mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-16 16:01:15 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
parent
f7fb41c11c
commit
1eb0d200c0
@ -29,7 +29,7 @@ We have these requirements in regard to developers which wish to submit their pr
|
|||||||
|
|
||||||
- Must disclose affiliation, i.e. your position within the project being submitted.
|
- Must disclose affiliation, i.e. your position within the project being submitted.
|
||||||
|
|
||||||
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage etc.
|
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage, etc.
|
||||||
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
||||||
|
|
||||||
- Must explain what the project brings to the table in regard to privacy.
|
- Must explain what the project brings to the table in regard to privacy.
|
||||||
|
@ -7,7 +7,7 @@ It takes a lot of [people](https://github.com/privacyguides/privacyguides.org/gr
|
|||||||
|
|
||||||
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
||||||
|
|
||||||
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate ""){.md-button.md-button--primary}
|
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
||||||
|
|
||||||
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2 ""){.md-button.md-button--primary}
|
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## Discourse
|
## Discourse
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s
|
|||||||
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
||||||
```
|
```
|
||||||
|
|
||||||
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS etc) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS, etc.) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
||||||
|
|
||||||
=== "Linux, macOS"
|
=== "Linux, macOS"
|
||||||
|
|
||||||
@ -118,7 +118,7 @@ When we do a DNS lookup, it's generally because we want to access a resource. Be
|
|||||||
|
|
||||||
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
||||||
|
|
||||||
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
||||||
|
|
||||||
### Server Name Indication (SNI)
|
### Server Name Indication (SNI)
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
|
|||||||
|
|
||||||
### How Do I Protect My Private Keys?
|
### How Do I Protect My Private Keys?
|
||||||
|
|
||||||
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
||||||
|
|
||||||
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
||||||
|
|
||||||
|
@ -48,7 +48,7 @@ VPNs cannot provide anonymity. Your VPN provider will still see your real IP add
|
|||||||
|
|
||||||
## What about VPN providers that provide Tor nodes?
|
## What about VPN providers that provide Tor nodes?
|
||||||
|
|
||||||
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc.), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
||||||
|
|
||||||
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr
|
|||||||
|
|
||||||
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://proton.me/drive){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
||||||
@ -44,7 +44,7 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a
|
|||||||
|
|
||||||
**Tresorit** is a Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
**Tresorit** is a Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://tresorit.com/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
@ -126,7 +126,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-
|
|||||||
|
|
||||||
### Recommended Configuration
|
### Recommended Configuration
|
||||||
|
|
||||||
These options can be found in :material-menu: → **Settings** → **Privacy & Security**.
|
These options can be found in :material-menu: → **Settings**
|
||||||
|
|
||||||
|
#### Search
|
||||||
|
|
||||||
|
- [ ] Uncheck **Provide search suggestions**
|
||||||
|
|
||||||
|
Search suggestion features may not be available in your region.
|
||||||
|
|
||||||
|
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
||||||
|
|
||||||
|
#### Privacy & Security
|
||||||
|
|
||||||
##### Enhanced Tracking Protection
|
##### Enhanced Tracking Protection
|
||||||
|
|
||||||
@ -134,6 +144,13 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S
|
|||||||
|
|
||||||
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
||||||
|
|
||||||
|
##### Firefox Suggest (US only)
|
||||||
|
|
||||||
|
[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes.
|
||||||
|
|
||||||
|
- [ ] Uncheck **Suggestions from the web**
|
||||||
|
- [ ] Uncheck **Suggestions from sponsors**
|
||||||
|
|
||||||
##### Sanitize on Close
|
##### Sanitize on Close
|
||||||
|
|
||||||
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
||||||
@ -142,14 +159,6 @@ If you want to stay logged in to particular sites, you can allow exceptions in *
|
|||||||
|
|
||||||
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
||||||
|
|
||||||
##### Search Suggestions
|
|
||||||
|
|
||||||
- [ ] Uncheck **Provide search suggestions**
|
|
||||||
|
|
||||||
Search suggestion features may not be available in your region.
|
|
||||||
|
|
||||||
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
|
||||||
|
|
||||||
##### Telemetry
|
##### Telemetry
|
||||||
|
|
||||||
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
||||||
@ -169,7 +178,7 @@ Additionally, the Firefox Accounts service collects [some technical data](https:
|
|||||||
|
|
||||||
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
||||||
|
|
||||||
### Firefox Sync
|
#### Sync
|
||||||
|
|
||||||
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
||||||
|
|
||||||
@ -212,6 +221,8 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand
|
|||||||
|
|
||||||
These options can be found in :material-menu: → **Settings**.
|
These options can be found in :material-menu: → **Settings**.
|
||||||
|
|
||||||
|
#### Settings
|
||||||
|
|
||||||
##### Shields
|
##### Shields
|
||||||
|
|
||||||
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
||||||
@ -250,6 +261,7 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
|
|||||||
- [ ] Uncheck **Private window with Tor** (1)
|
- [ ] Uncheck **Private window with Tor** (1)
|
||||||
|
|
||||||
!!! tip "Sanitizing on Close"
|
!!! tip "Sanitizing on Close"
|
||||||
|
|
||||||
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
||||||
|
|
||||||
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
||||||
@ -267,17 +279,13 @@ Disable built-in extensions you do not use in **Extensions**
|
|||||||
|
|
||||||
##### Web3
|
##### Web3
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled.
