비해 더 눈에 띄게 되며, 만약 Brave에 취약점이 존재하고 여러분이 사용하는 규칙 목록에 악성 규칙이 포함될 경우 공격 표면을 증가시킬 수도 있습니다. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. 이 기능을 사용하지 말고 기본 필터 목록을 유지할 것을 권장드립니다. 추가적인 목록을 사용하면 다른 Brave 사용자에 비해 더 눈에 띄게 되며, 만약 Brave에 취약점이 존재하고 여러분이 사용하는 규칙 목록에 악성 규칙이 포함될 경우 공격 표면을 증가시킬 수도 있습니다. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. 이 기능을 사용하지 말고 기본 필터 목록을 유지할 것을 권장드립니다. 추가적인 목록을 사용하면 다른 Brave 사용자에 비해 더 눈에 띄게 되며, 만약 Brave에 취약점이 존재하고 여러분이 사용하는 규칙 목록에 악성 규칙이 포함될 경우 공격 표면을 증가시킬 수도 있습니다. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] **종료 시 데이터 지우기** 활성화 -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] 모든 소셜 미디어 항목 비활성화 #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. IPFS(InterPlanetary File System)는 분산 파일 시스템에서 데이터를 저장하고 공유하기 위한 탈중앙화 P2P 네트워크입니다. 해당 기능을 사용하지 않는다면 비활성화하세요. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/ko/office-suites.md b/i18n/ko/office-suites.md index f700411d..27bba010 100644 --- a/i18n/ko/office-suites.md +++ b/i18n/ko/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/ko/os/android-overview.md b/i18n/ko/os/android-overview.md index 798259e8..712b5d51 100644 --- a/i18n/ko/os/android-overview.md +++ b/i18n/ko/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### 사용자 프로필 -여러 사용자 프로필은 Android에서 격리 환경을 가장 간단하게 구축할 수 있는 방법으로, **설정** → **시스템** → **여러 사용자**에서 확인할 수 있습니다. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -사용자 프로필 기능을 이용하면 전화 걸기, SMS 사용, 앱 설치 등의 행위를 특정 프로필에서만 제한적으로 수행할 수 있습니다. 각 프로필은 고유한 암호화 키를 사용하여 암호화되며 다른 프로필의 데이터에 접근할 수 없습니다. 기기 소유자라 할지라도 비밀번호를 모르면 다른 프로필의 데이터를 볼 수 없습니다. '여러 사용자 프로필'은 여타 방법보다 더 안전한 격리 방법입니다. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. 각 프로필은 고유한 암호화 키를 사용하여 암호화되며 다른 프로필의 데이터에 접근할 수 없습니다. 기기 소유자라 할지라도 비밀번호를 모르면 다른 프로필의 데이터를 볼 수 없습니다. '여러 사용자 프로필'은 여타 방법보다 더 안전한 격리 방법입니다. ### 직장 프로필 -[직장 프로필](https://support.google.com/work/android/answer/6191949)은 개별 앱을 격리하는 방식 중 하나로, 경우에 따라서 별도 사용자 프로필을 사용하는 것보다 편리합니다. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. 직장 프로필은 기기 컨트롤러에 따라 작동 방식이 달라집니다. *File Shuttle*, *연락처 검색 차단*을 비롯한 모든 격리 기능은 컨트롤러에서 구현됩니다. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -직장 프로필은 보조 사용자 프로필에 비해 보안성은 떨어집니다. 하지만 개인 프로필과 직장 프로필에서 동시에 앱을 실행할 수 있다는 편리함이 존재합니다. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN 킬 스위치 diff --git a/i18n/ko/pastebins.md b/i18n/ko/pastebins.md index 7c2626fe..dd0bcf84 100644 --- a/i18n/ko/pastebins.md +++ b/i18n/ko/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/ko/real-time-communication.md b/i18n/ko/real-time-communication.md index 9fea38ff..f2c18cae 100644 --- a/i18n/ko/real-time-communication.md +++ b/i18n/ko/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b 프로필 사진, 메시지 반응, 닉네임은 암호화가 적용되지 않습니다. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). 현재 그룹 통화는 인증 과정을 거치지 [않습니다](https://github.com/vector-im/element-web/issues/13074). 즉, 룸 참가자가 아닌 사람도 통화에 난입하는 것이 가능합니다. 사적인 모임에서는 해당 기능을 사용하지 않는 것이 좋습니다. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/ko/router.md b/i18n/ko/router.md index 08580428..e61a0801 100644 --- a/i18n/ko/router.md +++ b/i18n/ko/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -본 내용은 공유기(라우터), Wi-Fi 액세스 포인트 장치 등에서 대체하여 사용할 수 있는 운영 체제 목록입니다. +Protects against the following threat(s): + +- [:material-account-cash: 감시 자본주의(Surveillance Capitalism)](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: 수동적 공격(Passive Attacks)](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/ko/search-engines.md b/i18n/ko/search-engines.md index 6567363a..b6289e32 100644 --- a/i18n/ko/search-engines.md +++ b/i18n/ko/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: 감시 자본주의(Surveillance Capitalism)](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## 권장 제공 업체 diff --git a/i18n/ko/tools.md b/i18n/ko/tools.md index 0bdeb519..d576f045 100644 --- a/i18n/ko/tools.md +++ b/i18n/ko/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/ku-IQ/about.md b/i18n/ku-IQ/about.md index 043f602f..9bd52282 100644 --- a/i18n/ku-IQ/about.md +++ b/i18n/ku-IQ/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/ku-IQ/android/general-apps.md b/i18n/ku-IQ/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/ku-IQ/android/general-apps.md +++ b/i18n/ku-IQ/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/ku-IQ/browser-extensions.md b/i18n/ku-IQ/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/ku-IQ/browser-extensions.md +++ b/i18n/ku-IQ/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/ku-IQ/cloud.md b/i18n/ku-IQ/cloud.md index f4c81aad..21677604 100644 --- a/i18n/ku-IQ/cloud.md +++ b/i18n/ku-IQ/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/ku-IQ/data-redaction.md b/i18n/ku-IQ/data-redaction.md index df662125..3460cd6e 100644 --- a/i18n/ku-IQ/data-redaction.md +++ b/i18n/ku-IQ/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/ku-IQ/desktop-browsers.md b/i18n/ku-IQ/desktop-browsers.md index b74767bc..f63165b7 100644 --- a/i18n/ku-IQ/desktop-browsers.md +++ b/i18n/ku-IQ/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources - ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/ku-IQ/desktop.md b/i18n/ku-IQ/desktop.md index 13e2c2a0..b9e9874a 100644 --- a/i18n/ku-IQ/desktop.md +++ b/i18n/ku-IQ/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/ku-IQ/encryption.md b/i18n/ku-IQ/encryption.md index ac26bb6f..ee80271b 100644 --- a/i18n/ku-IQ/encryption.md +++ b/i18n/ku-IQ/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/ku-IQ/file-sharing.md b/i18n/ku-IQ/file-sharing.md index a59bbf59..839a7419 100644 --- a/i18n/ku-IQ/file-sharing.md +++ b/i18n/ku-IQ/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/ku-IQ/financial-services.md b/i18n/ku-IQ/financial-services.md index bd24c50a..4af77052 100644 --- a/i18n/ku-IQ/financial-services.md +++ b/i18n/ku-IQ/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/ku-IQ/frontends.md b/i18n/ku-IQ/frontends.md index c03c1138..9e83fe5e 100644 --- a/i18n/ku-IQ/frontends.md +++ b/i18n/ku-IQ/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/ku-IQ/language-tools.md b/i18n/ku-IQ/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/ku-IQ/language-tools.md +++ b/i18n/ku-IQ/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/ku-IQ/mobile-browsers.md b/i18n/ku-IQ/mobile-browsers.md index 0ba1400a..739eceed 100644 --- a/i18n/ku-IQ/mobile-browsers.md +++ b/i18n/ku-IQ/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/ku-IQ/office-suites.md b/i18n/ku-IQ/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/ku-IQ/office-suites.md +++ b/i18n/ku-IQ/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/ku-IQ/os/android-overview.md b/i18n/ku-IQ/os/android-overview.md index 6ab0125f..152e4926 100644 --- a/i18n/ku-IQ/os/android-overview.md +++ b/i18n/ku-IQ/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/ku-IQ/pastebins.md b/i18n/ku-IQ/pastebins.md index 66d41268..7ce4f4b3 100644 --- a/i18n/ku-IQ/pastebins.md +++ b/i18n/ku-IQ/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/ku-IQ/real-time-communication.md b/i18n/ku-IQ/real-time-communication.md index a5e505d8..54c745ae 100644 --- a/i18n/ku-IQ/real-time-communication.md +++ b/i18n/ku-IQ/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/ku-IQ/router.md b/i18n/ku-IQ/router.md index a80c7301..3e8eb49d 100644 --- a/i18n/ku-IQ/router.md +++ b/i18n/ku-IQ/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/ku-IQ/search-engines.md b/i18n/ku-IQ/search-engines.md index e536dbb5..71caf46e 100644 --- a/i18n/ku-IQ/search-engines.md +++ b/i18n/ku-IQ/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## دابینکەرانی پێشنیارکراو diff --git a/i18n/ku-IQ/tools.md b/i18n/ku-IQ/tools.md index 375ec59d..57577e53 100644 --- a/i18n/ku-IQ/tools.md +++ b/i18n/ku-IQ/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/nl/about.md b/i18n/nl/about.md index c9e7131b..b4c3cead 100644 --- a/i18n/nl/about.md +++ b/i18n/nl/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/nl/android/general-apps.md b/i18n/nl/android/general-apps.md index b42b774a..f7e1b3fa 100644 --- a/i18n/nl/android/general-apps.md +++ b/i18n/nl/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/nl/browser-extensions.md b/i18n/nl/browser-extensions.md index 5eb52819..303cb50b 100644 --- a/i18n/nl/browser-extensions.md +++ b/i18n/nl/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/nl/cloud.md b/i18n/nl/cloud.md index a71630f5..58e930fe 100644 --- a/i18n/nl/cloud.md +++ b/i18n/nl/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/nl/data-redaction.md b/i18n/nl/data-redaction.md index a4c25dc2..26aaa4b4 100644 --- a/i18n/nl/data-redaction.md +++ b/i18n/nl/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Publiekelijke bekendheid](basics/common-threats.md#limiting-public-information ""){.pg-green} + Wanneer je bestanden deelt, is het belangrijk om de bijbehorende metadata te verwijderen. Afbeeldingsbestanden bevatten vaak [Exif](https://en.wikipedia.org/wiki/Exif) data. Foto's bevatten soms zelfs GPS-coördinaten in de metadata van het bestand. ## Desktop diff --git a/i18n/nl/desktop-browsers.md b/i18n/nl/desktop-browsers.md index 4b0a59b1..342f7b13 100644 --- a/i18n/nl/desktop-browsers.md +++ b/i18n/nl/desktop-browsers.md @@ -172,7 +172,7 @@ Als je op bepaalde sites aangemeld wilt blijven, kunt je uitzonderingen toestaan Dit beschermt je tegen blijvende cookies, maar niet tegen cookies die tijdens een bepaalde surfsessie worden aangemaakt. Wanneer dit is ingeschakeld, wordt het mogelijk om jouw browsercookies gemakkelijk te wissen door Firefox gewoon opnieuw op te starten. Je kunt per site uitzonderingen instellen, als je ingelogd wilt blijven op een bepaalde site die je vaak bezoekt. -##### Telemetrie +##### Telemetry - [ ] Uncheck **Firefox toestaan technische en interactiegegevens naar Mozilla**te sturen - [ ] Uncheck **Firefox toestaan om studies te installeren en uit te voeren**uit @@ -262,7 +262,7 @@ Brave voegt een "[referral code](https://github.com/brave/brave-browser/wiki/Bra Deze opties zijn te vinden in :material-menu: → **Instellingen**. -#### Schilden +#### Shields Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. @@ -288,8 +288,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -297,7 +297,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -332,7 +332,6 @@ De Web3-functies van Brave kunnen de vingerafdruk van jouw browser en het aanval - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -358,8 +357,6 @@ De Web3-functies van Brave kunnen de vingerafdruk van jouw browser en het aanval **Brave Wallet** werkt lokaal op jouw computer, maar ondersteunt geen private cryptocurrencies, dus we raden het gebruik van deze functie ook af. -## Aanvullende middelen - ## Criteria **Wij zijn niet verbonden aan de projecten die wij aanbevelen.** Naast [onze standaardcriteria](about/criteria.md)hebben wij een duidelijke reeks eisen ontwikkeld om objectieve aanbevelingen te kunnen doen. Wij stellen voor dat je jezelf vertrouwd maakt met deze lijst voordat je een project kiest, en jouw eigen onderzoek uitvoert om er zeker van te zijn dat je de juiste keuze maakt. diff --git a/i18n/nl/desktop.md b/i18n/nl/desktop.md index d5ff3fe7..3df0a52f 100644 --- a/i18n/nl/desktop.md +++ b/i18n/nl/desktop.md @@ -5,6 +5,10 @@ description: Linux-distributies worden algemeen aanbevolen voor privacybeschermi cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance kapitalisme](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux-distributies worden algemeen aanbevolen voor privacybescherming en softwarevrijheid. Als je nog geen Linux gebruikt, zijn hieronder enkele distributies die we aanraden om uit te proberen, evenals enkele algemene tips om je privacy en veiligheid te verbeteren die op veel Linux-distributies van toepassing zijn. - [Algemeen Linux-overzicht :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux heeft een doorlopende uitgavecyclus. Er is geen vast releaseschema en Omdat het een doe-het-zelf distributie is, wordt van je verwacht [dat je jouw systeem zelf opzet en onderhoudt](#arch-based-distributions). Arch heeft een [officiële installer](https://wiki.archlinux.org/title/Archinstall) om het installatieproces wat gemakkelijker te maken. -Een groot deel van [Arch Linux's pakketten](https://reproducible.archlinux.org) zijn [reproduceerbaar](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Op anonimiteit gerichte distributies @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. Het is gefocust op privacy, veiligheid en anonimiteit op het internet te bieden. Whonix wordt het best gebruikt in combinatie met [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix wordt het best gebruikt in combinatie met [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is een live besturingssysteem gebaseerd op Debian dat alle communicatie via Tor laat lopen. Hij kan op bijna elke computer opstarten vanaf een DVD, USB-stick of SD-kaart. +**Tails** is een live besturingssysteem gebaseerd op Debian dat alle communicatie via Tor laat lopen. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Op veiligheid gerichte distributies +Protects against the following threat(s): + +- [:material-bug-outline: Passieve aanvallen](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/nl/encryption.md b/i18n/nl/encryption.md index faaaef4e..4231e47f 100644 --- a/i18n/nl/encryption.md +++ b/i18n/nl/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Schijf) Protects against the following threat(s): diff --git a/i18n/nl/file-sharing.md b/i18n/nl/file-sharing.md index 1bc3ba0f..1531034a 100644 --- a/i18n/nl/file-sharing.md +++ b/i18n/nl/file-sharing.md @@ -143,7 +143,6 @@ Wij raden het gebruik van de [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/nl/financial-services.md b/i18n/nl/financial-services.md index 86f302ad..ac497555 100644 --- a/i18n/nl/financial-services.md +++ b/i18n/nl/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance kapitalisme](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Online betalen is een van de grootste uitdagingen voor privacy. Deze diensten kunnen je helpen jouw privacy te beschermen tegen handelaren en andere trackers, op voorwaarde dat je goed weet hoe je privébetalingen doeltreffend kunt verrichten. Wij raden je sterk aan eerst ons overzichtsartikel over betalingen te lezen voordat je aankopen doet: [Privébetalingen maken :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Maskerende betalingsdiensten +Protects against the following threat(s): + +- [:material-account-search: Publiekelijke bekendheid](basics/common-threats.md#limiting-public-information ""){.pg-green} + Er zijn een aantal diensten die "virtuele debetkaarten" aanbieden die je bij online handelaren kunt gebruiken zonder in de meeste gevallen jouw werkelijke bank- of factureringsgegevens bekend te maken. Het is belangrijk op te merken dat deze financiële diensten **niet** anoniem zijn en onderworpen zijn aan "Know Your Customer" (KYC) wetten en jouw ID of andere identificerende informatie kunnen vereisen. Deze diensten zijn vooral nuttig om je te beschermen tegen inbreuken op gegevens van handelaars, minder gesofisticeerde tracking of aankoopcorrelatie door marketingbureaus, en online gegevensdiefstal; en **niet** om volledig anoniem een aankoop te doen.
@@ -67,6 +75,10 @@ De virtuele kaarten van MySudo zijn momenteel alleen beschikbaar via hun iOS-app ## Marktplaatsen voor cadeaubonnen +Protects against the following threat(s): + +- [:material-eye-outline: Massabewaking](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + Met deze diensten kunt je online cadeaubonnen kopen voor verschillende handelaren met [cryptocurrency](cryptocurrency.md). Sommige van deze services bieden opties voor ID-verificatie voor hogere limieten, maar ze staan ook accounts toe met alleen een e-mailadres. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ Met deze diensten kunt je online cadeaubonnen kopen voor verschillende handelare
- ### Criteria **Wij zijn niet verbonden aan de projecten die wij aanbevelen.** Naast [onze standaardcriteria](about/criteria.md)hebben wij een duidelijke reeks eisen ontwikkeld om objectieve aanbevelingen te kunnen doen. Wij stellen voor dat je jezelf vertrouwd maakt met deze lijst voordat je een project kiest, en jouw eigen onderzoek uitvoert om er zeker van te zijn dat je de juiste keuze maakt. diff --git a/i18n/nl/frontends.md b/i18n/nl/frontends.md index 7dd56e74..6d618496 100644 --- a/i18n/nl/frontends.md +++ b/i18n/nl/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Soms proberen diensten je te dwingen zich aan te melden voor een account door de toegang tot inhoud te blokkeren met vervelende popups. Ze kunnen ook breken zonder JavaScript. Met deze frontends kunt je deze beperkingen omzeilen. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance kapitalisme](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Soms proberen diensten je te dwingen zich aan te melden voor een account door de toegang tot inhoud te blokkeren met vervelende popups. Ze kunnen ook breken zonder JavaScript. These frontends can allow you to circumvent these restrictions. Bij zelf-hosting is het belangrijk dat er ook andere mensen gebruik maken van jouw instantie, zodat je op kunt gaan in de menigte. Je moet voorzichtig zijn met waar en hoe je host, omdat het gebruik van andere mensen zal worden gekoppeld aan jouw hosting. -Als je een instantie gebruikt die door iemand anders wordt beheerd, moet je het privacybeleid van die specifieke instantie lezen. Ze kunnen door hun eigenaren worden gewijzigd en kunnen daarom niet in overeenstemming zijn met het standaardbeleid. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). Ze kunnen door hun eigenaren worden gewijzigd en kunnen daarom niet in overeenstemming zijn met het standaardbeleid. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ Als je een instantie gebruikt die door iemand anders wordt beheerd, moet je het ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,12 +56,12 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentatie} -[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Broncode" } +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is een gratis en open-source desktop applicatie voor [YouTube](https://youtube.com). Bij gebruik van FreeTube worden je abonnementenlijst en afspeellijsten lokaal op je toestel opgeslagen. - -Standaard blokkeert FreeTube alle YouTube-advertenties. Bovendien integreert FreeTube optioneel met [SponsorBlock](https://sponsor.ajay.app) om u te helpen gesponsorde videosegmenten over te slaan. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -Yattee blokkeert standaard alle YouTube-advertenties. Bovendien integreert Yattee optioneel met [SponsorBlock](https://sponsor.ajay.app) om u te helpen gesponsorde videosegmenten over te slaan. - -### LibreTube (Android) - -
- -![LibreTube-logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is een gratis en open-source Android applicatie voor [YouTube](https://youtube.com) die gebruik maakt van de [Piped](#piped) API. - -Met LibreTube kunt u uw abonnementenlijst en afspeellijsten lokaal op uw Android-toestel opslaan, of in een account op uw Piped-instantie naar keuze, waardoor u er ook op andere toestellen naadloos toegang toe hebt. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -LibreTube blokkeert standaard alle YouTube-advertenties. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. U kunt de soorten segmenten die SponsorBlock zal overslaan volledig configureren, of volledig uitschakelen. Er is ook een knop op de videospeler zelf om deze desgewenst voor een specifieke video uit te schakelen. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Uw abonnementenlijst en afspeellijsten worden lokaal op uw Android toestel opgeslagen. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -Wanneer je NewPipe gebruikt, is jouw IP-adres zichtbaar voor de gebruikte videoproviders. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ Wanneer je NewPipe gebruikt, is jouw IP-adres zichtbaar voor de gebruikte videop **Invidious** is een gratis en open-source frontend voor [YouTube](https://youtube.com) dat ook zelf te hosten is. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped vereist JavaScript om te kunnen functioneren en er zijn een aantal openbare instanties. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is een gratis en open-source desktop applicatie voor [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +Bij gebruik van FreeTube worden je abonnementenlijst en afspeellijsten lokaal op je toestel opgeslagen. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +Standaard blokkeert FreeTube alle YouTube-advertenties. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +Yattee blokkeert standaard alle YouTube-advertenties. Bovendien integreert Yattee optioneel met [SponsorBlock](https://sponsor.ajay.app) om u te helpen gesponsorde videosegmenten over te slaan. + +### LibreTube (Android) + +
+ +![LibreTube-logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is een gratis en open-source Android applicatie voor [YouTube](https://youtube.com) die gebruik maakt van de [Piped](#piped) API. + +Uw abonnementenlijst en afspeellijsten worden lokaal op uw Android toestel opgeslagen. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +LibreTube blokkeert standaard alle YouTube-advertenties. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. U kunt de soorten segmenten die SponsorBlock zal overslaan volledig configureren, of volledig uitschakelen. Er is ook een knop op de videospeler zelf om deze desgewenst voor een specifieke video uit te schakelen. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Uw abonnementenlijst en afspeellijsten worden lokaal op uw Android toestel opgeslagen. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +Wanneer je NewPipe gebruikt, is jouw IP-adres zichtbaar voor de gebruikte videoproviders. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Wij zijn niet verbonden aan de projecten die wij aanbevelen.** Naast [onze standaardcriteria](about/criteria.md)hebben wij een duidelijke reeks eisen ontwikkeld om objectieve aanbevelingen te kunnen doen. Wij stellen voor dat je jezelf vertrouwd maakt met deze lijst voordat je een project kiest, en jouw eigen onderzoek uitvoert om er zeker van te zijn dat je de juiste keuze maakt. -Aanbevolen frontends... - -- Moet open-source software zijn. -- Moet zelf te hosten zijn. -- Moet alle basisfuncties van de website beschikbaar stellen aan anonieme gebruikers. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Aanbevolen frontends... + +- Moet open-source software zijn. +- Moet zelf te hosten zijn. +- Moet alle basisfuncties van de website beschikbaar stellen aan anonieme gebruikers. diff --git a/i18n/nl/language-tools.md b/i18n/nl/language-tools.md index 4b1f2c90..efc39d34 100644 --- a/i18n/nl/language-tools.md +++ b/i18n/nl/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/nl/mobile-browsers.md b/i18n/nl/mobile-browsers.md index 532c9cfc..8c749d28 100644 --- a/i18n/nl/mobile-browsers.md +++ b/i18n/nl/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is gebouwd op het Chromium webbrowser project, dus het zou vertrouwd moete Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is gebouwd op het Chromium webbrowser project, dus het zou vertrouwd moete Tor Browser is de enige manier om echt anoniem op het internet te surfen. Wanneer je Brave gebruikt, raden we je aan de volgende instellingen te wijzigen om jouw privacy tegen bepaalde partijen te beschermen, maar alle browsers behalve de [Tor Browser](tor.md#tor-browser) zijn in sommige opzichten traceerbaar door *iemand*. -Deze opties zijn te vinden in :material-menu: → **Instellingen** → **Dappere schilden & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + De opties van Shields kunnen naar behoefte per site worden gedowngrade, maar standaard raden wij aan de volgende opties in te stellen: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. Wij raden het gebruik van deze functie af; houd in plaats daarvan de standaardfilterlijsten aan. Het gebruik van extra lijsten zorgt ervoor dat u zich onderscheidt van andere Brave gebruikers en kan ook het aanvalsoppervlak vergroten als er een exploit in Brave is en een kwaadaardige regel wordt toegevoegd aan één van de lijsten die je gebruikt. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. Wij raden het gebruik van deze functie af; houd in plaats daarvan de standaardfilterlijsten aan. Het gebruik van extra lijsten zorgt ervoor dat u zich onderscheidt van andere Brave gebruikers en kan ook het aanvalsoppervlak vergroten als er een exploit in Brave is en een kwaadaardige regel wordt toegevoegd aan één van de lijsten die je gebruikt. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. Wij raden het gebruik van deze functie af; houd in plaats daarvan de standaardfilterlijsten aan. Het gebruik van extra lijsten zorgt ervoor dat u zich onderscheidt van andere Brave gebruikers en kan ook het aanvalsoppervlak vergroten als er een exploit in Brave is en een kwaadaardige regel wordt toegevoegd aan één van de lijsten die je gebruikt. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Selecteer **Gegevens wissen bij het sluiten van de browser** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck alle sociale media componenten uit #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is een gedecentraliseerd, peer-to-peer netwerk voor het opslaan en delen van gegevens in een gedistribueerd bestandssysteem. Tenzij je de functie gebruikt, schakel hem uit. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/nl/office-suites.md b/i18n/nl/office-suites.md index b368ce6f..84094eb9 100644 --- a/i18n/nl/office-suites.md +++ b/i18n/nl/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/nl/os/android-overview.md b/i18n/nl/os/android-overview.md index 9ec180c8..5e916fd8 100644 --- a/i18n/nl/os/android-overview.md +++ b/i18n/nl/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### Gebruikers Profielen -Meervoudige gebruikersprofielen zijn te vinden in **Instellingen** → **Systeem** → **Meervoudige gebruikers** en zijn de eenvoudigste manier om te isoleren in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -Met gebruikersprofielen kun je beperkingen opleggen aan een specifiek profiel, zoals: bellen, sms'en of apps installeren op het toestel. Elk profiel wordt versleuteld met zijn eigen versleutelingscode en heeft geen toegang tot de gegevens van andere profielen. Zelfs de eigenaar van het apparaat kan de gegevens van andere profielen niet bekijken zonder hun wachtwoord te kennen. Meervoudige gebruikersprofielen zijn een veiligere methode van isolatie. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Elk profiel wordt versleuteld met zijn eigen versleutelingscode en heeft geen toegang tot de gegevens van andere profielen. Zelfs de eigenaar van het apparaat kan de gegevens van andere profielen niet bekijken zonder hun wachtwoord te kennen. Meervoudige gebruikersprofielen zijn een veiligere methode van isolatie. ### Werkprofiel -[Werkprofielen](https://support.google.com/work/android/answer/6191949) zijn een andere manier om afzonderlijke apps te isoleren en kunnen handiger zijn dan afzonderlijke gebruikersprofielen. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. Het werkprofiel is afhankelijk van een apparaatcontroller om te kunnen functioneren. Functies zoals *File Shuttle* en *contact zoeken blokkeren* of enige vorm van isolatiefuncties moeten door de controller worden geïmplementeerd. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -Deze methode is over het algemeen minder veilig dan een secundair gebruikersprofiel; het biedt je echter wel het gemak dat je tegelijkertijd apps kunt uitvoeren in zowel het werk- als het persoonlijke profiel. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/nl/pastebins.md b/i18n/nl/pastebins.md index 741c2462..0a3e8894 100644 --- a/i18n/nl/pastebins.md +++ b/i18n/nl/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/nl/real-time-communication.md b/i18n/nl/real-time-communication.md index d675a07b..4bfb031f 100644 --- a/i18n/nl/real-time-communication.md +++ b/i18n/nl/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profielfoto's, reacties en bijnamen zijn niet versleuteld. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Groepsgesprekken hebben [momenteel geen authenticatie](https://github.com/vector-im/element-web/issues/13074), wat betekent dat ook deelnemers van buiten de zaal aan de gesprekken kunnen deelnemen. Wij raden je aan deze functie niet te gebruiken voor privévergaderingen. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/nl/router.md b/i18n/nl/router.md index 2b20c6ef..2c7c542e 100644 --- a/i18n/nl/router.md +++ b/i18n/nl/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Hieronder staan een paar alternatieve besturingssystemen, die gebruikt kunnen worden op routers, Wi-Fi access points, enz. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance kapitalisme](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passieve aanvallen](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/nl/search-engines.md b/i18n/nl/search-engines.md index d188ddaa..99b071bb 100644 --- a/i18n/nl/search-engines.md +++ b/i18n/nl/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance kapitalisme](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Aanbevolen Providers diff --git a/i18n/nl/tools.md b/i18n/nl/tools.md index 3ffba922..d6b10e23 100644 --- a/i18n/nl/tools.md +++ b/i18n/nl/tools.md @@ -31,15 +31,6 @@ Voor meer details over elk project, waarom ze werden gekozen, en extra tips of t -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/pl/about.md b/i18n/pl/about.md index 043f602f..9bd52282 100644 --- a/i18n/pl/about.md +++ b/i18n/pl/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/pl/android/general-apps.md b/i18n/pl/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/pl/android/general-apps.md +++ b/i18n/pl/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/pl/browser-extensions.md b/i18n/pl/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/pl/browser-extensions.md +++ b/i18n/pl/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/pl/cloud.md b/i18n/pl/cloud.md index f4c81aad..21677604 100644 --- a/i18n/pl/cloud.md +++ b/i18n/pl/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/pl/data-redaction.md b/i18n/pl/data-redaction.md index df662125..3460cd6e 100644 --- a/i18n/pl/data-redaction.md +++ b/i18n/pl/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/pl/desktop-browsers.md b/i18n/pl/desktop-browsers.md index 072eaed0..8554f88d 100644 --- a/i18n/pl/desktop-browsers.md +++ b/i18n/pl/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Dodatkowe zasoby - ## Kryteria **Pamiętaj, że nie jesteśmy związani z żadnym z zalecanych projektów.** W dodatku do [naszych standardowych kryteriów](about/criteria.md), opracowaliśmy zestaw wymagań, które umożliwiają nam podejmowanie obiektywnych decyzji. Zalecamy zapoznanie się z tą listą przed zdecydowaniem o wyborze projektu oraz przeprowadzenie własnego rozeznania, aby upewnić się, że będzie dobrym wyborem dla Ciebie. diff --git a/i18n/pl/desktop.md b/i18n/pl/desktop.md index 0ceb203d..e2791fba 100644 --- a/i18n/pl/desktop.md +++ b/i18n/pl/desktop.md @@ -5,6 +5,10 @@ description: Dystrybucje systemu Linux są powszechnie polecane, jeśli chodzi o cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Dystrybucje systemu Linux są powszechnie polecane, jeśli chodzi o ochronę prywatności oraz wolne oprogramowanie. Jeśli nie korzystasz jeszcze z systemu Linux, poniżej znajdziesz kilka dystrybucji, które polecamy wypróbować oraz kilka ogólnych porad dotyczących lepszej prywatności i bezpieczeństwa, które mają zastosowanie dla wielu dystrybucji systemu Linux. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/pl/encryption.md b/i18n/pl/encryption.md index 1e88b7a6..d6691143 100644 --- a/i18n/pl/encryption.md +++ b/i18n/pl/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/pl/file-sharing.md b/i18n/pl/file-sharing.md index 8f3685f1..b053aadd 100644 --- a/i18n/pl/file-sharing.md +++ b/i18n/pl/file-sharing.md @@ -147,7 +147,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/pl/financial-services.md b/i18n/pl/financial-services.md index bd24c50a..4af77052 100644 --- a/i18n/pl/financial-services.md +++ b/i18n/pl/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/pl/frontends.md b/i18n/pl/frontends.md index 9fd2f3c3..f127ea85 100644 --- a/i18n/pl/frontends.md +++ b/i18n/pl/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/pl/language-tools.md b/i18n/pl/language-tools.md index 8deab7e6..b1556ed0 100644 --- a/i18n/pl/language-tools.md +++ b/i18n/pl/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/pl/mobile-browsers.md b/i18n/pl/mobile-browsers.md index 0085cd44..14f6c1ee 100644 --- a/i18n/pl/mobile-browsers.md +++ b/i18n/pl/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/pl/office-suites.md b/i18n/pl/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/pl/office-suites.md +++ b/i18n/pl/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/pl/os/android-overview.md b/i18n/pl/os/android-overview.md index 3456effc..ec50c680 100644 --- a/i18n/pl/os/android-overview.md +++ b/i18n/pl/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/pl/pastebins.md b/i18n/pl/pastebins.md index 8694d0a1..58701ad5 100644 --- a/i18n/pl/pastebins.md +++ b/i18n/pl/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/pl/real-time-communication.md b/i18n/pl/real-time-communication.md index a5e505d8..54c745ae 100644 --- a/i18n/pl/real-time-communication.md +++ b/i18n/pl/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/pl/router.md b/i18n/pl/router.md index 4ff5add5..7ed072e3 100644 --- a/i18n/pl/router.md +++ b/i18n/pl/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Poniżej wymieniono kilka alternatywnych systemów operacyjnych, które możesz zainstalować na swoim routerze, punkcie dostępowym Wi-Fi itp. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/pl/search-engines.md b/i18n/pl/search-engines.md index 26f1d9c1..fe66ccdc 100644 --- a/i18n/pl/search-engines.md +++ b/i18n/pl/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Rekomendowani dostawcy diff --git a/i18n/pl/tools.md b/i18n/pl/tools.md index 56f5a8de..47a23eb1 100644 --- a/i18n/pl/tools.md +++ b/i18n/pl/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/pt-BR/about.md b/i18n/pt-BR/about.md index 043f602f..9bd52282 100644 --- a/i18n/pt-BR/about.md +++ b/i18n/pt-BR/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/pt-BR/android/general-apps.md b/i18n/pt-BR/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/pt-BR/android/general-apps.md +++ b/i18n/pt-BR/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/pt-BR/browser-extensions.md b/i18n/pt-BR/browser-extensions.md index 8fdef6fa..b41bf2da 100644 --- a/i18n/pt-BR/browser-extensions.md +++ b/i18n/pt-BR/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/pt-BR/cloud.md b/i18n/pt-BR/cloud.md index 69bcd11c..abd44929 100644 --- a/i18n/pt-BR/cloud.md +++ b/i18n/pt-BR/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/pt-BR/data-redaction.md b/i18n/pt-BR/data-redaction.md index 221be61b..b4c0c919 100644 --- a/i18n/pt-BR/data-redaction.md +++ b/i18n/pt-BR/data-redaction.md @@ -6,6 +6,10 @@ description: Use essas ferramentas para remover metadados como localização GPS cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + Ao compartilhar arquivos, é importante remover metadados associados. Os arquivos de imagem geralmente incluem dados [Exif](https://en.wikipedia.org/wiki/Exif). Às vezes, as fotos incluem até mesmo coordenadas de GPS nos metadados do arquivo. ## Computador diff --git a/i18n/pt-BR/desktop-browsers.md b/i18n/pt-BR/desktop-browsers.md index 41d43c9d..9c9979a4 100644 --- a/i18n/pt-BR/desktop-browsers.md +++ b/i18n/pt-BR/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ As funcionalidades Web3 do Brave podem potencialmente acrescentar à impressão - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ As funcionalidades Web3 do Brave podem potencialmente acrescentar à impressão A **Carteira Brave** opera localmente em seu computador, mas não suporta nenhuma criptomoeda privada, então nós desencorajamos o uso dessa ferramenta também. -## Recursos Adicionais - ## Critérios **Por favor, note que não somos parceiros de nenhum dos produtos que recomendamos.**Em adição aos[nossos critérios básicos](about/criteria.md), desenvolvemos um conjunto claro de requisitos para nos permitir fornecer recomendações objetivas. Recomendamos que você se familiarize com esta lista antes de escolher usar um produto, e que faça sua própria pesquisa para garantir que o produto escolhido é o ideal para você. diff --git a/i18n/pt-BR/desktop.md b/i18n/pt-BR/desktop.md index 6473d044..ad02d72f 100644 --- a/i18n/pt-BR/desktop.md +++ b/i18n/pt-BR/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Ataques Passivos](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/pt-BR/encryption.md b/i18n/pt-BR/encryption.md index e0cc95b6..cd85f6c0 100644 --- a/i18n/pt-BR/encryption.md +++ b/i18n/pt-BR/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/pt-BR/file-sharing.md b/i18n/pt-BR/file-sharing.md index 0529bd67..db8310cf 100644 --- a/i18n/pt-BR/file-sharing.md +++ b/i18n/pt-BR/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/pt-BR/financial-services.md b/i18n/pt-BR/financial-services.md index 68c81c6d..cdfc492b 100644 --- a/i18n/pt-BR/financial-services.md +++ b/i18n/pt-BR/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Serviços de Disfarce de Pagamento +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/pt-BR/frontends.md b/i18n/pt-BR/frontends.md index c03c1138..9e83fe5e 100644 --- a/i18n/pt-BR/frontends.md +++ b/i18n/pt-BR/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/pt-BR/language-tools.md b/i18n/pt-BR/language-tools.md index 77cc5c78..89d3a334 100644 --- a/i18n/pt-BR/language-tools.md +++ b/i18n/pt-BR/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/pt-BR/mobile-browsers.md b/i18n/pt-BR/mobile-browsers.md index 2877ad59..03502250 100644 --- a/i18n/pt-BR/mobile-browsers.md +++ b/i18n/pt-BR/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar O Navegador Tor é a única maneira de realmente navegar na Internet de forma anônima. Ao usar o Brave, recomendamos que você altere as seguintes configurações para proteger sua privacidade de determinadas partes, mas todos os navegadores, exceto o [Navegador Tor](tor.md#tor-browser), serão rastreáveis por *alguém* de uma forma ou de outra. -Essas opções podem ser encontradas em :material-menu: → **Configurações** → **Proteções do Brave & privacidade** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + As opções do Shields (Escudos) podem ser reduzidas de acordo com o site, conforme necessário, mas, por padrão, recomendamos configurar o seguinte: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. O IPFS (InterPlanetary File System) é uma rede descentralizada, ponto a ponto, para armazenar e compartilhar dados em um sistema de arquivos distribuído. A menos que você use o recurso, desative-o. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/pt-BR/office-suites.md b/i18n/pt-BR/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/pt-BR/office-suites.md +++ b/i18n/pt-BR/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/pt-BR/os/android-overview.md b/i18n/pt-BR/os/android-overview.md index 4941ab72..e893c08c 100644 --- a/i18n/pt-BR/os/android-overview.md +++ b/i18n/pt-BR/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### Perfis de Usuário -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Perfil de Trabalho -Os [Perfis de Trabalho](https://support.google.com/work/android/answer/6191949) são outra forma de isolar aplicações individuais e podem ser mais convenientes do que perfis de usuário separados. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/pt-BR/pastebins.md b/i18n/pt-BR/pastebins.md index 3df97cea..88324356 100644 --- a/i18n/pt-BR/pastebins.md +++ b/i18n/pt-BR/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/pt-BR/real-time-communication.md b/i18n/pt-BR/real-time-communication.md index a4252837..980ae064 100644 --- a/i18n/pt-BR/real-time-communication.md +++ b/i18n/pt-BR/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/pt-BR/router.md b/i18n/pt-BR/router.md index e47ad3f2..dd3d8126 100644 --- a/i18n/pt-BR/router.md +++ b/i18n/pt-BR/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Abaixo estão alguns sistemas operacionais alternativos, que podem ser usados em roteadores, pontos de acesso Wi-Fi, etc. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Ataques Passivos](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/pt-BR/search-engines.md b/i18n/pt-BR/search-engines.md index 1ad808ba..294651dc 100644 --- a/i18n/pt-BR/search-engines.md +++ b/i18n/pt-BR/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Provedores Recomendados diff --git a/i18n/pt-BR/tools.md b/i18n/pt-BR/tools.md index 1a445842..4bff18c5 100644 --- a/i18n/pt-BR/tools.md +++ b/i18n/pt-BR/tools.md @@ -31,15 +31,6 @@ Para mais detalhes sobre cada projeto, porque foram escolhidos, e dicas ou truqu -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/pt/about.md b/i18n/pt/about.md index 043f602f..9bd52282 100644 --- a/i18n/pt/about.md +++ b/i18n/pt/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/pt/android/general-apps.md b/i18n/pt/android/general-apps.md index 689e43d1..27a6e7b1 100644 --- a/i18n/pt/android/general-apps.md +++ b/i18n/pt/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/pt/browser-extensions.md b/i18n/pt/browser-extensions.md index 0220be03..2c896c3a 100644 --- a/i18n/pt/browser-extensions.md +++ b/i18n/pt/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/pt/cloud.md b/i18n/pt/cloud.md index 1f8bfd8e..d59d9692 100644 --- a/i18n/pt/cloud.md +++ b/i18n/pt/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/pt/data-redaction.md b/i18n/pt/data-redaction.md index 12185472..6289b2f5 100644 --- a/i18n/pt/data-redaction.md +++ b/i18n/pt/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Exposição pública](basics/common-threats.md#limiting-public-information ""){.pg-green} + Ao partilhar ficheiros, certifique-se de que remove os metadados associados. Os arquivos de imagem geralmente incluem [EXIF](https://en.wikipedia.org/wiki/Exif) dados. As fotos às vezes até incluem [GPS](https://en.wikipedia.org/wiki/Global_Positioning_System) coordenadas nos metadados do arquivo. ## Desktop diff --git a/i18n/pt/desktop-browsers.md b/i18n/pt/desktop-browsers.md index 13ca97df..222afdcb 100644 --- a/i18n/pt/desktop-browsers.md +++ b/i18n/pt/desktop-browsers.md @@ -269,7 +269,7 @@ Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave% Estas opções podem ser encontradas em :material-menu: → **Definições...**. -#### Proteções +#### Shields Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ As funcionalidades Web3 do Brave podem potencialmente aumentar a impressão digi - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -355,7 +354,7 @@ As funcionalidades Web3 do Brave podem potencialmente aumentar a impressão digi 1. Esta opção não está presente em todas as plataformas. -#### Sincronização do Brave +#### Brave Sync [Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. @@ -365,8 +364,6 @@ As funcionalidades Web3 do Brave podem potencialmente aumentar a impressão digi **A Brave Wallet** funciona localmente no seu computador, mas não suporta quaisquer criptomoedas privadas, pelo que desencorajamos a utilização desta funcionalidade também. -## Recursos Adicionais - ## Critérios **Note que não estamos associados a nenhum dos projetos que recomendamos.** Para além dos [nossos critérios padrão](about/criteria.md), temos um conjunto claro de requisitos que nos permitem fornecer recomendações objetivas. Sugerimos que se familiarize com esta lista antes de optar por um projeto e que desenvolva a sua própria investigação para garantir que se trata da escolha certa para si. diff --git a/i18n/pt/desktop.md b/i18n/pt/desktop.md index d1caefea..222e5427 100644 --- a/i18n/pt/desktop.md +++ b/i18n/pt/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Capitalismo de vigilância](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Sendo uma distribuição DIY, o usuário é [esperado para configurar e manter]( Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Distribuições Anónimas-Focusadas @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. O seu objectivo é proporcionar privacidade, segurança e anonimato na Internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh !(/assets/img/linux-desktop/tails.svg){ align=right } -**Tails** é um sistema operacional live baseado no Debian que roteia todas as comunicações através do Tor. Pode arrancar em quase qualquer computador a partir de um DVD, pen USB ou sdcard. +**Tails** é um sistema operacional live baseado no Debian que roteia todas as comunicações através do Tor. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Ataques passivos](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### SO Qubes
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/pt/encryption.md b/i18n/pt/encryption.md index e35d0c0a..c0902f88 100644 --- a/i18n/pt/encryption.md +++ b/i18n/pt/encryption.md @@ -88,6 +88,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### Picocrypt Protects against the following threat(s): diff --git a/i18n/pt/file-sharing.md b/i18n/pt/file-sharing.md index 7c905193..acdd4acb 100644 --- a/i18n/pt/file-sharing.md +++ b/i18n/pt/file-sharing.md @@ -145,7 +145,6 @@ OnionShare provides the option to connect via [Tor bridges](https://docs.onionsh
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/pt/financial-services.md b/i18n/pt/financial-services.md index 61a53ba2..c15641e9 100644 --- a/i18n/pt/financial-services.md +++ b/i18n/pt/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Capitalismo de vigilância](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Serviços de mascaramento de pagamentos +Protects against the following threat(s): + +- [:material-account-search: Exposição pública](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Vigilância em massa](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Framadate **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/pt/frontends.md b/i18n/pt/frontends.md index e3d98005..7a55f878 100644 --- a/i18n/pt/frontends.md +++ b/i18n/pt/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Por vezes, os serviços tentam forçá-lo a criar uma conta, bloqueando o acesso a conteúdos com popups irritantes. Também podem não funcionar como pretendido se o JavaScript não for ativado. Estes frontends existem para permitir contornar estas restrições. +Protects against the following threat(s): + +- [:material-account-cash: Capitalismo de vigilância](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Por vezes, os serviços tentam forçá-lo a criar uma conta, bloqueando o acesso a conteúdos com popups irritantes. Também podem não funcionar como pretendido se o JavaScript não for ativado. These frontends can allow you to circumvent these restrictions. Se optar por auto-hospedar estes frontends, é importante que tenha outras pessoas a utilizar também a sua instância, para que se possa fazer integração. Deve ter cuidado com o local e a forma como aloja, uma vez que a utilização por outras pessoas estará associada ao seu alojamento. -Quando estiver a utilizar uma instância gerida por outra pessoa, certifique-se de que lê a política de privacidade dessa instância específica. Podem ser modificados pelos seus proprietários e, por conseguinte, podem não refletir a política predefinida. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). Podem ser modificados pelos seus proprietários e, por conseguinte, podem não refletir a política predefinida. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ Quando estiver a utilizar uma instância gerida por outra pessoa, certifique-se ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,12 +56,12 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. -[:octicons-repo-16: Repositório](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Instâncias Públicas"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentação} -[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Código-fonte" } +[:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![Logótipo FreeTube](assets/img/frontends/freetube.svg){ align=right } - -O **FreeTube** é uma aplicação de ambiente de trabalho gratuita e de código aberto para [YouTube](https://youtube.com). Quando utiliza o FreeTube, a sua lista de subscrições e listas de reprodução são guardadas localmente no seu dispositivo. - -Por predefinição, o FreeTube bloqueia todos os anúncios do YouTube. Além disso, o FreeTube integra-se opcionalmente com [SponsorBlock](https://sponsor.ajay.app) para o ajudar a saltar segmentos de vídeo patrocinados. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -Por predefinição, o Yattee bloqueia todos os anúncios do YouTube. Além disso, o Yattee integra-se opcionalmente com [SponsorBlock](https://sponsor.ajay.app) para o ajudar a saltar segmentos de vídeo patrocinados. - -### LibreTube (Android) - -
- -![Logótipo LibreTube](assets/img/frontends/libretube.svg#only-light){ align=right } -![Logótipo LibreTube](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -O **LibreTube** é uma aplicação Android gratuita e de código aberto para [YouTube](https://youtube.com), que utiliza a API [Piped](#piped). - -O LibreTube permite-lhe armazenar a sua lista de subscrição e listas de reprodução localmente no seu dispositivo Android, ou numa conta na sua instância de eleição do Piped, o que lhe permite aceder-lhes sem problemas também noutros dispositivos. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -Por defeito, o LibreTube bloqueia todos os anúncios do YouTube. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. É possível configurar totalmente os tipos de segmentos que SponsorBlock irá ignorar ou desactivá-lo completamente. Existe também um botão no próprio leitor de vídeo para o desativar para um vídeo específico, se assim o desejar. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -A sua lista de subscrição e listas de reprodução são guardadas localmente no seu dispositivo Android. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -Ao utilizar o NewPipe, o seu endereço IP será visível para os fornecedores de vídeo utilizados. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ Ao utilizar o NewPipe, o seu endereço IP será visível para os fornecedores de O **Invidious** é um frontend gratuito e de código aberto para [YouTube](https://youtube.com), que também é auto-hospedável. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ O **Piped** é um frontend gratuito e de código aberto para [YouTube](https://y O Piped requer JavaScript para funcionar e existem várias instâncias públicas. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![Logótipo FreeTube](assets/img/frontends/freetube.svg){ align=right } + +O **FreeTube** é uma aplicação de ambiente de trabalho gratuita e de código aberto para [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +Quando utiliza o FreeTube, a sua lista de subscrições e listas de reprodução são guardadas localmente no seu dispositivo. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +Por predefinição, o FreeTube bloqueia todos os anúncios do YouTube. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +Por predefinição, o Yattee bloqueia todos os anúncios do YouTube. Além disso, o Yattee integra-se opcionalmente com [SponsorBlock](https://sponsor.ajay.app) para o ajudar a saltar segmentos de vídeo patrocinados. + +### LibreTube (Android) + +
+ +![Logótipo LibreTube](assets/img/frontends/libretube.svg#only-light){ align=right } +![Logótipo LibreTube](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +O **LibreTube** é uma aplicação Android gratuita e de código aberto para [YouTube](https://youtube.com), que utiliza a API [Piped](#piped). + +A sua lista de subscrição e listas de reprodução são guardadas localmente no seu dispositivo Android. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +Por defeito, o LibreTube bloqueia todos os anúncios do YouTube. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. É possível configurar totalmente os tipos de segmentos que SponsorBlock irá ignorar ou desactivá-lo completamente. Existe também um botão no próprio leitor de vídeo para o desativar para um vídeo específico, se assim o desejar. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +A sua lista de subscrição e listas de reprodução são guardadas localmente no seu dispositivo Android. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +Ao utilizar o NewPipe, o seu endereço IP será visível para os fornecedores de vídeo utilizados. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Critérios **Note que não estamos associados a nenhum dos projetos que recomendamos.** Para além dos [nossos critérios padrão](about/criteria.md), temos um conjunto claro de requisitos que nos permitem fornecer recomendações objetivas. Sugerimos que se familiarize com esta lista antes de optar por um projeto e que desenvolva a sua própria investigação para garantir que se trata da escolha certa para si. -Frontends recomendados... - -- O software deve ser de código aberto. -- Deve ser auto-hospedável. -- Deve fornecer todas as funcionalidades básicas do site disponíveis para utilizadores anónimos. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Frontends recomendados... + +- O software deve ser de código aberto. +- Deve ser auto-hospedável. +- Deve fornecer todas as funcionalidades básicas do site disponíveis para utilizadores anónimos. diff --git a/i18n/pt/language-tools.md b/i18n/pt/language-tools.md index af69b9b3..dc9b7097 100644 --- a/i18n/pt/language-tools.md +++ b/i18n/pt/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/pt/mobile-browsers.md b/i18n/pt/mobile-browsers.md index 97878712..734bb904 100644 --- a/i18n/pt/mobile-browsers.md +++ b/i18n/pt/mobile-browsers.md @@ -64,8 +64,8 @@ Inclui [características de privacidade](https://support.apple.com/guide/iphone/ Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Inclui [características de privacidade](https://support.apple.com/guide/iphone/ O Tor é a única forma de navegar verdadeiramente de forma anónima na Internet. Quando utilizar o Brave, recomendamos que altere as seguintes definições para proteger a sua privacidade de determinadas entidades terceiras. Contudo, todos os browsers, com a exceção do [Tor](tor.md#tor-browser) serão rastreáveis por *alguém* de uma forma ou de outra. -Estas opções podem ser encontradas em :material-menu: → **Definições** → **Proteção do Brave & privacidade** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + As opções de proteção podem ser revogadas por cada site, de acordo com as necessidades, mas por predefinição recomendamos as seguintes definições: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. Aconselhamos a não utilizar esta funcionalidade; em vez disso, mantenha as listas de filtros predefinidas. A utilização de listas extra fará com que se destaque dos outros utilizadores do Brave e pode também aumentar a superfície de ataque se houver uma vulnerabilidade no Brave e uma regra maliciosa for adicionada a uma das listas que utiliza. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. Aconselhamos a não utilizar esta funcionalidade; em vez disso, mantenha as listas de filtros predefinidas. A utilização de listas extra fará com que se destaque dos outros utilizadores do Brave e pode também aumentar a superfície de ataque se houver uma vulnerabilidade no Brave e uma regra maliciosa for adicionada a uma das listas que utiliza. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. Aconselhamos a não utilizar esta funcionalidade; em vez disso, mantenha as listas de filtros predefinidas. A utilização de listas extra fará com que se destaque dos outros utilizadores do Brave e pode também aumentar a superfície de ataque se houver uma vulnerabilidade no Brave e uma regra maliciosa for adicionada a uma das listas que utiliza. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Selecionar **Limpar dados ao sair** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Desmarcar todos os componentes das redes sociais #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. O InterPlanetary File System (IPFS) é uma rede descentralizada, peer-to-peer, para armazenar e partilhar dados num sistema de ficheiros distribuído. A menos que utilize a funcionalidade, desative-a. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/pt/office-suites.md b/i18n/pt/office-suites.md index 5657196c..846f8d9b 100644 --- a/i18n/pt/office-suites.md +++ b/i18n/pt/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/pt/os/android-overview.md b/i18n/pt/os/android-overview.md index 11341ad2..567a8779 100644 --- a/i18n/pt/os/android-overview.md +++ b/i18n/pt/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/pt/pastebins.md b/i18n/pt/pastebins.md index 1b4c35cf..fa143b97 100644 --- a/i18n/pt/pastebins.md +++ b/i18n/pt/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/pt/real-time-communication.md b/i18n/pt/real-time-communication.md index d0628851..3677a0a2 100644 --- a/i18n/pt/real-time-communication.md +++ b/i18n/pt/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b As imagens de perfil, as reações e os nicknames não são encriptados. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Atualmente, as chamadas de grupo [não têm autenticação](https://github.com/vector-im/element-web/issues/13074), o que significa que os participantes que não estão na sala também podem juntar-se às chamadas. Recomendamos que não utilize esta funcionalidade para reuniões privadas. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/pt/router.md b/i18n/pt/router.md index 68c7099d..2512f20b 100644 --- a/i18n/pt/router.md +++ b/i18n/pt/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Apresentamos alguns sistemas operativos alternativos, que podem ser usados em routers, access points Wi-Fi, etc. +Protects against the following threat(s): + +- [:material-account-cash: Capitalismo de vigilância](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Ataques passivos](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/pt/search-engines.md b/i18n/pt/search-engines.md index 88b94f14..00a300cd 100644 --- a/i18n/pt/search-engines.md +++ b/i18n/pt/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Capitalismo de vigilância](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Provedores recomendados diff --git a/i18n/pt/tools.md b/i18n/pt/tools.md index a0897fef..2b457e3e 100644 --- a/i18n/pt/tools.md +++ b/i18n/pt/tools.md @@ -31,15 +31,6 @@ Para obter mais detalhes sobre cada projeto, o motivo pelo qual foi escolhido e -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/ru/about.md b/i18n/ru/about.md index 043f602f..9bd52282 100644 --- a/i18n/ru/about.md +++ b/i18n/ru/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/ru/android/general-apps.md b/i18n/ru/android/general-apps.md index c550aa68..61c394c9 100644 --- a/i18n/ru/android/general-apps.md +++ b/i18n/ru/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Предупреждение