|
||||||
|
|
||||||
- [x] Select **Disabled** on Method to resolve IPFS resources (1)
|
- [ ] Set **Default Ethereum Wallet** to **None**
|
||||||
|
- [ ] Set **Default Solana Wallet** to **None**
|
||||||
|
- [ ] Set **Method to resolve IPFS resources** to **Disabled
|
||||||
|
|
||||||
</div>
|
##### System
|
||||||
|
|
||||||
1. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it.
|
|
||||||
|
|
||||||
##### Additional settings
|
|
||||||
|
|
||||||
Under the *System* menu
|
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
@ -287,10 +295,16 @@ Under the *System* menu
|
|||||||
|
|
||||||
1. This option is not present on all platforms.
|
1. This option is not present on all platforms.
|
||||||
|
|
||||||
### Brave Sync
|
#### Sync
|
||||||
|
|
||||||
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
||||||
|
|
||||||
|
#### Brave Rewards and Wallet
|
||||||
|
|
||||||
|
**Brave Rewards** lets you recieve Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#other-coins-bitcoin-ethereum-etc), so we would discourage using this feature.
|
||||||
|
|
||||||
|
**Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well.
|
||||||
|
|
||||||
## Additional Resources
|
## Additional Resources
|
||||||
|
|
||||||
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
||||||
|
@ -409,7 +409,7 @@ We regard these features as important in order to provide a safe and optimal ser
|
|||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
|
||||||
- Encrypts all account data (Contacts, Calendars, etc) at rest with zero-access encryption.
|
- Encrypts all account data (Contacts, Calendars, etc.) at rest with zero-access encryption.
|
||||||
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
||||||
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
||||||
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
|
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
|
||||||
@ -484,14 +484,14 @@ With the email providers we recommend we like to see responsible marketing.
|
|||||||
|
|
||||||
**Minimum to Qualify:**
|
**Minimum to Qualify:**
|
||||||
|
|
||||||
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc.). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
||||||
|
|
||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
|
|
||||||
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc)
|
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
@ -191,7 +191,7 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube
|
|||||||
|
|
||||||
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
||||||
|
|
||||||
!!! Warning
|
!!! warning
|
||||||
|
|
||||||
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ schema:
|
|||||||
|
|
||||||
يجب عليك عدم الخلط بين الخصوصية والسريَّة. نحن نعلم ما يحدث في الحَمَّام، لكنك ما زلت تغلق الباب، أليس كذلك؟ هذا لأنك تريد الخصوصية وليس السريَّة. **الجميع** لديه شيء لحمايته. الخصوصية شيء أصيل في البشريَّة.
|
يجب عليك عدم الخلط بين الخصوصية والسريَّة. نحن نعلم ما يحدث في الحَمَّام، لكنك ما زلت تغلق الباب، أليس كذلك؟ هذا لأنك تريد الخصوصية وليس السريَّة. **الجميع** لديه شيء لحمايته. الخصوصية شيء أصيل في البشريَّة.
|
||||||
|
|
||||||
[:material-target-account: تهديدات الإنترنت الشائعة](basics/common-threats.md ""){.md-button.md-button--primary}
|
[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## ماذا يجب أن أفعل؟
|
## ماذا يجب أن أفعل؟
|
||||||
|
|
||||||
@ -53,7 +53,7 @@ schema:
|
|||||||
|
|
||||||
==هذه العملية لتحديد التهديدات وتحديد الإجراءات المضادة تسمى **نَمذَجَةُ التَّهدِيد**==، وهي تشكل الأساس لكل خِطَّة أمان وخصوصية جيدة.
|
==هذه العملية لتحديد التهديدات وتحديد الإجراءات المضادة تسمى **نَمذَجَةُ التَّهدِيد**==، وهي تشكل الأساس لكل خِطَّة أمان وخصوصية جيدة.
|
||||||
|
|
||||||
[:material-book-outline: تعرَّف على المَزيد حولَ نَمذَجَةِ التَّهدِيد](basics/threat-modeling.md ""){.md-button.md-button--primary}
|
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -89,7 +89,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
||||||
|
@ -115,7 +115,7 @@ Additionally, some distributions will not download firmware updates automaticall
|
|||||||
|
|
||||||
### MAC Address Randomization
|
### MAC Address Randomization
|
||||||
|
|
||||||
Many desktop Linux distributions (Fedora, openSUSE, etc) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
Many desktop Linux distributions (Fedora, openSUSE, etc.) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
||||||
|
|
||||||
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
||||||
|
|
||||||
|
@ -310,7 +310,7 @@ With the VPN providers we recommend we like to see responsible marketing.
|
|||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc.)
|
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
|
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
|
||||||
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
|
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
|
||||||
|
@ -29,7 +29,7 @@ We have these requirements in regard to developers which wish to submit their pr
|
|||||||
|
|
||||||
- Must disclose affiliation, i.e. your position within the project being submitted.
|
- Must disclose affiliation, i.e. your position within the project being submitted.
|
||||||
|
|
||||||
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage etc.
|
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage, etc.
|
||||||
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
||||||
|
|
||||||
- Must explain what the project brings to the table in regard to privacy.
|
- Must explain what the project brings to the table in regard to privacy.
|
||||||
|
@ -7,7 +7,7 @@ It takes a lot of [people](https://github.com/privacyguides/privacyguides.org/gr
|
|||||||
|
|
||||||
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
||||||
|
|
||||||
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate ""){.md-button.md-button--primary}
|
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
||||||
|
|
||||||
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2 ""){.md-button.md-button--primary}
|
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## Discourse
|
## Discourse
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s
|
|||||||
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
||||||
```
|
```
|
||||||
|
|
||||||
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS etc) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS, etc.) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
||||||
|
|
||||||
=== "Linux, macOS"
|
=== "Linux, macOS"
|
||||||
|
|
||||||
@ -118,7 +118,7 @@ When we do a DNS lookup, it's generally because we want to access a resource. Be
|
|||||||
|
|
||||||
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
||||||
|
|
||||||
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
||||||
|
|
||||||
### Server Name Indication (SNI)
|
### Server Name Indication (SNI)
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
|
|||||||
|
|
||||||
### How Do I Protect My Private Keys?
|
### How Do I Protect My Private Keys?
|
||||||
|
|
||||||
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
||||||
|
|
||||||
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
||||||
|
|
||||||
|
@ -48,7 +48,7 @@ VPNs cannot provide anonymity. Your VPN provider will still see your real IP add
|
|||||||
|
|
||||||
## What about VPN providers that provide Tor nodes?
|
## What about VPN providers that provide Tor nodes?
|
||||||
|
|
||||||
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc.), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
||||||
|
|
||||||
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr
|
|||||||
|
|
||||||
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://proton.me/drive){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
||||||
@ -44,7 +44,7 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a
|
|||||||
|
|
||||||
**Tresorit** is a Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
**Tresorit** is a Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://tresorit.com/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
@ -126,7 +126,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-
|
|||||||
|
|
||||||
### Recommended Configuration
|
### Recommended Configuration
|
||||||
|
|
||||||
These options can be found in :material-menu: → **Settings** → **Privacy & Security**.
|
These options can be found in :material-menu: → **Settings**
|
||||||
|
|
||||||
|
#### Search
|
||||||
|
|
||||||
|
- [ ] Uncheck **Provide search suggestions**
|
||||||
|
|
||||||
|
Search suggestion features may not be available in your region.
|
||||||
|
|
||||||
|
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
||||||
|
|
||||||
|
#### Privacy & Security
|
||||||
|
|
||||||
##### Enhanced Tracking Protection
|
##### Enhanced Tracking Protection
|
||||||
|
|
||||||
@ -134,6 +144,13 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S
|
|||||||
|
|
||||||
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
||||||
|
|
||||||
|
##### Firefox Suggest (US only)
|
||||||
|
|
||||||
|
[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes.
|
||||||
|
|
||||||
|
- [ ] Uncheck **Suggestions from the web**
|
||||||
|
- [ ] Uncheck **Suggestions from sponsors**
|
||||||
|
|
||||||
##### Sanitize on Close
|
##### Sanitize on Close
|
||||||
|
|
||||||
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
||||||
@ -142,14 +159,6 @@ If you want to stay logged in to particular sites, you can allow exceptions in *
|
|||||||
|
|
||||||
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
||||||
|
|
||||||
##### Search Suggestions
|
|
||||||
|
|
||||||
- [ ] Uncheck **Provide search suggestions**
|
|
||||||
|
|
||||||
Search suggestion features may not be available in your region.
|
|
||||||
|
|
||||||
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
|
||||||
|
|
||||||
##### Telemetry
|
##### Telemetry
|
||||||
|
|
||||||
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
||||||
@ -169,7 +178,7 @@ Additionally, the Firefox Accounts service collects [some technical data](https:
|
|||||||
|
|
||||||
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
||||||
|
|
||||||
### Firefox Sync
|
#### Sync
|
||||||
|
|
||||||
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
||||||
|
|
||||||
@ -212,6 +221,8 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand
|
|||||||
|
|
||||||
These options can be found in :material-menu: → **Settings**.
|
These options can be found in :material-menu: → **Settings**.
|
||||||
|
|
||||||
|
#### Settings
|
||||||
|
|
||||||
##### Shields
|
##### Shields
|
||||||
|
|
||||||
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
||||||
@ -250,6 +261,7 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
|
|||||||
- [ ] Uncheck **Private window with Tor** (1)
|
- [ ] Uncheck **Private window with Tor** (1)
|
||||||
|
|
||||||
!!! tip "Sanitizing on Close"
|
!!! tip "Sanitizing on Close"
|
||||||
|
|
||||||
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
||||||
|
|
||||||
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
||||||
@ -267,17 +279,13 @@ Disable built-in extensions you do not use in **Extensions**
|
|||||||
|
|
||||||
##### Web3
|
##### Web3
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled.