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/ru/browser-extensions.md b/i18n/ru/browser-extensions.md index be5c97ed..5cce0af1 100644 --- a/i18n/ru/browser-extensions.md +++ b/i18n/ru/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/ru/cloud.md b/i18n/ru/cloud.md index 3240234d..a70317c7 100644 --- a/i18n/ru/cloud.md +++ b/i18n/ru/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/ru/data-redaction.md b/i18n/ru/data-redaction.md index 22ef3b8d..190a2bdf 100644 --- a/i18n/ru/data-redaction.md +++ b/i18n/ru/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Публичная экспозиция](basics/common-threats.md#limiting-public-information ""){.pg-green} + Когда вы делитесь с кем-то файлами, то не забудьте удалить связанные с ними метаданные. Файлы изображений обычно содержат [данные EXIF](https://ru.wikipedia.org/wiki/Exif). Иногда фотографии даже содержат ваши GPS координаты в метаданных файла. ## Для компьютеров diff --git a/i18n/ru/desktop-browsers.md b/i18n/ru/desktop-browsers.md index ec0a353f..46bc5f51 100644 --- a/i18n/ru/desktop-browsers.md +++ b/i18n/ru/desktop-browsers.md @@ -269,7 +269,7 @@ Brave добавляет "[реферальный код](https://github. om/bra Эти параметры можно найти в разделе :material-menu: → **Настройки**. -#### Щиты +#### Shields Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. Если вы хотите оставаться залогиненными на определенном сайте, который вы часто посещаете, вы можете установить исключения для каждого сайта, нажав на значок щита в адресной строке. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ If you wish to stay logged in to a particular site you visit often, you can set - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -355,7 +354,7 @@ If you wish to stay logged in to a particular site you visit often, you can set 1. Эта опция присутствует не на всех платформах. -#### Синхронизация +#### Brave Sync [Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. @@ -365,8 +364,6 @@ If you wish to stay logged in to a particular site you visit often, you can set **Кошелек Brave** работает локально на твоём компьютере, но не поддерживает никаких конфиденциальных криптовалют, поэтому мы бы не советовали использовать и эту функцию. -## Дополнительные ресурсы - ## Критерии **Обрати внимание, что у нас нет связей ни с одним проектом, который мы рекомендуем.** В дополнение к [нашим стандартным критериям](about/criteria.md) мы разработали четкий набор требований, позволяющий давать объективные рекомендации. Мы рекомендуем тебе ознакомиться с этим списком, прежде чем выбрать продукт, и провести собственное исследование, чтобы убедиться в правильности своего выбора. diff --git a/i18n/ru/desktop.md b/i18n/ru/desktop.md index 19ba33a6..ad8896fb 100644 --- a/i18n/ru/desktop.md +++ b/i18n/ru/desktop.md @@ -5,6 +5,10 @@ description: Дистрибутивы Linux часто рекомендуютс cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Капитализм слежки](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Дистрибутивы Linux часто рекомендуются для защиты конфиденциальности и свободы пользователей. Если вы еще не используете Linux, ниже приведены некоторые дистрибутивы, которые мы рекомендуем попробовать, а также несколько общих советов по улучшению конфиденциальности и безопасности, которые применимы ко многим дистрибутивам Linux. - [Общий обзор Linux :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux имеет плавающий цикл релиза. Не сущес Будучи DIY дистрибутивом, вы [должны самостоятельно установить и поддерживать](os/linux-overview.md#arch-based-distributions) свою систему. Arch имеет [официальный установщик](https://wiki.archlinux.org/title/Archinstall), чтобы немного облегчить процесс установки. -Большая часть пакетов [Arch Linux](https://reproducible.archlinux.org) является [воспроизводимой](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Дистрибутивы для анонимности @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. Его цель - обеспечить конфиденциальность, безопасность и анонимность в интернете. Whonix лучше всего использовать в сочетании с [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix лучше всего использовать в сочетании с [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Логотип Tails](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** - это операционная система, основанная на Debian и направляющая все коммуникации через Tor, которая может загружаться практически на любом компьютере с DVD или USB-накопителя или SD-карты. Она использует [Tor](tor.md) для сохранения конфиденциальности и анонимности, обходя цензуру и не оставляет следов на используемом компьютере после выключения. +**Tails** - это операционная система, основанная на Debian и направляющая все коммуникации через Tor, которая может загружаться практически на любом компьютере с DVD или USB-накопителя или SD-карты. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Дистрибутивы для безопасности +Protects against the following threat(s): + +- [:material-bug-outline: Пассивные атаки](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/ru/encryption.md b/i18n/ru/encryption.md index 8c5c1278..f287e2f5 100644 --- a/i18n/ru/encryption.md +++ b/i18n/ru/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Диск) Protects against the following threat(s): diff --git a/i18n/ru/file-sharing.md b/i18n/ru/file-sharing.md index bc7f1157..b26e82dc 100644 --- a/i18n/ru/file-sharing.md +++ b/i18n/ru/file-sharing.md @@ -143,7 +143,6 @@ OnionShare provides the option to connect via [Tor bridges](https://docs.onionsh
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/ru/financial-services.md b/i18n/ru/financial-services.md index ab307be5..8ce75434 100644 --- a/i18n/ru/financial-services.md +++ b/i18n/ru/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Капитализм слежки](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Платежи в интернете - одно из самых больших испытаний для конфиденциальности. Эти службы могут помочь вам защитить вашу конфиденциальность от продавцов и других отслеживающих устройств, если вы хорошо понимаете, как эффективно осуществлять приватные платежи. Мы настоятельно рекомендуем вам сначала прочитать нашу обзорную статью о платежах, прежде чем совершать какие-либо покупки: [Совершение приватных платежей :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Услуги по маскировке платежей +Protects against the following threat(s): + +- [:material-account-search: Публичная экспозиция](basics/common-threats.md#limiting-public-information ""){.pg-green} + Существует ряд служб, предоставляющих "виртуальные дебетовые карты", которые вы можете использовать в интернет-магазинах, не раскрывая в большинстве случаев свою реальную банковскую или платежную информацию. Важно отметить, что эти финансовые услуги **не** анонимны и подчиняются законам "Знай своего клиента" (KYC) и могут потребовать от вас удостоверение личности или другую идентифицирующую информацию. Эти услуги в первую очередь полезны для защиты от утечки данных продавцов, менее сложного отслеживания или корреляции покупок маркетинговыми агентствами и кражи данных в интернете; но **не** для совершения покупки полностью анонимно.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Маркетплейсы подарочных карт +Protects against the following threat(s): + +- [:material-eye-outline: Массовое наблюдение](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + Эти сервисы позволяют приобретать подарочные карты для различных онлайн-площадок с помощью [криптовалюты](cryptocurrency.md). Некоторые из этих сервисов предлагают возможность проверки личности для получения более высоких лимитов, но они также позволяют создавать аккаунты, используя только адрес электронной почты. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ MySudo's virtual cards are currently only available via their iOS app.
- ### Критерии **Обрати внимание, что у нас нет связей ни с одним проектом, который мы рекомендуем.** В дополнение к [нашим стандартным критериям](about/criteria.md) мы разработали четкий набор требований, позволяющий давать объективные рекомендации. Перед тем, как вы решите выбрать какой-либо проект, мы рекомендуем вам ознакомиться со списком критериев и провести собственное исследование, чтобы убедиться в правильности своего выбора. diff --git a/i18n/ru/frontends.md b/i18n/ru/frontends.md index 847fbe0b..1b29b0f2 100644 --- a/i18n/ru/frontends.md +++ b/i18n/ru/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Иногда сервисы пытаются заставить вас создать аккаунт, блокируя доступ к контенту с помощью назойливых всплывающих окон. Они также могут не работать без включенного JavaScript. Эти фронтенды могут позволить вам обойти эти ограничения. +Protects against the following threat(s): + +- [:material-account-cash: Капитализм слежки](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Иногда сервисы пытаются заставить вас создать аккаунт, блокируя доступ к контенту с помощью назойливых всплывающих окон. Они также могут не работать без включенного JavaScript. These frontends can allow you to circumvent these restrictions. Если вы решите самостоятельно хостить эти фронтенды, важно, чтобы вашим экземпляром пользовались и другие люди, чтобы вашу активность нельзя было отследить. Вы должны быть осторожны с тем, где и как вы размещаете хостинг, поскольку активность других людей будет связана с вашим хостингом. -Если вы используете чей-то экземпляр, обязательно ознакомьтесь с политикой конфиденциальности этого конкретного экземпляра. Они могут быть изменены их владельцами и поэтому могут не отражать политику по умолчанию. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). Они могут быть изменены их владельцами и поэтому могут не отражать политику по умолчанию. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ cover: frontends.webp ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,12 +56,12 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. -[:octicons-repo-16: Репозиторий](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Публичный экземпляр"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Исходный код" } +[:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![Логотип FreeTube](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** - это бесплатное настольное приложение с открытым исходным кодом для [YouTube](https://youtube.com). Когда вы используете FreeTube, ваш список подписок и плейлисты сохранены локально на вашем устройстве. - -По умолчанию FreeTube блокирует всю рекламу YouTube. Кроме того, FreeTube опционально интегрируется с [SponsorBlock](https://sponsor.ajay.app), чтобы помочь вам пропускать спонсируемые сегменты видео. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Предупреждение

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Предупреждение

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -По умолчанию Yattee блокирует всю рекламу на YouTube. Кроме того, Yattee опционально интегрируется с [SponsorBlock](https://sponsor.ajay.app), чтобы помочь вам пропускать спонсируемые сегменты видео. - -### LibreTube (Android) - -
- -![Логотип LibreTube](assets/img/frontends/libretube.svg#only-light){ align=right } -![Логотип LibreTube](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** - это бесплатное приложение для Android с открытым исходным кодом для доступа к [YouTube](https://youtube.com), которое использует API [Piped](#piped). - -LibreTube позволяет хранить список подписок и плейлисты локально на устройстве Android или в учетной записи на выбранном вами экземпляре Piped, что дает возможность беспрепятственного доступа к ним и на других устройствах. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Предупреждение

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -По умолчанию LibreTube блокирует всю рекламу YouTube. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. Вы можете полностью настроить типы сегментов, которые SponsorBlock будет пропускать, или полностью отключить его. На самом видеоплеере также есть кнопка, позволяющая при желании отключить его для конкретного видео. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Список подписок и плейлисты сохраняются локально на вашем устройстве Android. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Предупреждение

- -При использовании NewPipe ваш IP-адрес будет виден используемым видеопровайдерам. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using LibreTube, your IP address will be visible to the [Piped](https://git **Invidious** - это бесплатный фронтенд с открытым исходным кодом для [YouTube](https://youtube.com), который можно самостоятельно хостить. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Для работы Piped требуется JavaScript, и существует множество публичных экземпляров. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![Логотип FreeTube](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** - это бесплатное настольное приложение с открытым исходным кодом для [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +Когда вы используете FreeTube, ваш список подписок и плейлисты сохранены локально на вашем устройстве. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Предупреждение

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +По умолчанию FreeTube блокирует всю рекламу YouTube. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Предупреждение

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +По умолчанию Yattee блокирует всю рекламу на YouTube. Кроме того, Yattee опционально интегрируется с [SponsorBlock](https://sponsor.ajay.app), чтобы помочь вам пропускать спонсируемые сегменты видео. + +### LibreTube (Android) + +
+ +![Логотип LibreTube](assets/img/frontends/libretube.svg#only-light){ align=right } +![Логотип LibreTube](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** - это бесплатное приложение для Android с открытым исходным кодом для доступа к [YouTube](https://youtube.com), которое использует API [Piped](#piped). + +Список подписок и плейлисты сохраняются локально на вашем устройстве Android. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Предупреждение

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +По умолчанию LibreTube блокирует всю рекламу YouTube. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. Вы можете полностью настроить типы сегментов, которые SponsorBlock будет пропускать, или полностью отключить его. На самом видеоплеере также есть кнопка, позволяющая при желании отключить его для конкретного видео. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Список подписок и плейлисты сохраняются локально на вашем устройстве Android. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Предупреждение

+ +При использовании NewPipe ваш IP-адрес будет виден используемым видеопровайдерам. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Критерии **Обрати внимание, что у нас нет связей ни с одним проектом, который мы рекомендуем.** В дополнение к [нашим стандартным критериям](about/criteria.md) мы разработали четкий набор требований, позволяющий давать объективные рекомендации. Перед тем, как вы решите выбрать какой-либо проект, мы рекомендуем вам ознакомиться со списком критериев и провести собственное исследование, чтобы убедиться в правильности своего выбора. -Рекомендованные фронтенды... - -- Должны иметь открытый исходный код. -- Должны иметь возможность самостоятельного хостинга. -- Должны предоставлять все основные функции сайта анонимным пользователям. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Рекомендованные фронтенды... + +- Должны иметь открытый исходный код. +- Должны иметь возможность самостоятельного хостинга. +- Должны предоставлять все основные функции сайта анонимным пользователям. diff --git a/i18n/ru/language-tools.md b/i18n/ru/language-tools.md index 0806623e..0ebc5b63 100644 --- a/i18n/ru/language-tools.md +++ b/i18n/ru/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/ru/mobile-browsers.md b/i18n/ru/mobile-browsers.md index 7a016ac1..a123e32e 100644 --- a/i18n/ru/mobile-browsers.md +++ b/i18n/ru/mobile-browsers.md @@ -64,8 +64,8 @@ Brave основан на Chromium, поэтому он покажется те Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave основан на Chromium, поэтому он покажется те Tor Browser — это единственный способ действительно анонимно пользоваться интернетом. Если ты используешь Brave, мы рекомендуем изменить следующие настройки, чтобы сохранить приватность, но все браузеры кроме [Tor](tor.md#tor-browser) могут *кем-нибудь* отслеживаться в том или ином виде. -Эти настройки можно найти в :material-menu: → **Настройки** → **Brave Щит и конфиденциальность** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Опции щитов можно понижать по мере необходимости для каждого конкретного сайта, но по умолчанию мы рекомендуем установить следующие параметры: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. Мы не рекомендуем использовать эту функцию; вместо этого оставь списки фильтров по умолчанию. Использование дополнительных фильтров выделит тебя среди других пользователей Brave, а также может увеличить площадь атаки, если в Brave есть эксплойт и вредоносное правило будет добавлено в один из используемых тобой списков. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. Мы не рекомендуем использовать эту функцию; вместо этого оставь списки фильтров по умолчанию. Использование дополнительных фильтров выделит тебя среди других пользователей Brave, а также может увеличить площадь атаки, если в Brave есть эксплойт и вредоносное правило будет добавлено в один из используемых тобой списков. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. Мы не рекомендуем использовать эту функцию; вместо этого оставь списки фильтров по умолчанию. Использование дополнительных фильтров выделит тебя среди других пользователей Brave, а также может увеличить площадь атаки, если в Brave есть эксплойт и вредоносное правило будет добавлено в один из используемых тобой списков. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Выбери **Удалять данные при выходе** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Отключи все переключатели в этой секции #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. Interplanetary File System (IPFS) - это децентрализованная, peer-to-peer сеть для хранения и обмена данными в распределенной файловой системе. Если ты не используешь эту функцию, отключи ее. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/ru/office-suites.md b/i18n/ru/office-suites.md index 6034d71c..62f91809 100644 --- a/i18n/ru/office-suites.md +++ b/i18n/ru/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/ru/os/android-overview.md b/i18n/ru/os/android-overview.md index 3865dbec..e345d98b 100644 --- a/i18n/ru/os/android-overview.md +++ b/i18n/ru/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### Профили пользователей -Профили нескольких пользователей находятся в разделе **Настройки** → **Система** → **Пользователи** и являются самым простым способом изоляции в Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -С помощью профилей пользователей можно наложить ограничения на определенный профиль, например: совершение звонков, использование SMS или установка приложений на устройство. Каждый профиль шифруется с помощью собственного ключа шифрования и не может получить доступ к данным других профилей. Даже владелец устройства не может просматривать данные других профилей, не зная их пароля. Профили пользователей - это более безопасный метод изоляции. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Каждый профиль шифруется с помощью собственного ключа шифрования и не может получить доступ к данным других профилей. Даже владелец устройства не может просматривать данные других профилей, не зная их пароля. Профили пользователей - это более безопасный метод изоляции. ### Рабочий профиль -[Рабочие профили](https://support.google.com/work/android/answer/6191949?hl=ru&sjid=10752136651864735274-EU) - это еще один способ изолировать отдельные приложения, который может быть более удобным, чем отдельные профили пользователей. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. Функционирование рабочего профиля зависит от контроллера устройства. Такие функции, как *File Shuttle* и *блокировка поиска контактов* или любые другие функции изоляции должны быть реализованы контроллером. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -Этот метод обычно менее безопасен, чем второй профиль пользователя; однако он позволяет запускать приложения одновременно в рабочем и личном профилях. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/ru/pastebins.md b/i18n/ru/pastebins.md index 13889870..d3612ea1 100644 --- a/i18n/ru/pastebins.md +++ b/i18n/ru/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/ru/real-time-communication.md b/i18n/ru/real-time-communication.md index 462d2fb2..0014dd87 100644 --- a/i18n/ru/real-time-communication.md +++ b/i18n/ru/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Фотографии профиля, реакции и никнеймы не зашифрованы. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Групповые звонки в настоящее время [не имеют аутентификации](https://github.com/vector-im/element-web/issues/13074), что означает, что к звонкам могут присоединяться и не входящие в комнату участники. Мы рекомендуем вам не использовать эту функцию для приватных созвонов. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/ru/router.md b/i18n/ru/router.md index 38f8a5af..77a96be9 100644 --- a/i18n/ru/router.md +++ b/i18n/ru/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Ниже приведены альтернативные операционные системы, которые могут использоваться на роутерах, точках доступа Wi-Fi и т. п. +Protects against the following threat(s): + +- [:material-account-cash: Капитализм слежки](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Пассивные атаки](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/ru/search-engines.md b/i18n/ru/search-engines.md index 7b973a93..0b855804 100644 --- a/i18n/ru/search-engines.md +++ b/i18n/ru/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Капитализм слежки](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Рекомендованные провайдеры diff --git a/i18n/ru/tools.md b/i18n/ru/tools.md index c55f48a5..56cc15d2 100644 --- a/i18n/ru/tools.md +++ b/i18n/ru/tools.md @@ -31,15 +31,6 @@ If you want assistance figuring out the best privacy tools and alternative progr -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/sv/about.md b/i18n/sv/about.md index fc4b77be..1f574f07 100644 --- a/i18n/sv/about.md +++ b/i18n/sv/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/sv/android/general-apps.md b/i18n/sv/android/general-apps.md index 8f52948f..47d5ed2a 100644 --- a/i18n/sv/android/general-apps.md +++ b/i18n/sv/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Varning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/sv/browser-extensions.md b/i18n/sv/browser-extensions.md index 8ef4d256..9df8576c 100644 --- a/i18n/sv/browser-extensions.md +++ b/i18n/sv/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/sv/cloud.md b/i18n/sv/cloud.md index e681a436..07e5cd6e 100644 --- a/i18n/sv/cloud.md +++ b/i18n/sv/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/sv/data-redaction.md b/i18n/sv/data-redaction.md index 518df690..5662ac2f 100644 --- a/i18n/sv/data-redaction.md +++ b/i18n/sv/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Offentlig exponering](basics/common-threats.md#limiting-public-information ""){.pg-green} + När du delar filer ska du se till att ta bort tillhörande metadata. Bildfiler innehåller vanligtvis [Exif](https://en.wikipedia.org/wiki/Exif) data. Foton innehåller ibland även GPS-koordinater i filmetadata. ## Skrivbord diff --git a/i18n/sv/desktop-browsers.md b/i18n/sv/desktop-browsers.md index cede9721..49a79f93 100644 --- a/i18n/sv/desktop-browsers.md +++ b/i18n/sv/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Tillägg @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Ytterligare resurser - ## Kriterier **Observera att vi inte är knutna till något av de projekt som vi rekommenderar.** Förutom [våra standardkriterier](about/criteria.md)har vi utvecklat en tydlig uppsättning krav som gör det möjligt för oss att ge objektiva rekommendationer. Vi föreslår att du bekantar dig med den här listan innan du väljer att använda ett projekt, och att du gör din egen forskning för att se till att det är rätt val för dig. diff --git a/i18n/sv/desktop.md b/i18n/sv/desktop.md index e53e8afe..d3f958a3 100644 --- a/i18n/sv/desktop.md +++ b/i18n/sv/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Övervakningskapitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passiva attacker](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/sv/encryption.md b/i18n/sv/encryption.md index da1b660d..16460247 100644 --- a/i18n/sv/encryption.md +++ b/i18n/sv/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (disk) Protects against the following threat(s): diff --git a/i18n/sv/file-sharing.md b/i18n/sv/file-sharing.md index 998f6abf..ae3115dd 100644 --- a/i18n/sv/file-sharing.md +++ b/i18n/sv/file-sharing.md @@ -143,7 +143,6 @@ Vi rekommenderar inte att du använder [E2EE App](https://apps.nextcloud.com/app
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/sv/financial-services.md b/i18n/sv/financial-services.md index 29d71c69..24c0be10 100644 --- a/i18n/sv/financial-services.md +++ b/i18n/sv/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Övervakningskapitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Offentlig exponering](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Massövervakning](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Kriterier **Observera att vi inte är knutna till något av de projekt som vi rekommenderar.** Förutom [våra standardkriterier](about/criteria.md)har vi utvecklat en tydlig uppsättning krav som gör det möjligt för oss att ge objektiva rekommendationer. Vi föreslår att du bekantar dig med den här listan innan du väljer att använda ett projekt, och att du gör din egen forskning för att se till att det är rätt val för dig. diff --git a/i18n/sv/frontends.md b/i18n/sv/frontends.md index 70358429..add6e3f4 100644 --- a/i18n/sv/frontends.md +++ b/i18n/sv/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Övervakningskapitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Varning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Varning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Varning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Varning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Varning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Varning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Varning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Varning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Kriterier **Observera att vi inte är knutna till något av de projekt som vi rekommenderar.** Förutom [våra standardkriterier](about/criteria.md)har vi utvecklat en tydlig uppsättning krav som gör det möjligt för oss att ge objektiva rekommendationer. Vi föreslår att du bekantar dig med den här listan innan du väljer att använda ett projekt, och att du gör din egen forskning för att se till att det är rätt val för dig. -Recommended frontends... - -- Måste vara programvara med öppen källkod. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Måste vara programvara med öppen källkod. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/sv/language-tools.md b/i18n/sv/language-tools.md index 80054c22..7a43ab5f 100644 --- a/i18n/sv/language-tools.md +++ b/i18n/sv/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/sv/mobile-browsers.md b/i18n/sv/mobile-browsers.md index a3134ad0..6ebab1cf 100644 --- a/i18n/sv/mobile-browsers.md +++ b/i18n/sv/mobile-browsers.md @@ -64,8 +64,8 @@ Brave bygger på webbläsarprojektet Chromium, så den bör kännas bekant och h Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave bygger på webbläsarprojektet Chromium, så den bör kännas bekant och h Tor Browser är det enda sättet att verkligen surfa anonymt på internet. När du använder Brave rekommenderar vi att du ändrar följande inställningar för att skydda din integritet från vissa parter, men alla andra webbläsare än [Tor Browser](tor.md#tor-browser) kommer att kunna spåras av *någon* i något avseende. -Dessa alternativ finns i :material-menu: → **Inställningar** → **Modiga sköldar & sekretess** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields alternativ kan nedgraderas vid behov för varje enskild plats, men som standard rekommenderar vi att du ställer in följande: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. Vi avråder från att använda den här funktionen; behåll istället standardfilterlistorna. Om du använder extra listor sticker du ut från andra Brave-användare och kan också öka angreppsytan om det finns en exploit i Brave och en skadlig regel läggs till i en av de listor du använder. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. Vi avråder från att använda den här funktionen; behåll istället standardfilterlistorna. Om du använder extra listor sticker du ut från andra Brave-användare och kan också öka angreppsytan om det finns en exploit i Brave och en skadlig regel läggs till i en av de listor du använder. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. Vi avråder från att använda den här funktionen; behåll istället standardfilterlistorna. Om du använder extra listor sticker du ut från andra Brave-användare och kan också öka angreppsytan om det finns en exploit i Brave och en skadlig regel läggs till i en av de listor du använder. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Välj **Rensa uppgifter vid avslut** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Avmarkera alla komponenter för sociala medier #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/sv/office-suites.md b/i18n/sv/office-suites.md index faf54442..bee41efc 100644 --- a/i18n/sv/office-suites.md +++ b/i18n/sv/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/sv/os/android-overview.md b/i18n/sv/os/android-overview.md index bbd40dd7..3f105f37 100644 --- a/i18n/sv/os/android-overview.md +++ b/i18n/sv/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/sv/pastebins.md b/i18n/sv/pastebins.md index 33ea3c98..e74708fe 100644 --- a/i18n/sv/pastebins.md +++ b/i18n/sv/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/sv/real-time-communication.md b/i18n/sv/real-time-communication.md index 5a57feda..108325fe 100644 --- a/i18n/sv/real-time-communication.md +++ b/i18n/sv/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/sv/router.md b/i18n/sv/router.md index c6953d71..507e59e2 100644 --- a/i18n/sv/router.md +++ b/i18n/sv/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Nedan följer några alternativa operativsystem som kan användas på routrar, Wi-Fi-accesspunkter osv. +Protects against the following threat(s): + +- [:material-account-cash: Övervakningskapitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passiva attacker](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/sv/search-engines.md b/i18n/sv/search-engines.md index e6ace737..a0552e73 100644 --- a/i18n/sv/search-engines.md +++ b/i18n/sv/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Övervakningskapitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Recommended Providers diff --git a/i18n/sv/tools.md b/i18n/sv/tools.md index 96e73737..0a2460d9 100644 --- a/i18n/sv/tools.md +++ b/i18n/sv/tools.md @@ -31,15 +31,6 @@ Om du vill ha mer information om varje projekt, varför de valdes ut och ytterli -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/tr/about.md b/i18n/tr/about.md index 043f602f..9bd52282 100644 --- a/i18n/tr/about.md +++ b/i18n/tr/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/tr/android/general-apps.md b/i18n/tr/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/tr/android/general-apps.md +++ b/i18n/tr/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/tr/browser-extensions.md b/i18n/tr/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/tr/browser-extensions.md +++ b/i18n/tr/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/tr/cloud.md b/i18n/tr/cloud.md index 8c882770..3daab23f 100644 --- a/i18n/tr/cloud.md +++ b/i18n/tr/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/tr/data-redaction.md b/i18n/tr/data-redaction.md index df662125..3460cd6e 100644 --- a/i18n/tr/data-redaction.md +++ b/i18n/tr/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/tr/desktop-browsers.md b/i18n/tr/desktop-browsers.md index 6d4b6114..e3bb2f44 100644 --- a/i18n/tr/desktop-browsers.md +++ b/i18n/tr/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources - ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/tr/desktop.md b/i18n/tr/desktop.md index d154b811..b45126f9 100644 --- a/i18n/tr/desktop.md +++ b/i18n/tr/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. Eğer linux kullanmıyorsanız, aşağıda denemenizi önerdiğimiz dağıtımların yanı sıra birçok linux dağıtımı için geçerli bazı genel gizlilik ve güvenlik ipuçları bulabilirsiniz. - [Linux'a Genel Bakış :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/tr/encryption.md b/i18n/tr/encryption.md index ac26bb6f..ee80271b 100644 --- a/i18n/tr/encryption.md +++ b/i18n/tr/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/tr/file-sharing.md b/i18n/tr/file-sharing.md index 992d67fb..a8780463 100644 --- a/i18n/tr/file-sharing.md +++ b/i18n/tr/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/tr/financial-services.md b/i18n/tr/financial-services.md index bd24c50a..4af77052 100644 --- a/i18n/tr/financial-services.md +++ b/i18n/tr/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/tr/frontends.md b/i18n/tr/frontends.md index c03c1138..9e83fe5e 100644 --- a/i18n/tr/frontends.md +++ b/i18n/tr/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/tr/language-tools.md b/i18n/tr/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/tr/language-tools.md +++ b/i18n/tr/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/tr/mobile-browsers.md b/i18n/tr/mobile-browsers.md index 1184be26..3cbb7f71 100644 --- a/i18n/tr/mobile-browsers.md +++ b/i18n/tr/mobile-browsers.md @@ -64,8 +64,8 @@ Brave, Chromium web tarayıcısı projesi üzerine inşa edilmiştir, bu nedenle Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave, Chromium web tarayıcısı projesi üzerine inşa edilmiştir, bu nedenle Tor Browser, internette gerçekten anonim olarak gezinmenin tek yoludur. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/tr/office-suites.md b/i18n/tr/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/tr/office-suites.md +++ b/i18n/tr/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/tr/os/android-overview.md b/i18n/tr/os/android-overview.md index 6ab0125f..152e4926 100644 --- a/i18n/tr/os/android-overview.md +++ b/i18n/tr/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/tr/pastebins.md b/i18n/tr/pastebins.md index e0d4b33e..1488064a 100644 --- a/i18n/tr/pastebins.md +++ b/i18n/tr/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/tr/real-time-communication.md b/i18n/tr/real-time-communication.md index c678b475..430431fa 100644 --- a/i18n/tr/real-time-communication.md +++ b/i18n/tr/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/tr/router.md b/i18n/tr/router.md index 498bf621..949e98df 100644 --- a/i18n/tr/router.md +++ b/i18n/tr/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Aşağıda; yönlendiricilerde, Wi-Fi erişim noktalarında vb. kullanılabilecek birkaç alternatif işletim sistemi bulunmaktadır. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/tr/search-engines.md b/i18n/tr/search-engines.md index 806172a7..9f4f3c0f 100644 --- a/i18n/tr/search-engines.md +++ b/i18n/tr/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Önerilen Sağlayıcılar diff --git a/i18n/tr/tools.md b/i18n/tr/tools.md index cb289159..4dd18719 100644 --- a/i18n/tr/tools.md +++ b/i18n/tr/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/uk/about.md b/i18n/uk/about.md index 043f602f..9bd52282 100644 --- a/i18n/uk/about.md +++ b/i18n/uk/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/uk/android/general-apps.md b/i18n/uk/android/general-apps.md index e642527f..04919076 100644 --- a/i18n/uk/android/general-apps.md +++ b/i18n/uk/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/uk/browser-extensions.md b/i18n/uk/browser-extensions.md index f0a2bf5b..6d3fee2e 100644 --- a/i18n/uk/browser-extensions.md +++ b/i18n/uk/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/uk/cloud.md b/i18n/uk/cloud.md index d778f858..c5cd90c6 100644 --- a/i18n/uk/cloud.md +++ b/i18n/uk/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/uk/data-redaction.md b/i18n/uk/data-redaction.md index df662125..80bbdab2 100644 --- a/i18n/uk/data-redaction.md +++ b/i18n/uk/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Публічний розголос](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/uk/desktop-browsers.md b/i18n/uk/desktop-browsers.md index d9d6f9bf..249a3756 100644 --- a/i18n/uk/desktop-browsers.md +++ b/i18n/uk/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources - ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/uk/desktop.md b/i18n/uk/desktop.md index 13e2c2a0..4a000ee5 100644 --- a/i18n/uk/desktop.md +++ b/i18n/uk/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Капіталізм нагляду](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Пасивні атаки](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/uk/encryption.md b/i18n/uk/encryption.md index a834c806..392d3c93 100644 --- a/i18n/uk/encryption.md +++ b/i18n/uk/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/uk/file-sharing.md b/i18n/uk/file-sharing.md index d6196d13..8537d18a 100644 --- a/i18n/uk/file-sharing.md +++ b/i18n/uk/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/uk/financial-services.md b/i18n/uk/financial-services.md index bd24c50a..01a7d08b 100644 --- a/i18n/uk/financial-services.md +++ b/i18n/uk/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Капіталізм нагляду](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Публічний розголос](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Масове спостереження](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/uk/frontends.md b/i18n/uk/frontends.md index c03c1138..566cbf69 100644 --- a/i18n/uk/frontends.md +++ b/i18n/uk/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Капіталізм нагляду](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/uk/language-tools.md b/i18n/uk/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/uk/language-tools.md +++ b/i18n/uk/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/uk/mobile-browsers.md b/i18n/uk/mobile-browsers.md index b2e4c573..3e3df029 100644 --- a/i18n/uk/mobile-browsers.md +++ b/i18n/uk/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/uk/office-suites.md b/i18n/uk/office-suites.md index c2c0051d..43ba82c5 100644 --- a/i18n/uk/office-suites.md +++ b/i18n/uk/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/uk/os/android-overview.md b/i18n/uk/os/android-overview.md index e4208520..e0eb2142 100644 --- a/i18n/uk/os/android-overview.md +++ b/i18n/uk/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### Профілі користувачів -Для цього потрібен **контролер пристрою** такий як [Shelter](#recommended-apps), якщо ви не використовуєте CalyxOS, яка вже містить в собі контролер. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -Робочий профіль залежить від функціонування контролера пристрою. Кожен профіль зашифрований за допомогою власного ключа шифрування і не може отримати доступ до даних будь-яких інших профілів. Навіть власник пристрою не може переглядати дані профілів, не знаючи їхніх паролів. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Кожен профіль зашифрований за допомогою власного ключа шифрування і не може отримати доступ до даних будь-яких інших профілів. Навіть власник пристрою не може переглядати дані профілів, не знаючи їхніх паролів. Multiple user profiles are a more secure method of isolation. ### Робочий профіль -[Робочі профілі](https://support.google.com/work/android/answer/6191949) - це ще один спосіб ізоляції програм, який може бути зручнішим, ніж окремі профілі користувачів. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. Робочий профіль залежить від функціонування контролера пристрою. Такі функції як *Файловий шатл* та *блокування пошуку контактів* або будь-які інші функції ізоляції повинні бути реалізовані контролером. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -Цей метод, як правило, є менш безпечним, ніж додатковий профіль користувача; однак, він дозволяє вам зручно запускати додатки як в робочому, так і в особистому профілях одночасно. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/uk/pastebins.md b/i18n/uk/pastebins.md index 66d41268..7ce4f4b3 100644 --- a/i18n/uk/pastebins.md +++ b/i18n/uk/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/uk/real-time-communication.md b/i18n/uk/real-time-communication.md index cf31cf90..30a67105 100644 --- a/i18n/uk/real-time-communication.md +++ b/i18n/uk/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/uk/router.md b/i18n/uk/router.md index f1638032..a4a9c929 100644 --- a/i18n/uk/router.md +++ b/i18n/uk/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Нижче наведено кілька альтернативних операційних систем, які можна використовувати на маршрутизаторах, точках доступу Wi-Fi тощо. +Protects against the following threat(s): + +- [:material-account-cash: Капіталізм нагляду](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Пасивні атаки](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/uk/search-engines.md b/i18n/uk/search-engines.md index ed7d5131..758272b1 100644 --- a/i18n/uk/search-engines.md +++ b/i18n/uk/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Капіталізм нагляду](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Рекомендовані DNS-провайдери diff --git a/i18n/uk/tools.md b/i18n/uk/tools.md index 88d1dcfe..b92549b8 100644 --- a/i18n/uk/tools.md +++ b/i18n/uk/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/vi/about.md b/i18n/vi/about.md index 043f602f..9bd52282 100644 --- a/i18n/vi/about.md +++ b/i18n/vi/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/vi/android/general-apps.md b/i18n/vi/android/general-apps.md index 689e43d1..27a6e7b1 100644 --- a/i18n/vi/android/general-apps.md +++ b/i18n/vi/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/vi/browser-extensions.md b/i18n/vi/browser-extensions.md index 2e7690aa..07ca271d 100644 --- a/i18n/vi/browser-extensions.md +++ b/i18n/vi/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/vi/cloud.md b/i18n/vi/cloud.md index e430ff01..398ac6d5 100644 --- a/i18n/vi/cloud.md +++ b/i18n/vi/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/vi/data-redaction.md b/i18n/vi/data-redaction.md index d5fee3d1..10a19760 100644 --- a/i18n/vi/data-redaction.md +++ b/i18n/vi/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. ## Desktop diff --git a/i18n/vi/desktop-browsers.md b/i18n/vi/desktop-browsers.md index f91e4afe..97ce48a7 100644 --- a/i18n/vi/desktop-browsers.md +++ b/i18n/vi/desktop-browsers.md @@ -295,8 +295,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### Privacy and security @@ -304,7 +304,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -339,7 +339,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** #### Extensions @@ -365,8 +364,6 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources - ## Framadate **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/vi/desktop.md b/i18n/vi/desktop.md index 086ee82b..3174f057 100644 --- a/i18n/vi/desktop.md +++ b/i18n/vi/desktop.md @@ -5,6 +5,10 @@ description: Linux distributions are commonly recommended for privacy protection cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. - [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux has a rolling release cycle. There is no fixed release schedule and p Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. -A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## Anonymity-Focused Distributions @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. +**Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## Security-focused Distributions +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/vi/encryption.md b/i18n/vi/encryption.md index 17f7381f..7a3d8aee 100644 --- a/i18n/vi/encryption.md +++ b/i18n/vi/encryption.md @@ -89,6 +89,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (Disk) Protects against the following threat(s): diff --git a/i18n/vi/file-sharing.md b/i18n/vi/file-sharing.md index 7fce19d2..8097c5f6 100644 --- a/i18n/vi/file-sharing.md +++ b/i18n/vi/file-sharing.md @@ -145,7 +145,6 @@ OnionShare provides the option to connect via [Tor bridges](https://docs.onionsh
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/vi/financial-services.md b/i18n/vi/financial-services.md index 3c9ac831..d2d5b39b 100644 --- a/i18n/vi/financial-services.md +++ b/i18n/vi/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Framadate **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/vi/frontends.md b/i18n/vi/frontends.md index c9a91b6c..4840e15a 100644 --- a/i18n/vi/frontends.md +++ b/i18n/vi/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