|
||||||
|
|
||||||
- [x] Select **Disabled** on Method to resolve IPFS resources (1)
|
- [ ] Set **Default Ethereum Wallet** to **None**
|
||||||
|
- [ ] Set **Default Solana Wallet** to **None**
|
||||||
|
- [ ] Set **Method to resolve IPFS resources** to **Disabled
|
||||||
|
|
||||||
</div>
|
##### System
|
||||||
|
|
||||||
1. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it.
|
|
||||||
|
|
||||||
##### Additional settings
|
|
||||||
|
|
||||||
Under the *System* menu
|
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
@ -287,10 +295,16 @@ Under the *System* menu
|
|||||||
|
|
||||||
1. This option is not present on all platforms.
|
1. This option is not present on all platforms.
|
||||||
|
|
||||||
### Brave Sync
|
#### Sync
|
||||||
|
|
||||||
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
||||||
|
|
||||||
|
#### Brave Rewards and Wallet
|
||||||
|
|
||||||
|
**Brave Rewards** lets you recieve Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#other-coins-bitcoin-ethereum-etc), so we would discourage using this feature.
|
||||||
|
|
||||||
|
**Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well.
|
||||||
|
|
||||||
## Additional Resources
|
## Additional Resources
|
||||||
|
|
||||||
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
||||||
|
@ -409,7 +409,7 @@ We regard these features as important in order to provide a safe and optimal ser
|
|||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
|
||||||
- Encrypts all account data (Contacts, Calendars, etc) at rest with zero-access encryption.
|
- Encrypts all account data (Contacts, Calendars, etc.) at rest with zero-access encryption.
|
||||||
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
||||||
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
||||||
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
|
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
|
||||||
@ -484,14 +484,14 @@ With the email providers we recommend we like to see responsible marketing.
|
|||||||
|
|
||||||
**Minimum to Qualify:**
|
**Minimum to Qualify:**
|
||||||
|
|
||||||
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc.). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
||||||
|
|
||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
|
|
||||||
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc)
|
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
@ -191,7 +191,7 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube
|
|||||||
|
|
||||||
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
||||||
|
|
||||||
!!! Warning
|
!!! warning
|
||||||
|
|
||||||
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech
|
|||||||
|
|
||||||
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human.
|
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human.
|
||||||
|
|
||||||
[:material-target-account: Common Internet Threats](basics/common-threats.md ""){.md-button.md-button--primary}
|
[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## What should I do?
|
## What should I do?
|
||||||
|
|
||||||
@ -53,7 +53,7 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
|||||||
|
|
||||||
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
|
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
|
||||||
|
|
||||||
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button.md-button--primary}
|
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -89,7 +89,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
||||||
|
@ -115,7 +115,7 @@ Additionally, some distributions will not download firmware updates automaticall
|
|||||||
|
|
||||||
### MAC Address Randomization
|
### MAC Address Randomization
|
||||||
|
|
||||||
Many desktop Linux distributions (Fedora, openSUSE, etc) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
Many desktop Linux distributions (Fedora, openSUSE, etc.) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
||||||
|
|
||||||
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
||||||
|
|
||||||
|
@ -310,7 +310,7 @@ With the VPN providers we recommend we like to see responsible marketing.
|
|||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc.)
|
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
|
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
|
||||||
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
|
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
|
||||||
|
@ -29,7 +29,7 @@ Wir haben diese Anforderungen an Entwickler, die eigene Projekt oder Software zu
|
|||||||
|
|
||||||
- Muss die Zugehörigkeit offenlegen, d.h. deine Position innerhalb des eingereichten Projekts.
|
- Muss die Zugehörigkeit offenlegen, d.h. deine Position innerhalb des eingereichten Projekts.
|
||||||
|
|
||||||
- Muss ein Sicherheits-Whitepaper haben, wenn es sich um ein Projekt handelt, das den Umgang mit sensiblen Informationen beinhaltet, wie z. B. Messenger, Passwort-Manager, verschlüsselte Cloud-Speicherung usw.
|
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage, etc.
|
||||||
- Status der Prüfung durch Dritte. Wir möchten wissen, ob eine vorhanden oder geplant ist. Wenn möglich, gib bitte an, wer die Prüfung durchführen wird.
|
- Status der Prüfung durch Dritte. Wir möchten wissen, ob eine vorhanden oder geplant ist. Wenn möglich, gib bitte an, wer die Prüfung durchführen wird.
|
||||||
|
|
||||||
- Muss erklären, was das Projekt im Hinblick auf den Schutz der Privatsphäre bietet.
|
- Muss erklären, was das Projekt im Hinblick auf den Schutz der Privatsphäre bietet.
|
||||||
|
@ -7,7 +7,7 @@ Es braucht eine Menge [Leute](https://github.com/privacyguides/privacyguides.org
|
|||||||
|
|
||||||
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective akzeptiert Zahlungen per Kredit-/Debitkarte, PayPal und Banküberweisung.