Warning

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

Warning

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

Warning

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

Warning

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

Warning

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

Warning

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

Warning

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

Warning

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Framadate **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -Recommended frontends... - -- Must be open-source software. -- Must be self-hostable. -- Must provide all basic website functionality available to anonymous users. - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +Recommended frontends... + +- Must be open-source software. +- Must be self-hostable. +- Must provide all basic website functionality available to anonymous users. diff --git a/i18n/vi/language-tools.md b/i18n/vi/language-tools.md index 840f6e7c..244356fc 100644 --- a/i18n/vi/language-tools.md +++ b/i18n/vi/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/vi/mobile-browsers.md b/i18n/vi/mobile-browsers.md index 2f38502a..5cb2df6c 100644 --- a/i18n/vi/mobile-browsers.md +++ b/i18n/vi/mobile-browsers.md @@ -64,8 +64,8 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave is built upon the Chromium web browser project, so it should feel familiar Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another. -These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy** +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] Uncheck all social media components #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/vi/office-suites.md b/i18n/vi/office-suites.md index 28b557c5..05ba3191 100644 --- a/i18n/vi/office-suites.md +++ b/i18n/vi/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/vi/os/android-overview.md b/i18n/vi/os/android-overview.md index 6ab0125f..152e4926 100644 --- a/i18n/vi/os/android-overview.md +++ b/i18n/vi/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### User Profiles -Multiple user profiles can be found in **Settings** → **System** → **Multiple users** and are the simplest way to isolate in Android. +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps on the device. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. Each profile is encrypted using its own encryption key and cannot access the data of any other profiles. Even the device owner cannot view the data of other profiles without knowing their password. Multiple user profiles are a more secure method of isolation. ### Work Profile -[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside the work profile. -This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the work and personal profiles simultaneously. +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/vi/pastebins.md b/i18n/vi/pastebins.md index 08ee8d0a..3985f7f2 100644 --- a/i18n/vi/pastebins.md +++ b/i18n/vi/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/vi/real-time-communication.md b/i18n/vi/real-time-communication.md index 27cfba59..5658a37c 100644 --- a/i18n/vi/real-time-communication.md +++ b/i18n/vi/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/vi/router.md b/i18n/vi/router.md index bec945da..5da2223b 100644 --- a/i18n/vi/router.md +++ b/i18n/vi/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Dưới đây là một số hệ điều hành thay thế, có thể được sử dụng trên bộ định tuyến, điểm truy cập Wi-Fi, v.v. +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/vi/search-engines.md b/i18n/vi/search-engines.md index 2ff16d2c..a3376e1f 100644 --- a/i18n/vi/search-engines.md +++ b/i18n/vi/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## Recommended Providers diff --git a/i18n/vi/tools.md b/i18n/vi/tools.md index 0c7fdee7..c5ce2a80 100644 --- a/i18n/vi/tools.md +++ b/i18n/vi/tools.md @@ -31,15 +31,6 @@ For more details about each project, why they were chosen, and additional tips o -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers
diff --git a/i18n/zh-Hant/about.md b/i18n/zh-Hant/about.md index ac9b7938..18827c97 100644 --- a/i18n/zh-Hant/about.md +++ b/i18n/zh-Hant/about.md @@ -143,7 +143,7 @@ _專案主任為兼職職位,直接向執行委員會報告。_ — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [翻譯自荷蘭文] -同時也在以下網站中被提及: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok)、 [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)]、 [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt)、 [Wired](https://wired.com/story/firefox-mozilla-2022) 和 [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again)。 +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## 歷史 diff --git a/i18n/zh-Hant/android/general-apps.md b/i18n/zh-Hant/android/general-apps.md index f040cba3..581d1626 100644 --- a/i18n/zh-Hant/android/general-apps.md +++ b/i18n/zh-Hant/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +防護下列威脅: + +- [:material-bug-outline: 被動攻擊](../basics/common-threats.md#security-and-privacy){ .pg-orange } + 我們在本網站上推薦了各種 Android 應用程式。 此處列出的應用程式是 Android 獨有的,專門增強或替換了關鍵系統功能。 ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter 支援阻止跨配置檔案的聯絡人搜尋以及透過預設檔案管