|
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective akzeptiert Zahlungen per Kredit-/Debitkarte, PayPal und Banküberweisung.
|
||||||
|
|
||||||
[Auf OpenCollective.com spenden](https://opencollective.com/privacyguides/donate ""){.md-button.md-button--primary}
|
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
Spenden, die direkt über Open Collective gemacht werden, sind in den USA in der Regel steuerlich absetzbar, da unser steuerlicher Träger (die Open Collective Foundation) eine eingetragene 501(c)3 Organisation ist. Nach deiner Spende erhältst du eine Spendenbescheinigung von der Open Collective Foundation. Privacy Guides bietet keine Finanzberatung an, und Sie sollten sich an Ihren Steuerberater wenden, um herauszufinden, ob dies auf Sie zutrifft.
|
Spenden, die direkt über Open Collective gemacht werden, sind in den USA in der Regel steuerlich absetzbar, da unser steuerlicher Träger (die Open Collective Foundation) eine eingetragene 501(c)3 Organisation ist. Nach deiner Spende erhältst du eine Spendenbescheinigung von der Open Collective Foundation. Privacy Guides bietet keine Finanzberatung an, und Sie sollten sich an Ihren Steuerberater wenden, um herauszufinden, ob dies auf Sie zutrifft.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
||||||
|
|
||||||
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2 ""){.md-button.md-button--primary}
|
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## Discourse
|
## Discourse
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s
|
|||||||
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
||||||
```
|
```
|
||||||
|
|
||||||
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS etc) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS, etc.) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
||||||
|
|
||||||
=== "Linux, macOS"
|
=== "Linux, macOS"
|
||||||
|
|
||||||
@ -118,7 +118,7 @@ When we do a DNS lookup, it's generally because we want to access a resource. Be
|
|||||||
|
|
||||||
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
||||||
|
|
||||||
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
||||||
|
|
||||||
### Server Name Indication (SNI)
|
### Server Name Indication (SNI)
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
|
|||||||
|
|
||||||
### How Do I Protect My Private Keys?
|
### How Do I Protect My Private Keys?
|
||||||
|
|
||||||
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
||||||
|
|
||||||
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
||||||
|
|
||||||
|
@ -48,7 +48,7 @@ VPNs cannot provide anonymity. Your VPN provider will still see your real IP add
|
|||||||
|
|
||||||
## What about VPN providers that provide Tor nodes?
|
## What about VPN providers that provide Tor nodes?
|
||||||
|
|
||||||
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc.), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
||||||
|
|
||||||
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr
|
|||||||
|
|
||||||
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://proton.me/drive){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
||||||
@ -44,7 +44,7 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a
|
|||||||
|
|
||||||
**Tresorit** is a Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
**Tresorit** is a Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://tresorit.com/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
@ -126,7 +126,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-
|
|||||||
|
|
||||||
### Recommended Configuration
|
### Recommended Configuration
|
||||||
|
|
||||||
These options can be found in :material-menu: → **Settings** → **Privacy & Security**.
|
These options can be found in :material-menu: → **Settings**
|
||||||
|
|
||||||
|
#### Search
|
||||||
|
|
||||||
|
- [ ] Uncheck **Provide search suggestions**
|
||||||
|
|
||||||
|
Search suggestion features may not be available in your region.
|
||||||
|
|
||||||
|
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
||||||
|
|
||||||
|
#### Privacy & Security
|
||||||
|
|
||||||
##### Enhanced Tracking Protection
|
##### Enhanced Tracking Protection
|
||||||
|
|
||||||
@ -134,6 +144,13 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S
|
|||||||
|
|
||||||
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
||||||
|
|
||||||
|
##### Firefox Suggest (US only)
|
||||||
|
|
||||||
|
[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes.
|
||||||
|
|
||||||
|
- [ ] Uncheck **Suggestions from the web**
|
||||||
|
- [ ] Uncheck **Suggestions from sponsors**
|
||||||
|
|
||||||
##### Sanitize on Close
|
##### Sanitize on Close
|
||||||
|
|
||||||
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
||||||
@ -142,14 +159,6 @@ If you want to stay logged in to particular sites, you can allow exceptions in *
|
|||||||
|
|
||||||
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
||||||
|
|
||||||
##### Search Suggestions
|
|
||||||
|
|
||||||
- [ ] Uncheck **Provide search suggestions**
|
|
||||||
|
|
||||||
Search suggestion features may not be available in your region.
|
|
||||||
|
|
||||||
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
|
||||||
|
|
||||||
##### Telemetry
|
##### Telemetry
|
||||||
|
|
||||||
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
||||||
@ -169,7 +178,7 @@ Additionally, the Firefox Accounts service collects [some technical data](https:
|
|||||||
|
|
||||||
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
||||||
|
|
||||||
### Firefox Sync
|
#### Sync
|
||||||
|
|
||||||
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
||||||
|
|
||||||
@ -212,6 +221,8 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand
|
|||||||
|
|
||||||
These options can be found in :material-menu: → **Settings**.
|
These options can be found in :material-menu: → **Settings**.