警告

-建議使用Shelter,而不是 [Insular](https://secure-system.gitlab.io/Insular) 和 [Island](https://github.com/oasisfeng/island) ,因為它支援 [聯絡人搜尋屏蔽](https://secure-system.gitlab.io/Insular/faq.html) 。 - 使用 Shelter 時,您將需要完全信任其開發人員,因為 Shelter 將作為 [設備管理員](https://developer.android.com/guide/topics/admin/device-admin) 來創建工作設定檔,這將使它有大量權限訪問存儲在工作設定檔的資料。
+建議使用Shelter,而不是 [Insular](https://secure-system.gitlab.io/Insular) 和 [Island](https://github.com/oasisfeng/island) ,因為它支援 [聯絡人搜尋屏蔽](https://secure-system.gitlab.io/Insular/faq.html) 。 + ### Secure Camera +防護下列威脅: + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ Shelter 支援阻止跨配置檔案的聯絡人搜尋以及透過預設檔案管 防護下列威脅: - [:material-target-account: 針對性攻擊](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: 被動攻擊](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/zh-Hant/browser-extensions.md b/i18n/zh-Hant/browser-extensions.md index 4b1d77e5..e8a64d92 100644 --- a/i18n/zh-Hant/browser-extensions.md +++ b/i18n/zh-Hant/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin 還有一個「Lite」版本,與原始版相比,其功能集
下載 -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/zh-Hant/cloud.md b/i18n/zh-Hant/cloud.md index 02f4c62d..af12bacb 100644 --- a/i18n/zh-Hant/cloud.md +++ b/i18n/zh-Hant/cloud.md @@ -117,7 +117,7 @@ Peergos 主要是網頁應用程式,但您可以自行託管伺服器,將其 透過註冊帳戶在其付費託管服務上運行本地版本的 Peergos ,用戶可在不依賴 DNS 或 TLS 憑證授權單位的情況下存取 Peergos 存儲,並將資料副本備份到其雲端。 無論運行他們的桌面伺服器還是僅使用他們的託管 Web 介面,使用者體驗都應該是相同的。 -Peergos 於 2019 年 9 月接受了 Cure53 的[審核](https://cure53.de/pentest-report_peergos.pdf),所有發現的問題隨後都做了修復。 +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. Android 應用程式尚未推出,但已在 [開發中](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25) 。 目前的解決方法是改用移動平台 [PWA](https://peergos.net)。 diff --git a/i18n/zh-Hant/data-redaction.md b/i18n/zh-Hant/data-redaction.md index 058ca559..32cc80a3 100644 --- a/i18n/zh-Hant/data-redaction.md +++ b/i18n/zh-Hant/data-redaction.md @@ -6,6 +6,10 @@ description: 使用這些工具來移除所分享的相片和文件中的GPS定 cover: data-redaction.webp --- +防護下列威脅: + +- [:material-account-search: 公共曝露](basics/common-threats.md#limiting-public-information ""){.pg-green} + 分享檔案時,請務必移除相關的中繼資料。 映像文件通常包含 [Exif](https://en.wikipedia.org/wiki/Exif) 數據。 照片有時甚至在文件元數據中包含GPS坐標。 ## 電腦版應用程式 diff --git a/i18n/zh-Hant/desktop-browsers.md b/i18n/zh-Hant/desktop-browsers.md index 976d14d5..56ec7b4d 100644 --- a/i18n/zh-Hant/desktop-browsers.md +++ b/i18n/zh-Hant/desktop-browsers.md @@ -295,20 +295,20 @@ Brave 允許您在內部網頁 brave://settings/shields/filters 內選擇額外
-1. 此選項提供的功能類似於 uBlock Origin 的進階[封鎖模式](https://github.com/gorhill/uBlock/wiki/Blocking-mode)。 -2. 如果您希望在經常造訪的特定網站保持登入狀態,您可以按一下位址列上的 Shield 圖示,以每個網站為基礎設定例外情況。 +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. #### 隱私權和安全性
-- [x] 在 *安全性* → *管理 V8 安全性* 底下選擇**禁止網站使用 V8 最佳化工具** (1) -- [x] 在 *網站與 Shields 設定* 下選擇 **自動移除未使用網站的權限** -- [x] 在 [WebRTC IP 處理政策](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) 下選擇 **停用非代理 UDP** -- [ ] 取消勾選 **使用 Google 服務來推播訊息** -- [x] 選取 **自動重新導向 AMP 頁面** -- [x] 選取 **自動重新導向追蹤 URL** -- [x] 選取 **根據我的語言偏好設定,防止網站識別我的指紋** +- [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) +- [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Use Google services for push messaging** +- [x] Select **Auto-redirect AMP pages** +- [x] Select **Auto-redirect tracking URLs** +- [x] Select **Prevent sites from fingerprinting me based on my language preferences**
@@ -339,7 +339,6 @@ Brave 的 Web3 功能可能會增加您的瀏覽器指紋和攻擊面。 除非 - 將 *預設以太坊錢包* 設為 **擴充功能 (無後援)** - 將 *預設 Solana 錢包* 設為 **擴充功能 (無後援)** -- Set *Method to resolve IPFS resources* to **Disabled** #### 擴充功能 @@ -365,8 +364,6 @@ Brave 的 Web3 功能可能會增加您的瀏覽器指紋和攻擊面。 除非 **Brave 錢包** 在您的電腦上本地運行,但不支援任何私密加密貨幣,因此我們也不建議使用此功能。 -## 其他資源 - ## 標準 **請注意,我們與所推薦的任何專案都沒有任何關係。**除了[我們的標準準則](about/criteria.md)外,我們還制定了一套明確的要求,以便我們提供客觀的建議。 我們建議您在選擇使用專案前先熟悉此清單,並自行研究,以確保它是適合您的選擇。 diff --git a/i18n/zh-Hant/desktop.md b/i18n/zh-Hant/desktop.md index 0dca70dd..1a3da3b7 100644 --- a/i18n/zh-Hant/desktop.md +++ b/i18n/zh-Hant/desktop.md @@ -5,6 +5,10 @@ description: 基於隱私保護和軟體自由,通常建議用 Linux 發行版 cover: desktop.webp --- +防護下列威脅: + +- [:material-account-cash: 監控資本主義](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + 基於隱私保護和軟體自由,通常建議用 Linux 發行版。 如果您還不曾用過 Linux ,以下是我們建議可試試的發行版,以及一些 Linux發行版的隱私和安全提升技巧。 - [一般Linux 概述 :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux有一個滾動發佈週期。 沒有固定的發布時間表,套件 作為 DIY 發行版,用戶需要 [自行設置與維護](os/linux-overview.md#arch-based-distributions) 系統。 Arch有一個 [官方安裝程式](https://wiki.archlinux.org/title/Archinstall) ,使安裝過程更容易。 -[Arch Linux ](https://reproducible.archlinux.org) 大部份軟體包是 [可復制的](https://reproducible-builds.org)。 +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## 原子化發行版 @@ -125,7 +129,7 @@ Nix 套件管理員使用純函數式程式設計語言(稱為 Nix )來定 [Nixpkgs](https://github.com/nixos/nixpkgs) (套件的主要來源)包含在單一的 GitHub 儲存庫中。 您也可以用相同的語言定義自己的套件,然後輕鬆地將它們包含在您的配置中。 -Nix是一個基於源的套件管理器;如果二進位快取中沒有預先構建的可用性, Nix 只會使用其定義從源構建套件。 它在盡可能獨立於主機系統的沙盒 *純淨*環境(pure environment,此處因找不到資料而直翻)中建立每個套件。 使用此方法建立的二進制檔案是可重現的,這可以用來防範 [:material-package-variant-closed-remove: 供應鏈攻擊](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}。 +Nix是一個基於源的套件管理器;如果二進位快取中沒有預先構建的可用性, Nix 只會使用其定義從源構建套件。 它在盡可能獨立於主機系統的沙盒 *純淨*環境(pure environment,此處因找不到資料而直翻)中建立每個套件。 Binaries built with this method are reproducible[^1]. ## 以匿名爲重點的發行版 @@ -135,7 +139,7 @@ Nix是一個基於源的套件管理器;如果二進位快取中沒有預先 ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** 為基於 [Kicksecure](#kicksecure) 專注在安全的 Debian 分支系統。 它旨在提供網際網路的隱私、安全和匿名性。 Whonix 最好與 [Qubes OS](#qubes-os) 配合使用。 +**Whonix** 為基於 [Kicksecure](#kicksecure) 專注在安全的 Debian 分支系統。 It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix 最好與 [Qubes OS](#qubes-os) 配合使用。 [:octicons-home-16: 首頁](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="洋蔥服務" } @@ -158,7 +162,7 @@ Whonix 最好 [與 Qubes 結合使用](https://whonix.org/wiki/Qubes/Why_use_Qub ![Tails logo](assets/img/linux-desktop/tails.svg){ align=right } -**Tails** 是一個基於Debian 的自生作業系統,通過 Tor 路由所有通訊,透過 DVD , USB記憶棒或 SD卡安裝幾乎可在任何電腦上啟動。 它使用 [Tor](tor.md) 來保護隱私和匿名性,同時規避審查制度,並且使用的電腦在關閉電源後不會留下任何痕跡。 +**Tails** 是一個基於Debian 的自生作業系統,通過 Tor 路由所有通訊,透過 DVD , USB記憶棒或 SD卡安裝幾乎可在任何電腦上啟動。 It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: 首頁](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=說明文件} @@ -183,6 +187,10 @@ Tails Tor 瀏覽器預設包含 [uBlock Origin](browser-extensions.md#ublock-ori ## 以安全爲重點的發行版 +防護下列威脅: + +- [:material-bug-outline: 被動攻擊](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes OS
@@ -202,7 +210,7 @@ Tails Tor 瀏覽器預設包含 [uBlock Origin](browser-extensions.md#ublock-ori
-Qubes OS 作業系統將子系統(例如網絡、USB等)和應用程式隔離在個別的 *qubes* 以保護電腦。 如果系統的一部分被破壞,其餘的 *qubes* 與核心系統仍受到保護。 +Qubes OS 作業系統將子系統(例如網絡、USB等)和應用程式隔離在個別的 *qubes* 以保護電腦。 Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. 有關 Oubes 運作的進一步資訊,請參考我們完整的 [Qubes OS 介紹](os/qubes-overview.md) 頁面。 @@ -242,3 +250,5 @@ Qubes OS 作業系統將子系統(例如網絡、USB等)和應用程式隔 - 維護作業系統是一項大挑戰,小型專案往往會犯更多可避免的錯誤,或延遲重大更新(或更糟糕的是,很快就完全消失)。 我們傾向於至少可維持10 年的專案(無論是由於公司支持還是非常重要的社區支持),而不是手工構建或只有少數維護人員的專案。 此外,[我們推薦專案的一般準則](about/criteria.md) 仍然適用。 **請注意我們和所推薦的服務商沒有任何利害關係。** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/zh-Hant/encryption.md b/i18n/zh-Hant/encryption.md index 2580469d..92a3e1f2 100644 --- a/i18n/zh-Hant/encryption.md +++ b/i18n/zh-Hant/encryption.md @@ -78,6 +78,8 @@ Cryptomator 的文件詳細介紹它的預期[安全目標](https://docs.cryptom
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (磁碟) 防護下列威脅: diff --git a/i18n/zh-Hant/file-sharing.md b/i18n/zh-Hant/file-sharing.md index d640a0fc..64780f20 100644 --- a/i18n/zh-Hant/file-sharing.md +++ b/i18n/zh-Hant/file-sharing.md @@ -141,9 +141,8 @@ OnionShare 提供透過 [Tor 橋接器](https://docs.onionshare.org/2.6.2/en/tor [:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=捐款 }
-下載 +Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/zh-Hant/financial-services.md b/i18n/zh-Hant/financial-services.md index a6e87f46..d0e5951b 100644 --- a/i18n/zh-Hant/financial-services.md +++ b/i18n/zh-Hant/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: 這些服務可協助您保護您的隱私不受商家和其他追蹤者的侵害,而這正是當今隱私權所面臨的最大挑戰之一。 --- +防護下列威脅: + +- [:material-account-cash: 監控資本主義](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + 在線支付是隱私面臨的最大挑戰之一。 這些服務可以幫助您保護隱私,免受商家和其他追蹤者的影響,前提是您對如何有效地進行私人付款有深入的了解。 我們強烈建議您在網路購買前先閱讀本站私密付款之介紹: [私密付款 :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## 付款掩蔽服務 +防護下列威脅: + +- [:material-account-search: 公共曝露](basics/common-threats.md#limiting-public-information ""){.pg-green} + 有許多服務提供“虛擬簽帳卡” ,在線商家接受此種付款方式則在大多數情況下不會透露您實際銀行或帳單信息。 請注意,這些金融服務 **並不是** 匿名,且受「了解您的客戶」( KYC )法律的約束,並可能需要客戶身份證明文件或其他識別信息。 這些服務主要保護您免受商家資料洩露、營銷機構粗糙的跟蹤或購買聯結以及線上資料盜竊;這些並 **不能** 在購買時完全匿名。
@@ -67,6 +75,10 @@ MySudo 虛擬卡目前只能在其 iOS應用上使用。 ## 禮品卡市集 +防護下列威脅: + +- [:material-eye-outline: 大規模監控](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + 這些服務可接受 [加密貨幣](cryptocurrency.md)來購買各種商家禮品卡。 其中一些服務提供更高限額的身份驗證選項,它們也只淮許有電子郵件地址的帳戶。 基本帳戶的限額通常從每天 5,000 到 10,000 美元不等,經過身份驗證的帳戶限額會高很多(如果您選擇提供的話)。 ### Coincards @@ -85,7 +97,6 @@ MySudo 虛擬卡目前只能在其 iOS應用上使用。
- ### 標準 **請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 diff --git a/i18n/zh-Hant/frontends.md b/i18n/zh-Hant/frontends.md index 56cc1a28..45b60d96 100644 --- a/i18n/zh-Hant/frontends.md +++ b/i18n/zh-Hant/frontends.md @@ -5,11 +5,15 @@ description: 這些用在各式網際網路服務的開源前端,可讓您訪 cover: frontends.webp --- -有時,某些服務會以煩人的彈出窗口來封鎖訪問內容,強迫訪客須註冊帳戶。 如果不啓用JavaScript ,也可能會中斷。 這些前端可以讓您避開這些限制。 +防護下列威脅: + +- [:material-account-cash: 監控資本主義](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +有時,某些服務會以煩人的彈出窗口來封鎖訪問內容,強迫訪客須註冊帳戶。 如果不啓用JavaScript ,也可能會中斷。 These frontends can allow you to circumvent these restrictions. 如您選擇自行託管這些前端,要緊的是讓別人可以使用您的實例,才能讓您融入其中。 您應該謹慎處理託管的地點和方式,因為其他人如何使用將會影響到您的託管。 -當您使用其它人的伺服器,請確認有細讀此伺服器的隱私權政策。 它們可以任擁有者修改因此不必然反映原本預設的政策。 有些伺服器使用 [Tor](tor.md) .onion地址,只要您的搜尋查詢不包含PII ,這些地址可以保護您的某些隱私。 +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). 它們可以任擁有者修改因此不必然反映原本預設的政策。 Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,14 +23,12 @@ cover: frontends.webp ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** 是 [Reddit](https://reddit.com) 的開源前端,也可自行託管。 +**Redlib** 是 [Reddit](https://reddit.com) 的開源前端,也可自行託管。 You can access Redlib through a number of public instances. -有許多公開伺服器,其中一些伺服器支援 [Tor](tor.md) 洋蔥服務。 - -[:octicons-repo-16: 儲存庫](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="公開伺服器清單"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="原始碼" } +[:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ cover: frontends.webp

溫馨提示

如果想在瀏覽器中禁用 JavaScript ,例如 [Tor瀏覽器](tor.md#tor-browser/) 的 最安全級別, Redlib 非常實用。 +
## TikTok @@ -53,11 +56,11 @@ cover: frontends.webp **ProxiTok** 是 [TikTok](https://tiktok.com)網站的開源前端,也可自主託管。 -有許多公開伺服器,其中一些伺服器支援 [Tor](tor.md) 洋蔥服務。 +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ cover: frontends.webp ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** 是 [YouTube](https://youtube.com)的免費開源桌面應用程式。 使用 FreeTube 時,訂閱清單和播放列表會在本地儲存在 本地裝置上。 - -預設情況下, FreeTube 會封鎖所有 YouTube 廣告。 此外, FreeTube 可選擇與 [SponsorBlock](https://sponsor.ajay.app) 整合,可以跳過贊助的影片段。 - -[:octicons-home-16: 首頁](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="原始碼" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=捐款 } - -
-下載 - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

警告

- -使用 FreeTube 時,YouTube、 [Invidious](https://instances.invidious.io) 或 [SponsorBlock](https://sponsor.ajay.app) 仍可能知道您的 IP 位址,具體取決於您的設定。 如果您的 [威脅模型](basics/threat-modeling.md) 需要隱藏您的IP 位址,請考慮使用 [VPN](vpn.md) 或 [Tor](tor.md)。 - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** 是 iOS、tvOS 和 macOS 適用於 [YouTube](https://youtube.com) 的自由、開放原始碼、以隱私為重點的影片播放器。 使用 Yattee 時,您的訂閱清單會儲存在本機裝置上。 - -由於 App Store 的限制,您需要採取一些 [額外步驟](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) ,才能使用 Yattee 觀看 YouTube。 - -[:octicons-home-16: 首頁](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="原始碼" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=捐款 } - -
-下載 - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

警告

- -使用 Yattee 時,您的 IP位址 可能仍會被 YouTube、 [Invidious](https://instances.invidious.io) 、 [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) 或 [SponsorBlock](https://sponsor.ajay.app) 所知曉,具體取決於您的設定。 如果您的 [威脅模型](basics/threat-modeling.md) 需要隱藏您的IP 位址,請考慮使用 [VPN](vpn.md) 或 [Tor](tor.md)。 - -
- -預設情況下, Yattee 會封鎖所有 YouTube 廣告。 此外, Yattee 可選擇與 [SponsorBlock](https://sponsor.ajay.app) 整合,可以跳過贊助的影片段。 - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** 是一款免費的 [YouTube](https://youtube.com)開源Android應用程序,使用 [Piped](# piped) API。 - -LibreTube 可將訂閱列表和播放列表存儲於 Android 設備,或者存儲到您選擇的 Piped 實例帳戶,以便利用其他設備無縫訪問。 - -[:octicons-home-16: 首頁](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="原始碼" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=捐款 } - -
-下載 - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

警告

- -使用 LibreTube 時,IP 位址會為所用的 [Piped](https://github.com/TeamPiped/Piped/wiki/Instances)實例和 [SponsorBlock](https://sponsor.ajay.app)看見,具體取決於您的設定。 如果您的 [威脅模型](basics/threat-modeling.md) 需要隱藏您的IP 位址,請考慮使用 [VPN](vpn.md) 或 [Tor](tor.md)。 - -
- -預設情況下, LibreTube 會封鎖所有 YouTube 廣告。 此外, LibreTube 利用[SponsorBlock](https://sponsor.ajay.app) 來跳過贊助的影片段。 可以自行配置 SponsorBlock 要跳過的影片段類型,或完全禁用它。 播放器上有一個按鈕,如果需要,可以為特定影片禁用它。 - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** 是自由及開放原始碼的 Android 應用程式,可用於觀看 [YouTube](https://youtube.com)、 [SoundCloud](https://soundcloud.com)、 [media.ccc.de](https://media.ccc.de)、 [Bandcamp](https://bandcamp.com)和 [PeerTube](https://joinpeertube.org) (1)。 - -訂閱清單和播放列表會儲存在本地的 Android 裝置上。 - -[:octicons-home-16: 首頁](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="原始碼" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=捐款 } - -
-下載 - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. 預設伺服器為 [FramaTube](https://framatube.org),但可在 **設定** → **內容** → **PeerTube 站臺** 添加更多伺服器。 - -
-

警告

- -使用NewPipe時,IP 位址會被所使用的影片供應商看見。 如果您的 [威脅模型](basics/threat-modeling.md) 需要隱藏您的IP 位址,請考慮使用 [VPN](vpn.md) 或 [Tor](tor.md)。 - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ LibreTube 可將訂閱列表和播放列表存儲於 Android 設備,或者存 **Invidious** 是 [YouTube](https://youtube.com)的免費開源前端,也可自行託管。 -有許多公開伺服器,其中一些伺服器支援 [Tor](tor.md) 洋蔥服務。 +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. -[:octicons-home-16: 首頁](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="公開伺服器清單"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="原始碼" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=捐款 } +[:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -257,11 +123,11 @@ LibreTube 可將訂閱列表和播放列表存儲於 Android 設備,或者存 Piped 需要 JavaScript 才能運行,它有許多公共伺服器。 -[:octicons-repo-16: 儲存庫](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="公開伺服器清單"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="原始碼" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=捐款 } +[:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped 需要 JavaScript 才能運行,它有許多公共伺服器。 +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** 是 [YouTube](https://youtube.com)的免費開源桌面應用程式。 FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +使用 FreeTube 時,訂閱清單和播放列表會在本地儲存在 本地裝置上。 + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+下載 + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

警告

+ +使用 FreeTube 時,YouTube、 [Invidious](https://instances.invidious.io) 或 [SponsorBlock](https://sponsor.ajay.app) 仍可能知道您的 IP 位址,具體取決於您的設定。 如果您的 [威脅模型](basics/threat-modeling.md) 需要隱藏您的IP 位址,請考慮使用 [VPN](vpn.md) 或 [Tor](tor.md)。 + +
+ +預設情況下, FreeTube 會封鎖所有 YouTube 廣告。 In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** 是 iOS、tvOS 和 macOS 適用於 [YouTube](https://youtube.com) 的自由、開放原始碼、以隱私為重點的影片播放器。 Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +使用 Yattee 時,您的訂閱清單會儲存在本機裝置上。 + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+下載 + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

警告

+ +使用 Yattee 時,您的 IP位址 可能仍會被 YouTube、 [Invidious](https://instances.invidious.io) 、 [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) 或 [SponsorBlock](https://sponsor.ajay.app) 所知曉,具體取決於您的設定。 如果您的 [威脅模型](basics/threat-modeling.md) 需要隱藏您的IP 位址,請考慮使用 [VPN](vpn.md) 或 [Tor](tor.md)。 + +
+ +預設情況下, Yattee 會封鎖所有 YouTube 廣告。 此外, Yattee 可選擇與 [SponsorBlock](https://sponsor.ajay.app) 整合,可以跳過贊助的影片段。 + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** 是一款免費的 [YouTube](https://youtube.com)開源Android應用程序,使用 [Piped](# piped) API。 + +訂閱清單和播放列表會儲存在本地的 Android 裝置上。 + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+下載 + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

警告

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. 如果您的 [威脅模型](basics/threat-modeling.md) 需要隱藏您的IP 位址,請考慮使用 [VPN](vpn.md) 或 [Tor](tor.md)。 + +
+ +預設情況下, LibreTube 會封鎖所有 YouTube 廣告。 此外, LibreTube 利用[SponsorBlock](https://sponsor.ajay.app) 來跳過贊助的影片段。 可以自行配置 SponsorBlock 要跳過的影片段類型,或完全禁用它。 播放器上有一個按鈕,如果需要,可以為特定影片禁用它。 + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** 是自由及開放原始碼的 Android 應用程式,可用於觀看 [YouTube](https://youtube.com)、 [SoundCloud](https://soundcloud.com)、 [media.ccc.de](https://media.ccc.de)、 [Bandcamp](https://bandcamp.com)和 [PeerTube](https://joinpeertube.org) (1)。 + +訂閱清單和播放列表會儲存在本地的 Android 裝置上。 + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+下載 + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

警告

+ +使用NewPipe時,IP 位址會被所使用的影片供應商看見。 如果您的 [威脅模型](basics/threat-modeling.md) 需要隱藏您的IP 位址,請考慮使用 [VPN](vpn.md) 或 [Tor](tor.md)。 + +
+ ## 標準 **請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 -推薦的前端… - -- 必須是開源軟體。 -- 必須可自行託管。 -- 必須提供匿名訪客完整的網站基本功能。 - 我們只會在平台符合下列條件之一時,才會考慮前端: - 通常只有在啟用 JavaScript 的情況下才能存取。 - 通常必須登入帳戶才能存取。 - 封鎖商業 [VPN](vpn.md) 的存取。 + +推薦的前端… + +- 必須是開源軟體。 +- 必須可自行託管。 +- 必須提供匿名訪客完整的網站基本功能。 diff --git a/i18n/zh-Hant/language-tools.md b/i18n/zh-Hant/language-tools.md index 7dc99f3a..95926120 100644 --- a/i18n/zh-Hant/language-tools.md +++ b/i18n/zh-Hant/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp 防護下列威脅: - [:material-server-network: 服務提供商](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: 大規模監控](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: 監控資本主義](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: 審查](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -輸入至文法、拼字和樣式檢查器以及翻譯服務的文字可能包含敏感資訊,這些資訊可能無限期地儲存在伺服器上。 本頁面列出的語言工具不會將您提交的文字傳送到伺服器,且能自行託管並離線使用,以最大程度地控制您的資料。 +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. 本頁面列出的語言工具不會將您提交的文字傳送到伺服器,且能自行託管並離線使用,以最大程度地控制您的資料。 ## LanguageTool diff --git a/i18n/zh-Hant/mobile-browsers.md b/i18n/zh-Hant/mobile-browsers.md index 6bdb417c..81acb858 100644 --- a/i18n/zh-Hant/mobile-browsers.md +++ b/i18n/zh-Hant/mobile-browsers.md @@ -61,11 +61,11 @@ Brave 基於 Chromium 瀏覽器專案構建,因此它應該令人感到熟悉 [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="原始碼" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
@@ -75,70 +75,110 @@ Brave 基於 Chromium 瀏覽器專案構建,因此它應該令人感到熟悉 Tor 瀏覽器是真正匿名瀏覽網際網路的唯一途徑。 當您使用 Brave 時,我們建議您更改以下設定,以保護您的隱私免受某些影響,但除了 [Tor 瀏覽器](tor.md#tor-browser)以外的所有瀏覽器都可能以某種方式或另一種方式被 *某人* 追蹤。 -這些選項可以在 :material-menu: → **設定** → **Brave 防護與安全性** 中找到 +=== "Android" -#### 防護 + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. + +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. + +#### Brave shields global defaults Brave 的[防護](https://support.brave.com/hc/articles/360022973471-What-is-Shields)功能包含一些防指紋識別措施。 我們建議在您訪問的所有網頁上[全域](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings)套用這些設定。 -#### Brave shields 全域預設值 - 防護功能的選項可以根據各網站需要依情況降級,但我們建議預設使用以下設定: -
+=== "Android" -- [x] 在 **封鎖追蹤器與廣告** 下選擇 **積極** +
-
-使用預設過濾器清單 + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave 允許您在內部網頁 brave://settings/shields/filters 內選擇額外的內容過濾器。 我們建議您不要使用此功能;請保留預設的篩選條件清單。 使用額外清單將使您在一般 Brave 用戶中被突顯出來,如果Brave有漏洞,並將惡意規則添加到您使用的清單中,也可能會增加攻擊面。 +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. 我們建議您不要使用此功能;請保留預設的篩選條件清單。 使用額外清單將使您在一般 Brave 用戶中被突顯出來,如果Brave有漏洞,並將惡意規則添加到您使用的清單中,也可能會增加攻擊面。 -- [x] 勾選 **自動重新導向 AMP 頁面** -- [x] 勾選 **自動重新導向追蹤 URL** -- [x] 將 **升級連線至 HTTPS** 設定為 **要求所有連線使用 HTTPS (嚴格)** -- [x] (可選) 勾選 **阻擋指令稿** (1) -- [x] 將 **封鎖 Cookies** 設定為 **封鎖第三方 Cookie** -- [x] 勾選 **封鎖指紋識別** -- [x] 勾選 **透過語言設定防止指紋識別攻擊** +
-
+ - [x] Select **Forget me when I close this site** -1. 此選項提供的功能類似於 uBlock Origin 的 進階[封鎖模式](https://github.com/gorhill/uBlock/wiki/Blocking-mode) 或 [NoScript](https://noscript.net) 擴充功能。 +
-#### 清除瀏覽資料 + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. 我們建議您不要使用此功能;請保留預設的篩選條件清單。 使用額外清單將使您在一般 Brave 用戶中被突顯出來,如果Brave有漏洞,並將惡意規則添加到您使用的清單中,也可能會增加攻擊面。 + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] 勾選 **結束時清除資料** -#### 封鎖社交媒體 +##### Social Media Blocking (Android only) - [ ] 取消勾選所有社交媒體元件 #### 其他隱私設定 -
+=== "Android" -- [x] 將 [WebRTC IP 處理政策](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) 設定為 **停用非代理 UDP** -- [x] (可選) 將 **安全瀏覽** 設定為 **無防護** (1) -- [ ] 取消勾選 **允許網站檢查是否有已儲存的付款方式** -- [ ] 取消勾選 **IPFS 閘道器** (2) -- [x] 勾選 **退出時關閉分頁** -- [ ] 取消勾選 **允許保護私隱的產品分析 (P3A)** -- [ ] 取消勾選 **自動傳送診斷報告** -- [ ] 取消勾選 **自動傳送每日使用 ping 到 Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] 取消勾選 **允許保護私隱的產品分析 (P3A)** + - [ ] 取消勾選 **自動傳送診斷報告** + - [ ] 取消勾選 **自動傳送每日使用 ping 到 Brave** -1. Brave 在 Android 上[實作的 安全瀏覽](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) **不會**像電腦版一樣代理 [安全瀏覽服務 的網路請求](https://developers.google.com/safe-browsing/v4/update-api#checking-urls)。 這表示 Google 可能會看到 (並記錄) 您的 IP 位址。 請注意,安全瀏覽功能不適用於沒有 Google Play 服務的 Android 裝置。 -2. 星際檔案系統 (InterPlanetary File System,縮寫為 IPFS) 是一個旨在實現檔案的分散式儲存、共享和持久化的網路傳輸協定。 除非您使用此功能,否則停用它。 +
+ + 1. Brave 在 Android 上[實作的 安全瀏覽](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) **不會**像電腦版一樣代理 [安全瀏覽服務 的網路請求](https://developers.google.com/safe-browsing/v4/update-api#checking-urls)。 這表示 Google 可能會看到 (並記錄) 您的 IP 位址。 請注意,安全瀏覽功能不適用於沒有 Google Play 服務的 Android 裝置。 + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] 取消勾選 **自動傳送每日使用 ping 到 Brave** ### Leo -這些選項可以在 :material-menu: **設定** → **Leo** 中找到。 +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] 取消選擇 **在網址列顯示自動完成建議** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave 同步 diff --git a/i18n/zh-Hant/office-suites.md b/i18n/zh-Hant/office-suites.md index 45b5b74b..cb057cdb 100644 --- a/i18n/zh-Hant/office-suites.md +++ b/i18n/zh-Hant/office-suites.md @@ -5,6 +5,10 @@ description: 這些辦公軟體套件提供完整的功能,無需帳號且可 cover: office-suites.webp --- +防護下列威脅: + +- [:material-server-network: 服務提供商](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + 選擇不需要登入帳戶即可使用完整功能的**辦公軟體套件**。 這裡列出的工具可以離線使用,而且可以合理地取代 Microsoft Office 來滿足大多數的需求。 ## LibreOffice diff --git a/i18n/zh-Hant/os/android-overview.md b/i18n/zh-Hant/os/android-overview.md index 0e29f2ce..c855fd91 100644 --- a/i18n/zh-Hant/os/android-overview.md +++ b/i18n/zh-Hant/os/android-overview.md @@ -95,21 +95,31 @@ Android 13: ### 用戶設定檔 -多重使用者設定檔可在 **設定** → **系統** → **多重使用者** 中找到,是 Android 中最簡單的隔離方式。 +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -透過使用者設定檔,可對特定使用者施加限制,例如:打電話、使用簡訊或在裝置上安裝應用程式。 每個用戶設定檔皆使用個自密鑰加密,無法訪問設置上其它用戶的任何資料。 即使是裝置擁有者也無法在不知道用戶密碼的情況下查看其他身份的資料。 多用戶配置設定是一種更安全的隔離方法。 +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. 每個用戶設定檔皆使用個自密鑰加密,無法訪問設置上其它用戶的任何資料。 即使是裝置擁有者也無法在不知道用戶密碼的情況下查看其他身份的資料。 多用戶配置設定是一種更安全的隔離方法。 ### 工作用設定檔 -[工作用設定檔](https://support.google.com/work/android/answer/6191949) 是另一個隔離個別應用的方法,也比單獨的用戶設定檔更為方便。 +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. 在沒有企業 MDM 的情況下,必須使用 [Shelter](../android/general-apps.md#shelter) 等**裝置控制器**應用程式才能建立工作設定檔,除非您使用的是包含企業 MDM 的自訂 Android 作業系統。 工作設定檔依賴裝置控制器才能運作。 *檔案穿梭*、*連絡人搜尋封鎖*等功能或任何種類的隔離功能都必須由控制器執行。 您也必須完全信任裝置控制器應用程式,因為它可以完全存取您在工作設定檔內的資料。 -此方法的安全性通常比第二使用者設定檔低,但卻可讓您同時在工作和個人設定檔中執行應用程式,非常方便。 +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + + + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. diff --git a/i18n/zh-Hant/pastebins.md b/i18n/zh-Hant/pastebins.md index 7439b5e4..b63f3b56 100644 --- a/i18n/zh-Hant/pastebins.md +++ b/i18n/zh-Hant/pastebins.md @@ -5,6 +5,10 @@ description: 這些工具可讓您完全控制您分享給其他方的任何貼 cover: pastebins.webp --- +防護下列威脅: + +- [:material-server-network: 服務提供商](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) 是線上服務,最常用於以方便有效的方式分享大型程式碼區塊。 此處列出的 Pastebins 採用用戶端加密和密碼保護貼上的內容;這兩項功能都可防止網站或伺服器操作員閱讀或存取任何貼上的內容。 ## PrivateBin diff --git a/i18n/zh-Hant/real-time-communication.md b/i18n/zh-Hant/real-time-communication.md index 37aea789..1ed36572 100644 --- a/i18n/zh-Hant/real-time-communication.md +++ b/i18n/zh-Hant/real-time-communication.md @@ -213,7 +213,7 @@ Briar 利用[^1] Bramble[Handshake](https://code.briarproject.org/briar/briar-sp 個人資料圖片、反應和暱稱不會加密。 -群組語音和視訊通話 [並非](https://github.com/vector-im/element-web/issues/12878) E2EE ,而是使用 Jitsi ,但這將會隨著 [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401) 而改變。 群組通話目前 [沒有驗證](https://github.com/vector-im/element-web/issues/13074) ,因此其它人員也可以加入。 我們建議您不要將此功能用於私人會議。 +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. Matrix協議本身 [理論上支援前向保密](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1] ,但 [目前在 Element 中並不支援](https://github.com/vector-im/element-web/issues/7101) ,因為這會破壞某些方面的使用者體驗,例如金鑰備份和共用訊息歷史記錄。 diff --git a/i18n/zh-Hant/router.md b/i18n/zh-Hant/router.md index ceb1f143..32dc2569 100644 --- a/i18n/zh-Hant/router.md +++ b/i18n/zh-Hant/router.md @@ -5,7 +5,12 @@ description: 能保護路由器或 Wi-Fi 存取點安全的替代作業系統。 cover: router.webp --- -以下是一些替代操作系統,可用於路由器, Wi-Fi接入點等。 +防護下列威脅: + +- [:material-account-cash: 監控資本主義](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: 被動攻擊](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/zh-Hant/search-engines.md b/i18n/zh-Hant/search-engines.md index fd1b50c3..546ae7c7 100644 --- a/i18n/zh-Hant/search-engines.md +++ b/i18n/zh-Hant/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +防護下列威脅: + +- [:material-account-cash: 監控資本主義](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + 使用不會根據您的搜尋紀錄建立廣告檔案的 **搜尋引擎** 。 ## 推薦的提供商 diff --git a/i18n/zh-Hant/tools.md b/i18n/zh-Hant/tools.md index 0ebae9df..9ab5c882 100644 --- a/i18n/zh-Hant/tools.md +++ b/i18n/zh-Hant/tools.md @@ -31,15 +31,6 @@ description: Privacy Guides 社群所推薦的隱私工具、服務、軟體及 -
-

威脅模型標籤

- -您可以在某些推薦頁面上找到以下任何圖示: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -我們正在測試一項新功能,讓讀者能更好地辨識和瞭解隱私工具最能防禦的威脅種類。 請在論壇上回覆有關此功能的專屬 [主題](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659) ,讓我們知道您對此功能的看法! - -
- ## 尊重隱私的瀏覽器
diff --git a/i18n/zh/about.md b/i18n/zh/about.md index 043f602f..9bd52282 100644 --- a/i18n/zh/about.md +++ b/i18n/zh/about.md @@ -143,7 +143,7 @@ Our team members review all changes made to the website and direct the course of — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022) and [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://wired.com/story/firefox-mozilla-2022), [Fast Company](https://fastcompany.com/91167564/mozilla-wants-you-to-love-firefox-again) and [404 Media](https://404media.co/privacy-service-optery-faces-backlash-after-plan-to-send-openai-user-data). ## History diff --git a/i18n/zh/android/general-apps.md b/i18n/zh/android/general-apps.md index be63f38e..3e888eb7 100644 --- a/i18n/zh/android/general-apps.md +++ b/i18n/zh/android/general-apps.md @@ -24,10 +24,16 @@ schema: robots: nofollow, max-snippet:-1, max-image-preview:large --- +Protects against the following threat(s): + +- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange } + We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality. ### Shelter +If your device is on Android 15 or greater, we recommend using the native [Private Space](../os/android-overview.md#private-space) feature instead, which provides nearly the same functionality without needing to place trust in and grant powerful permissions to a third-party app. +
![Shelter logo](../assets/img/android/shelter.svg){ align=right } @@ -45,14 +51,18 @@ Shelter supports blocking contact search cross profiles and sharing files across

警告

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). - When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.
+Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). + ### Secure Camera +Protects against the following threat(s): + +- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green } +
![Secure camera logo](../assets/img/android/secure_camera.svg#only-light){ align=right } @@ -96,7 +106,6 @@ The image orientation metadata is not deleted. If you enable location (in Secure Protects against the following threat(s): - [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } -- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
diff --git a/i18n/zh/browser-extensions.md b/i18n/zh/browser-extensions.md index cff6f8df..b88071af 100644 --- a/i18n/zh/browser-extensions.md +++ b/i18n/zh/browser-extensions.md @@ -70,7 +70,6 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
diff --git a/i18n/zh/cloud.md b/i18n/zh/cloud.md index 9f722522..815a4a45 100644 --- a/i18n/zh/cloud.md +++ b/i18n/zh/cloud.md @@ -117,7 +117,7 @@ Peergos is primarily a web app, but you can self-host the server either as a loc Running a local version of Peergos alongside a registered account on their paid, hosted service allows you to access your Peergos storage without any reliance on DNS or TLS certificate authorities, and keep a copy of your data backed up to their cloud. The user experience should be the same whether you run their desktop server or just use their hosted web interface. -Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in September 2019, and all found issues were subsequently fixed. +Peergos was [audited](https://cure53.de/pentest-report_peergos.pdf) by Cure53 in June 2019, and all found issues were subsequently fixed. An Android app is not available but it is [in the works](https://discuss.privacyguides.net/t/peergos-private-storage-sharing-social-media-and-application-platform/11825/25). The current workaround is to use the mobile [PWA](https://peergos.net) instead. diff --git a/i18n/zh/data-redaction.md b/i18n/zh/data-redaction.md index 54a7bbfb..db4c673f 100644 --- a/i18n/zh/data-redaction.md +++ b/i18n/zh/data-redaction.md @@ -6,6 +6,10 @@ description: Use these tools to remove metadata like GPS location and other iden cover: data-redaction.webp --- +Protects against the following threat(s): + +- [:material-account-search: 公开曝光](basics/common-threats.md#limiting-public-information ""){.pg-green} + 共享文件时,请务必删除关联的元数据。 图像文件通常包括 [Exif](https://en.wikipedia.org/wiki/Exif) 数据。 照片有时甚至包括文件元数据中的GPS坐标。 ## 电脑版 diff --git a/i18n/zh/desktop-browsers.md b/i18n/zh/desktop-browsers.md index 7df3dc97..0eb66c76 100644 --- a/i18n/zh/desktop-browsers.md +++ b/i18n/zh/desktop-browsers.md @@ -179,7 +179,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug 这可以保护您免受持久性cookies的影响,但不能保护您免受在任何一个浏览会话中获得的cookies的影响。 启用该功能后,只需重新启动火狐浏览器,就可以轻松清理浏览器的cookies。 如果你希望在你经常访问的特定网站上保持登录状态,你可以在每个网站的基础上设置例外。 -##### 遥测 +##### Telemetry - [ ] 取消勾选 **允许火狐浏览器向Mozilla发送技术和互动数据** - [ ] 取消勾选 **允许Firefox安装和运行研究** @@ -286,7 +286,7 @@ Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave% -#### 盾 +#### Shields Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. @@ -312,8 +312,8 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode). -2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. +1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. +2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. @@ -323,7 +323,7 @@ Brave allows you to select additional content filters within the internal `brave - [x] Select **Don't allow sites to use the V8 optimizer** under *Security* → *Manage V8 security* (1) - [x] Select **Automatically remove permissions from unused sites** under *Sites and Shields Settings* -- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [x] Select **Disable non-proxied UDP** under [*WebRTC IP Handling Policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [x] Select **Auto-redirect AMP pages** - [x] Select **Auto-redirect tracking URLs** @@ -362,7 +362,6 @@ Brave 的 Web3 功能可能会增加浏览器指纹和攻击面。 Unless you us - Select **Extensions (no fallback)** under *Default Ethereum wallet* - Select **Extensions (no fallback)** under *Default Solana wallet* -- Set *Method to resolve IPFS resources* to **Disabled** @@ -384,7 +383,7 @@ Brave 的 Web3 功能可能会增加浏览器指纹和攻击面。 Unless you us -#### Brave 同步 +#### Brave Sync [Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. @@ -398,10 +397,6 @@ Brave 的 Web3 功能可能会增加浏览器指纹和攻击面。 Unless you us -## 其它资源 - - - ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/zh/desktop.md b/i18n/zh/desktop.md index 52c028cb..262b559e 100644 --- a/i18n/zh/desktop.md +++ b/i18n/zh/desktop.md @@ -5,6 +5,10 @@ description: 由于隐私保护和软件自由,Linux发行版被普遍推荐 cover: desktop.webp --- +Protects against the following threat(s): + +- [:material-account-cash: 监视资本主义](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + 由于隐私保护和软件自由,Linux发行版被普遍推荐。 如果你还没有使用Linux,下面是我们建议尝试的一些发行版,以及一些适用于许多Linux发行版的一般隐私和安全改进提示。 - [安卓概况 :material-arrow-right-drop-circle:](os/linux-overview.md) @@ -69,7 +73,7 @@ Arch Linux有一个滚动的发布周期。 没有固定的发布时间表,软 作为一个 DIY 发行版,您需要 [自行设置并维护您的](os/linux-overview.md#arch-based-distributions) 系统。 Arch有一个 [官方安装程序](https://wiki.archlinux.org/title/Archinstall) ,使安装过程更容易一些。 -[Arch Linux的很大一部分软件包](https://reproducible.archlinux.org) ,都是 [,可复制的](https://reproducible-builds.org)。 +A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org)[^1]. ## Atomic Distributions @@ -125,7 +129,7 @@ The Nix package manager uses a purely functional language—which is also called [Nixpkgs](https://github.com/nixos/nixpkgs) (the main source of packages) are contained in a single GitHub repository. You can also define your own packages in the same language and then easily include them in your config. -Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible, which can be useful as a safeguard against [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. +Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible. Binaries built with this method are reproducible[^1]. ## 以匿名为重点的发行版 @@ -135,7 +139,7 @@ Nix is a source-based package manager; if there’s no pre-built available in th ![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right } -**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. 它的目的是在互联网上提供隐私、安全和匿名性。 Whonix最好与[Qubes OS](#qubes-os)一起使用。 +**Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } on the internet. Whonix最好与[Qubes OS](#qubes-os)一起使用。 [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } @@ -158,7 +162,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh ![Tails标志](assets/img/linux-desktop/tails.svg){ align=right } -**Tails**是一个基于Debian的实时操作系统,它通过Tor路由所有的通信,它可以从DVD、U盘或SD卡安装在几乎任何电脑上启动。 它使用 [Tor](tor.md)来保护隐私和匿名,同时规避审查制度,而且在关闭电源后,它不会在其使用的计算机上留下任何痕迹。 +**Tails**是一个基于Debian的实时操作系统,它通过Tor路由所有的通信,它可以从DVD、U盘或SD卡安装在几乎任何电脑上启动。 It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} @@ -183,6 +187,10 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte ## 以安全为重点的发行版 +Protects against the following threat(s): + +- [:material-bug-outline: 被动攻击](basics/common-threats.md#security-and-privacy ""){.pg-orange} + ### Qubes操作系统
@@ -202,7 +210,7 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
-Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system. +Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised via an exploit in a [:material-target-account: Targeted Attack](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}, the extra isolation is likely to protect the rest of the *qubes* and the core system. For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page. @@ -242,3 +250,5 @@ Choosing a Linux distro that is right for you will come down to a huge variety o - Maintaining an operating system is a major challenge, and smaller projects have a tendency to make more avoidable mistakes, or delay critical updates (or worse, disappear entirely). We lean towards projects which will likely be around 10 years from now (whether that's due to corporate backing or very significant community support), and away from projects which are hand-built or have a small number of maintainers. In addition, [our standard criteria](about/criteria.md) for recommended projects still applies. **Please note we are not affiliated with any of the projects we recommend.** + +[^1]: Reproducibility entails the ability to verify that packages and binaries made available to the end user match the source code, which can be useful against potential [:material-package-variant-closed-remove: Supply Chain Attacks](basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}. diff --git a/i18n/zh/encryption.md b/i18n/zh/encryption.md index 4a197681..debcd759 100644 --- a/i18n/zh/encryption.md +++ b/i18n/zh/encryption.md @@ -78,6 +78,8 @@ Cryptomator's documentation details its intended [security target](https://docs.
+Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Picocrypt.Audit.Report.pdf) by Radically Open Security in August 2024, and [most](https://github.com/Picocrypt/Picocrypt/issues/32#issuecomment-2329722740) of the issues found in the audit were subsequently fixed. + ### VeraCrypt (磁盘) Protects against the following threat(s): diff --git a/i18n/zh/file-sharing.md b/i18n/zh/file-sharing.md index 5c8b82b6..128dce8a 100644 --- a/i18n/zh/file-sharing.md +++ b/i18n/zh/file-sharing.md @@ -143,7 +143,6 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) - [:fontawesome-brands-windows: Windows](https://syncthing.net/downloads) - [:simple-apple: macOS](https://syncthing.net/downloads) - [:simple-linux: Linux](https://syncthing.net/downloads) diff --git a/i18n/zh/financial-services.md b/i18n/zh/financial-services.md index bd24c50a..2ad2be88 100644 --- a/i18n/zh/financial-services.md +++ b/i18n/zh/financial-services.md @@ -5,12 +5,20 @@ cover: financial-services.webp description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today. --- +Protects against the following threat(s): + +- [:material-account-cash: 监视资本主义](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: [Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## Payment Masking Services +Protects against the following threat(s): + +- [:material-account-search: 公开曝光](basics/common-threats.md#limiting-public-information ""){.pg-green} + There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
@@ -67,6 +75,10 @@ MySudo's virtual cards are currently only available via their iOS app. ## Gift Card Marketplaces +Protects against the following threat(s): + +- [:material-eye-outline: 大规模监控](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} + These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, with significantly higher limits for ID verified accounts (if offered). ### Coincards @@ -85,7 +97,6 @@ These services allow you to purchase gift cards for a variety of merchants onlin
- ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/zh/frontends.md b/i18n/zh/frontends.md index 537d38e5..9e423d05 100644 --- a/i18n/zh/frontends.md +++ b/i18n/zh/frontends.md @@ -5,11 +5,15 @@ description: These open-source frontends for various internet services allow you cover: frontends.webp --- -有时,一些服务会用烦人的弹窗阻止你访问内容,以此来强迫你注册账户。 此时如果停用JavaScript网站也会崩溃。 这些前端应用可以帮助你绕过这些限制。 +Protects against the following threat(s): + +- [:material-account-cash: 监视资本主义](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + +有时,一些服务会用烦人的弹窗阻止你访问内容,以此来强迫你注册账户。 此时如果停用JavaScript网站也会崩溃。 These frontends can allow you to circumvent these restrictions. If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting. -When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses which may grant some privacy as long as your search queries don't contain PII. +When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance (if available). They can be modified by their owners and therefore may not reflect the default policy. Some instances have [Tor](tor.md) .onion addresses, which may grant some privacy as long as your search queries don't contain personally identifiable information. ## Reddit @@ -19,13 +23,11 @@ When you are using an instance run by someone else, make sure to read the privac ![Redlib logo](assets/img/frontends/redlib.svg){ align=right } -**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. - -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +**Redlib** is an open-source frontend to the [Reddit](https://reddit.com) website that is also self-hostable. You can access Redlib through a number of public instances. [:octicons-repo-16: Repository](https://github.com/redlib-org/redlib){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/redlib-org/redlib-instances/blob/main/instances.md){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/redlib-org/redlib?tab=readme-ov-file#table-of-contents){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
@@ -41,6 +43,7 @@ The [Old Reddit](https://old.reddit.com) website doesn't require as much JavaScr