|
||||||
|
|
||||||
|
#### Settings
|
||||||
|
|
||||||
##### Shields
|
##### Shields
|
||||||
|
|
||||||
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
||||||
@ -250,6 +261,7 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
|
|||||||
- [ ] Uncheck **Private window with Tor** (1)
|
- [ ] Uncheck **Private window with Tor** (1)
|
||||||
|
|
||||||
!!! tip "Sanitizing on Close"
|
!!! tip "Sanitizing on Close"
|
||||||
|
|
||||||
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
||||||
|
|
||||||
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
||||||
@ -267,17 +279,13 @@ Disable built-in extensions you do not use in **Extensions**
|
|||||||
|
|
||||||
##### Web3
|
##### Web3
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled.
|
||||||
|
|
||||||
- [x] Select **Disabled** on Method to resolve IPFS resources (1)
|
- [ ] Set **Default Ethereum Wallet** to **None**
|
||||||
|
- [ ] Set **Default Solana Wallet** to **None**
|
||||||
|
- [ ] Set **Method to resolve IPFS resources** to **Disabled
|
||||||
|
|
||||||
</div>
|
##### System
|
||||||
|
|
||||||
1. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it.
|
|
||||||
|
|
||||||
##### Additional settings
|
|
||||||
|
|
||||||
Under the *System* menu
|
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
@ -287,10 +295,16 @@ Under the *System* menu
|
|||||||
|
|
||||||
1. This option is not present on all platforms.
|
1. This option is not present on all platforms.
|
||||||
|
|
||||||
### Brave Sync
|
#### Sync
|
||||||
|
|
||||||
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
||||||
|
|
||||||
|
#### Brave Rewards and Wallet
|
||||||
|
|
||||||
|
**Brave Rewards** lets you recieve Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#other-coins-bitcoin-ethereum-etc), so we would discourage using this feature.
|
||||||
|
|
||||||
|
**Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well.
|
||||||
|
|
||||||
## Additional Resources
|
## Additional Resources
|
||||||
|
|
||||||
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
||||||
|
@ -409,7 +409,7 @@ We regard these features as important in order to provide a safe and optimal ser
|
|||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
|
||||||
- Encrypts all account data (Contacts, Calendars, etc) at rest with zero-access encryption.
|
- Encrypts all account data (Contacts, Calendars, etc.) at rest with zero-access encryption.
|
||||||
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
||||||
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
||||||
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
|
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
|
||||||
@ -484,14 +484,14 @@ With the email providers we recommend we like to see responsible marketing.
|
|||||||
|
|
||||||
**Mindestvoraussetzung um zu qualifizieren:**
|
**Mindestvoraussetzung um zu qualifizieren:**
|
||||||
|
|
||||||
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc.). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
||||||
|
|
||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
|
|
||||||
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc)
|
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
@ -191,7 +191,7 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube
|
|||||||
|
|
||||||
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
||||||
|
|
||||||
!!! Warning
|
!!! warning
|
||||||
|
|
||||||
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ schema:
|
|||||||
|
|
||||||
Privatsphäre sollte nicht mit Geheimhaltung verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass wir Privatsphäre wollen, keine Geheimhaltung. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns menschlich macht.
|
Privatsphäre sollte nicht mit Geheimhaltung verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass wir Privatsphäre wollen, keine Geheimhaltung. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns menschlich macht.
|
||||||
|
|
||||||
[:material-target-account: Häufige Internetbedrohungen](basics/common-threats.md ""){.md-button.md-button--primary}
|
[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## Was kann ich tun?
|
## Was kann ich tun?
|
||||||
|
|
||||||
@ -53,7 +53,7 @@ Der Versuch, alle unsere Daten ständig vor allen zu schützen, ist unpraktisch,
|
|||||||
|
|
||||||
== Dieser Prozess der Identifizierung von Bedrohungen und der Festlegung von Gegenmaßnahmen wird als **Bedrohungsanalyse** bezeichnet== und bildet die Grundlage für jeden guten Sicherheits- und Datenschutzplan.
|
== Dieser Prozess der Identifizierung von Bedrohungen und der Festlegung von Gegenmaßnahmen wird als **Bedrohungsanalyse** bezeichnet== und bildet die Grundlage für jeden guten Sicherheits- und Datenschutzplan.
|
||||||
|
|
||||||
[:material-book-outline: Mehr über die Bedrohungsanalyse erfahren](basics/threat-modeling.md ""){.md-button.md-button--primary}
|
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -89,7 +89,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
||||||
|
@ -115,7 +115,7 @@ Additionally, some distributions will not download firmware updates automaticall
|
|||||||
|
|
||||||
### MAC Address Randomization
|
### MAC Address Randomization
|
||||||
|
|
||||||
Many desktop Linux distributions (Fedora, openSUSE, etc) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
Many desktop Linux distributions (Fedora, openSUSE, etc.) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
||||||
|
|
||||||
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
||||||
|
|
||||||
|
@ -310,7 +310,7 @@ With the VPN providers we recommend we like to see responsible marketing.
|
|||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc.)