Tip

Redlib is useful if you want to disable JavaScript in your browser, such as [Tor Browser](tor.md#tor-browser) on the Safest security level. +
## TikTok @@ -53,11 +56,11 @@ Redlib is useful if you want to disable JavaScript in your browser, such as [Tor **ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } @@ -73,144 +76,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T ## YouTube -### FreeTube - -
- -![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } - -**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). When using FreeTube, your subscription list and playlists are saved locally on your device. - -By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } - -
-Downloads - -- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) -- [:simple-apple: macOS](https://freetubeapp.io/#download) -- [:simple-linux: Linux](https://freetubeapp.io/#download) -- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) - -
- -
- -
-

警告

- -When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -### Yattee - -
- -![Yattee logo](assets/img/frontends/yattee.svg){ align=right } - -**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list is saved locally on your device. - -You will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. - -[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute } - -
-Downloads - -- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) -- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) - -
- -
- -
-

警告

- -When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. - -### LibreTube (Android) - -
- -![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } -![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } - -**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. - -LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well. - -[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) - -
- -
- -
-

警告

- -When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
- -By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. - -### NewPipe (Android) - -
- -![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } - -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). - -Your subscription list and playlists are saved locally on your Android device. - -[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute } - -
-Downloads - -- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) - -
- -
- -1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances** - -
-

警告

- -When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. - -
+**Note:** YouTube has gradually rolled out changes to its video player and API that have thwarted some of the methods used by third-party frontends for extracting YouTube data. If you experience reliability issues with one YouTube frontend, consider trying out another that uses a different extraction method. ### Invidious @@ -221,13 +87,13 @@ When using NewPipe, your IP address will be visible to the video providers used. **Invidious** is a free and open-source frontend for [YouTube](https://youtube.com) that is also self-hostable. -There are a number of public instances, with some instances having [Tor](tor.md) onion services support. +There are a number of public instances, with some that offer a [Tor](tor.md) onion service or an [I2P](alternative-networks.md#i2p-the-invisible-internet-project) eepsite. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title="Contribute" } @@ -258,10 +124,10 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title=Documentation} +[:octicons-server-16:](https://github.com/TeamPiped/Piped/wiki/Instances){ .card-link title="Public Instances" } +[:octicons-info-16:](https://docs.piped.video/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title="Contribute" } @@ -274,18 +140,159 @@ Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) with +### FreeTube + +
+ +![FreeTube logo](assets/img/frontends/freetube.svg){ align=right } + +**FreeTube** is a free and open-source desktop application for [YouTube](https://youtube.com). FreeTube extracts data from YouTube using its built-in API based on [YouTube.js](https://github.com/LuanRT/YouTube.js) or the [Invidious](#invidious) API. You can configure either as the default, with the other serving as a fallback. + +When using FreeTube, your subscription list and playlists are saved locally on your device. + +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title="Contribute" } + +
+Downloads + +- [:fontawesome-brands-windows: Windows](https://freetubeapp.io/#download) +- [:simple-apple: macOS](https://freetubeapp.io/#download) +- [:simple-linux: Linux](https://freetubeapp.io/#download) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube) + +
+ +
+ +
+

警告

+ +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### Yattee + +
+ +![Yattee logo](assets/img/frontends/yattee.svg){ align=right } + +**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS, and macOS for [YouTube](https://youtube.com). Due to App Store restrictions, you will need to take a few [extra steps](https://web.archive.org/web/20230330122839/https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube. Yattee allows you to connect to instances of [Invidious](#invidious) or [Piped](#piped). + +When using Yattee, your subscription list is saved locally on your device. + +[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) +- [:simple-github: GitHub](https://github.com/yattee/yattee/releases) + +
+ +
+ +
+

警告

+ +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. + +### LibreTube (Android) + +
+ +![LibreTube logo](assets/img/frontends/libretube.svg#only-light){ align=right } +![LibreTube logo](assets/img/frontends/libretube-dark.svg#only-dark){ align=right } + +**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API. + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://libretube.dev){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/libre-tube/LibreTube/blob/master/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://libretube.dev/#faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/libre-tube/LibreTube#donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases) + +
+ +
+ +
+

警告

+ +When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ +By default, LibreTube blocks all YouTube advertisements. Additionally, LibreTube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired. + +### NewPipe (Android) + +
+ +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } + +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). + +Your subscription list and playlists are saved locally on your Android device. + +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://newpipe.net/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title="Contribute" } + +
+Downloads + +- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases) + +
+ +
+ +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**. + +
+

警告

+ +When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. + +
+ ## Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. -推荐的前端应用... - -- 它必须是开源软件。 -- 必须能够自托管。 -- 必须向匿名用户提供所有基本的网站功能。 - We only consider frontends if one of the following is true for a platform: - Normally only accessible with JavaScript enabled. - Normally only accessible with an account. - Blocks access from commercial [VPNs](vpn.md). + +推荐的前端应用... + +- 它必须是开源软件。 +- 必须能够自托管。 +- 必须向匿名用户提供所有基本的网站功能。 diff --git a/i18n/zh/language-tools.md b/i18n/zh/language-tools.md index b69f9ff1..15860d71 100644 --- a/i18n/zh/language-tools.md +++ b/i18n/zh/language-tools.md @@ -8,11 +8,9 @@ cover: language-tools.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. ## LanguageTool diff --git a/i18n/zh/mobile-browsers.md b/i18n/zh/mobile-browsers.md index 08756d68..b346a9b2 100644 --- a/i18n/zh/mobile-browsers.md +++ b/i18n/zh/mobile-browsers.md @@ -64,8 +64,8 @@ Brave是建立在Chromium网络浏览器项目之上的,所以它应该有熟 Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser) -- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175) +- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) @@ -75,70 +75,110 @@ Brave是建立在Chromium网络浏览器项目之上的,所以它应该有熟 Tor浏览器是匿名浏览互联网的唯一途径。 当您使用Brave时,我们建议您更改以下设置,以保护您的隐私不受某些方的侵害,但除了 [Tor浏览器](tor.md#tor-browser) 之外的所有浏览器都可以在某些方面被 *个人* 追踪。 -这些选项可以在 :material-menu: → **设置** → **Brave Shields & 隐私**中找到 +=== "Android" -#### Shields + These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**. -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. +=== "iOS" + + These options can be found in :fontawesome-solid-ellipsis: → **Settings** → **Shields & Privacy**. #### Brave shields global defaults +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. + Shields的选项可以根据需要在每个站点的基础上进行降级,但在默认情况下,我们建议设置以下内容。 -
+=== "Android" -- [x] Select **Aggressive** under **Block trackers & ads** +
-
-Use default filter lists + - [x] Select **Aggressive** under *Block trackers & ads* + - [x] Select **Auto-redirect AMP pages** + - [x] Select **Auto-redirect tracking URLs** + - [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS* + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block third-party cookies** under *Block Cookies* + - [x] Select **Block Fingerprinting** + - [x] Select **Prevent fingerprinting via language settings** -Brave allows you to select additional content filters within the internal `brave://adblock` page. 我们建议不要使用这个功能;相反,保留默认的过滤列表。 使用额外的列表会使你从其他Brave用户中脱颖而出,如果Brave中存在漏洞,恶意规则被添加到你使用的列表中,也可能增加攻击面。 +
+ Use default filter lists -
+ Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. 我们建议不要使用这个功能;相反,保留默认的过滤列表。 使用额外的列表会使你从其他Brave用户中脱颖而出,如果Brave中存在漏洞,恶意规则被添加到你使用的列表中,也可能增加攻击面。 -- [x] Select **Auto-redirect AMP pages** -- [x] Select **Auto-redirect tracking URLs** -- [x] Select **strict** under **Upgrade connections to HTTPS** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Block third-party cookies** under **Block Cookies** -- [x] Select **Block fingerprinting** -- [x] Select **Prevent fingerprinting via language settings** +
-
+ - [x] Select **Forget me when I close this site** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. +
-#### Clear browsing data + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +=== "iOS" + +
+ + - [x] Select **Aggressive** under *Trackers & Ads Blocking* + - [x] Select **Strict** under *Upgrade Connections to HTTPS* + - [x] Select **Auto-Redirect AMP pages** + - [x] Select **Auto-Redirect Tracking URLs** + - \[x\] (Optional) Select **Block Scripts** (1) + - [x] Select **Block Fingerprinting** + +
+ Use default filter lists + + Brave allows you to select additional content filters within the **Content Filtering** menu. 我们建议不要使用这个功能;相反,保留默认的过滤列表。 使用额外的列表会使你从其他Brave用户中脱颖而出,如果Brave中存在漏洞,恶意规则被添加到你使用的列表中,也可能增加攻击面。 + +
+ +
+ + 1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*. + +##### Clear browsing data (Android only) - [x] Select **Clear data on exit** -#### Social Media Blocking +##### Social Media Blocking (Android only) - [ ] 取消勾选所有社交媒体组件 #### Other privacy settings -
+=== "Android" -- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) -- [x] (Optional) Select **No protection** under **Safe Browsing** (1) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (2) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +
-
+ - [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) + - \[x\] (Optional) Select **No protection** under *Safe Browsing* (1) + - [ ] Uncheck **Allow sites to check if you have payment methods saved** + - [x] Select **Close tabs on exit** + - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** + - [ ] Uncheck **Automatically send diagnostic reports** + - [ ] Uncheck **Automatically send daily usage ping to Brave** -1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. -2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +
+ + 1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services. + +=== "iOS" + + - [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)** + - [ ] Uncheck **Automatically send daily usage ping to Brave** ### Leo -These options can be found in :material-menu: → **Settings** → **Leo** +These options can be found in :material-menu: → **Settings** → **Leo**. -- [ ] Uncheck **Show autocomplete suggestions in address bar** +
+ +- [ ] Uncheck **Show autocomplete suggestions in address bar** (1) + +
+ +1. This option is not present in Brave's iOS app. ### Brave Sync diff --git a/i18n/zh/office-suites.md b/i18n/zh/office-suites.md index cdaaf42f..e3da63b2 100644 --- a/i18n/zh/office-suites.md +++ b/i18n/zh/office-suites.md @@ -5,6 +5,10 @@ description: These office suites offer their full functionality without an accou cover: office-suites.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs. ## LibreOffice diff --git a/i18n/zh/os/android-overview.md b/i18n/zh/os/android-overview.md index da548d32..5c75aae7 100644 --- a/i18n/zh/os/android-overview.md +++ b/i18n/zh/os/android-overview.md @@ -92,19 +92,27 @@ Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/ ### 用户资料 -多个用户配置文件可以在 **设置** → **系统** → **多个用户** ,是Android中最简单的隔离方式。 +Multiple **user profiles** can be found in :gear: **Settings** → **System** → **Users** and are the simplest way to isolate in Android. -通过用户个人资料,你可以对一个特定的个人资料施加限制,如:打电话、使用短信或在设备上安装应用程序。 每个用户资料使用自己的加密密钥进行加密,不能访问任何其他人的个人资料。 即使是设备所有者,如果不知道他们的密码,也不能查看其他人的个人资料。 多个个人资料是一种更安全的隔离方法。 +With user profiles, you can impose restrictions on a specific profile, such as: making calls, using SMS, or installing apps. 每个用户资料使用自己的加密密钥进行加密,不能访问任何其他人的个人资料。 即使是设备所有者,如果不知道他们的密码,也不能查看其他人的个人资料。 多个个人资料是一种更安全的隔离方法。 ### 工作身份 -[工作配置文件](https://support.google.com/work/android/answer/6191949) 是隔离单个应用程序的另一种方式,可能比单独的用户配置文件更方便。 +[**Work Profiles**](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles. A **device controller** app such as [Shelter](../android/general-apps.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one. 该工作档案依赖于设备控制器来运作。 诸如 *文件穿梭* 和 *接触搜索封锁* 或任何种类的隔离功能必须由控制器实现。 You must also fully trust the device controller app, as it has full access to your data inside the work profile. -这种方法通常不如二级用户配置文件安全;但是,它确实允许你在工作和个人配置文件中同时运行应用程序的便利。 +This method is generally less secure than a secondary user profile; however, it does allow you the convenience of running apps in both the owner profile and work profile simultaneously. + +### Private Space + +**Private Space** is a feature introduced in Android 15 that adds another way of isolating individual apps. You can set up a private space in the owner profile by navigating to :gear: **Settings** → **Security & privacy** → **Private space**. Once set up, your private space resides at the bottom of the app drawer. + +Like user profiles, a private space is encrypted using its own encryption key, and you have the option to set up a different unlock method. Like work profiles, you can use apps from both the owner profile and private space simultaneously. Apps launched from a private space are distinguished by an icon depicting a key within a shield. + +Unlike work profiles, Private Space is a feature native to Android that does not require a third-party app to manage it. For this reason, we generally recommend using a private space over a work profile, though you can use a work profile alongside a private space. ### VPN Killswitch diff --git a/i18n/zh/pastebins.md b/i18n/zh/pastebins.md index 66d41268..7ce4f4b3 100644 --- a/i18n/zh/pastebins.md +++ b/i18n/zh/pastebins.md @@ -5,6 +5,10 @@ description: These tools allow you to have full control of any pasted data you s cover: pastebins.webp --- +Protects against the following threat(s): + +- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } + [**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste. ## PrivateBin diff --git a/i18n/zh/real-time-communication.md b/i18n/zh/real-time-communication.md index 197a44fa..797d5c11 100644 --- a/i18n/zh/real-time-communication.md +++ b/i18n/zh/real-time-communication.md @@ -213,7 +213,7 @@ Messages and files shared in private rooms (those which require an invite) are b Profile pictures, reactions, and nicknames are not encrypted. -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +With the integration of [Element Call](https://element.io/blog/we-have-lift-off-element-x-call-and-server-suite-are-ready) into Element's web app, desktop apps, and its [rewritten mobile apps](https://element.io/blog/element-x-experience-the-future-of-element), group VoIP and video calls are E2EE by default. The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. diff --git a/i18n/zh/router.md b/i18n/zh/router.md index 5465cb09..3cd9b952 100644 --- a/i18n/zh/router.md +++ b/i18n/zh/router.md @@ -5,7 +5,12 @@ description: Alternative operating systems for securing your router or Wi-Fi acc cover: router.webp --- -Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. +Protects against the following threat(s): + +- [:material-account-cash: 监视资本主义](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-bug-outline: 被动攻击](basics/common-threats.md#security-and-privacy ""){.pg-orange} + +Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. ## OpenWrt diff --git a/i18n/zh/search-engines.md b/i18n/zh/search-engines.md index 773efc96..5ae64509 100644 --- a/i18n/zh/search-engines.md +++ b/i18n/zh/search-engines.md @@ -10,6 +10,10 @@ global: - "table tbody" --- +Protects against the following threat(s): + +- [:material-account-cash: 监视资本主义](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} + Use a **search engine** that doesn't build an advertising profile based on your searches. ## 推荐的供应商 diff --git a/i18n/zh/tools.md b/i18n/zh/tools.md index 9e722c73..4f3c7058 100644 --- a/i18n/zh/tools.md +++ b/i18n/zh/tools.md @@ -31,15 +31,6 @@ If you want assistance figuring out the best privacy tools and alternative progr -
-

Threat Model Labels

- -You may find any of the following icons on some of the recommendation pages: :material-incognito: :material-target-account: :material-package-variant-closed-remove: :material-bug-outline: :material-server-network: :material-eye-outline: :material-account-cash: :material-account-search: :material-close-outline: - -We are testing a new feature that allows readers to better identify and understand the kinds of threats that privacy tools best defend against. Let us know what you think about this feature by replying to this dedicated forum [thread](https://discuss.privacyguides.net/t/implement-threat-model-labels/18659)! - -
- ## Private Web Browsers