|
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
|
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
|
||||||
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
|
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
|
||||||
|
@ -29,7 +29,7 @@ We have these requirements in regard to developers which wish to submit their pr
|
|||||||
|
|
||||||
- Must disclose affiliation, i.e. your position within the project being submitted.
|
- Must disclose affiliation, i.e. your position within the project being submitted.
|
||||||
|
|
||||||
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage etc.
|
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage, etc.
|
||||||
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
||||||
|
|
||||||
- Must explain what the project brings to the table in regard to privacy.
|
- Must explain what the project brings to the table in regard to privacy.
|
||||||
|
@ -7,7 +7,7 @@ It takes a lot of [people](https://github.com/privacyguides/privacyguides.org/gr
|
|||||||
|
|
||||||
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
||||||
|
|
||||||
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate ""){.md-button.md-button--primary}
|
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
||||||
|
|
||||||
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2 ""){.md-button.md-button--primary}
|
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## Discourse
|
## Discourse
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s
|
|||||||
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
||||||
```
|
```
|
||||||
|
|
||||||
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS etc) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS, etc.) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
||||||
|
|
||||||
=== "Linux, macOS"
|
=== "Linux, macOS"
|
||||||
|
|
||||||
@ -118,7 +118,7 @@ When we do a DNS lookup, it's generally because we want to access a resource. Be
|
|||||||
|
|
||||||
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
||||||
|
|
||||||
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
||||||
|
|
||||||
### Server Name Indication (SNI)
|
### Server Name Indication (SNI)
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
|
|||||||
|
|
||||||
### How Do I Protect My Private Keys?
|
### How Do I Protect My Private Keys?
|
||||||
|
|
||||||
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
||||||
|
|
||||||
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
||||||
|
|
||||||
|
@ -48,7 +48,7 @@ VPNs cannot provide anonymity. Your VPN provider will still see your real IP add
|
|||||||
|
|
||||||
## What about VPN providers that provide Tor nodes?
|
## What about VPN providers that provide Tor nodes?
|
||||||
|
|
||||||
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc.), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
||||||
|
|
||||||
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr
|
|||||||
|
|
||||||
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://proton.me/drive){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
||||||
@ -44,7 +44,7 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a
|
|||||||
|
|
||||||
**Tresorit** is a Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
**Tresorit** is a Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://tresorit.com/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
@ -126,7 +126,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-
|
|||||||
|
|
||||||
### Recommended Configuration
|
### Recommended Configuration
|
||||||
|
|
||||||
These options can be found in :material-menu: → **Settings** → **Privacy & Security**.
|
These options can be found in :material-menu: → **Settings**
|
||||||
|
|
||||||
|
#### Search
|
||||||
|
|
||||||
|
- [ ] Uncheck **Provide search suggestions**
|
||||||
|
|
||||||
|
Search suggestion features may not be available in your region.
|
||||||
|
|
||||||
|
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
||||||
|
|
||||||
|
#### Privacy & Security
|
||||||
|
|
||||||
##### Enhanced Tracking Protection
|
##### Enhanced Tracking Protection
|
||||||
|
|
||||||
@ -134,6 +144,13 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S
|
|||||||
|
|
||||||
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
||||||
|
|
||||||
|
##### Firefox Suggest (US only)
|
||||||
|
|
||||||
|
[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes.
|
||||||
|
|
||||||
|
- [ ] Uncheck **Suggestions from the web**
|
||||||
|
- [ ] Uncheck **Suggestions from sponsors**
|
||||||
|
|
||||||
##### Sanitize on Close
|
##### Sanitize on Close
|
||||||
|
|
||||||
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
||||||
@ -142,14 +159,6 @@ If you want to stay logged in to particular sites, you can allow exceptions in *
|
|||||||
|
|
||||||
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
||||||
|
|
||||||
##### Search Suggestions
|
|
||||||
|
|
||||||
- [ ] Uncheck **Provide search suggestions**
|
|
||||||
|
|
||||||
Search suggestion features may not be available in your region.
|
|
||||||
|
|
||||||
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
|
||||||
|
|
||||||
##### Telemetry
|
##### Telemetry
|
||||||
|
|
||||||
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
||||||
@ -169,7 +178,7 @@ Additionally, the Firefox Accounts service collects [some technical data](https:
|
|||||||
|
|
||||||
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
||||||
|
|
||||||
### Firefox Sync
|
#### Sync
|
||||||
|
|
||||||
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
||||||
|
|
||||||
@ -212,6 +221,8 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand
|
|||||||
|
|
||||||
These options can be found in :material-menu: → **Settings**.
|
These options can be found in :material-menu: → **Settings**.
|
||||||
|
|
||||||
|
#### Settings
|
||||||
|
|
||||||
##### Shields
|
##### Shields
|
||||||
|
|
||||||
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
||||||
@ -250,6 +261,7 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
|
|||||||
- [ ] Uncheck **Private window with Tor** (1)
|
- [ ] Uncheck **Private window with Tor** (1)
|
||||||
|
|
||||||
!!! tip "Sanitizing on Close"
|
!!! tip "Sanitizing on Close"
|
||||||
|
|
||||||
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
||||||
|
|
||||||
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
||||||
@ -267,17 +279,13 @@ Disable built-in extensions you do not use in **Extensions**
|
|||||||
|
|
||||||
##### Web3
|
##### Web3
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled.
|
||||||
|
|
||||||
- [x] Select **Disabled** on Method to resolve IPFS resources (1)
|
- [ ] Set **Default Ethereum Wallet** to **None**
|
||||||
|
- [ ] Set **Default Solana Wallet** to **None**
|
||||||
|
- [ ] Set **Method to resolve IPFS resources** to **Disabled
|
||||||
|
|
||||||
</div>
|
##### System
|
||||||
|
|
||||||
1. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it.
|
|
||||||
|
|
||||||
##### Additional settings
|
|
||||||
|
|
||||||
Under the *System* menu
|
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
@ -287,10 +295,16 @@ Under the *System* menu
|
|||||||
|
|
||||||
1. This option is not present on all platforms.
|
1. This option is not present on all platforms.
|
||||||
|
|
||||||
### Brave Sync
|
#### Sync
|
||||||
|
|
||||||
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
||||||
|
|
||||||
|
#### Brave Rewards and Wallet
|
||||||
|
|
||||||
|
**Brave Rewards** lets you recieve Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#other-coins-bitcoin-ethereum-etc), so we would discourage using this feature.
|
||||||
|
|
||||||
|
**Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well.
|
||||||
|
|
||||||
## Additional Resources
|
## Additional Resources
|
||||||
|
|
||||||
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
||||||
|
@ -409,7 +409,7 @@ We regard these features as important in order to provide a safe and optimal ser
|
|||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
|
||||||
- Encrypts all account data (Contacts, Calendars, etc) at rest with zero-access encryption.
|
- Encrypts all account data (Contacts, Calendars, etc.) at rest with zero-access encryption.
|
||||||
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
||||||
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
||||||
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
|
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
|
||||||
@ -484,14 +484,14 @@ With the email providers we recommend we like to see responsible marketing.
|
|||||||
|
|
||||||
**Minimum to Qualify:**
|
**Minimum to Qualify:**
|
||||||
|
|
||||||
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc.). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
||||||
|
|
||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
|
|
||||||
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc)
|
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
@ -191,7 +191,7 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube
|
|||||||
|
|
||||||
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
||||||
|
|
||||||
!!! Warning
|
!!! warning
|
||||||
|
|
||||||
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ schema:
|
|||||||
|
|
||||||
Δεν πρέπει να μπερδεύεις την ιδιωτικότητα με τη μυστικότητα. Ξέρουμε τι συμβαίνει όσο είσαι στο μπάνιο, αλλά εξακολουθείς να κλείνεις την πόρτα. Αυτό συμβαίνει επειδή θέλεις ιδιωτικότητα, όχι μυστικότητα. **Όλοι** έχουν κάτι να προστατεύσουν. Η ιδιωτικότητα είναι κάτι που μας κάνει ανθρώπους.
|
Δεν πρέπει να μπερδεύεις την ιδιωτικότητα με τη μυστικότητα. Ξέρουμε τι συμβαίνει όσο είσαι στο μπάνιο, αλλά εξακολουθείς να κλείνεις την πόρτα. Αυτό συμβαίνει επειδή θέλεις ιδιωτικότητα, όχι μυστικότητα. **Όλοι** έχουν κάτι να προστατεύσουν. Η ιδιωτικότητα είναι κάτι που μας κάνει ανθρώπους.
|
||||||
|
|
||||||
[:material-target-account: Συχνές Απειλές Στο Διαδίκτυο](basics/common-threats.md ""){.md-button.md-button--primary}
|
[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## Τι πρέπει να κάνω;
|
## Τι πρέπει να κάνω;
|
||||||
|
|
||||||
@ -53,7 +53,7 @@ schema:
|
|||||||
|
|
||||||
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
|
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
|
||||||
|
|
||||||
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button.md-button--primary}
|
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -89,7 +89,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
||||||
|
@ -115,7 +115,7 @@ Additionally, some distributions will not download firmware updates automaticall
|
|||||||
|
|
||||||
### MAC Address Randomization
|
### MAC Address Randomization
|
||||||
|
|
||||||
Many desktop Linux distributions (Fedora, openSUSE, etc) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
Many desktop Linux distributions (Fedora, openSUSE, etc.) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
||||||
|
|
||||||
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
||||||
|
|
||||||
|
@ -310,7 +310,7 @@ With the VPN providers we recommend we like to see responsible marketing.
|
|||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc.)
|
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
|
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
|
||||||
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
|
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
|
||||||
|
@ -29,7 +29,7 @@ We have these requirements in regard to developers which wish to submit their pr
|
|||||||
|
|
||||||
- Must disclose affiliation, i.e. your position within the project being submitted.
|
- Must disclose affiliation, i.e. your position within the project being submitted.
|
||||||
|
|
||||||
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage etc.
|
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage, etc.
|
||||||
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
||||||
|
|
||||||
- Must explain what the project brings to the table in regard to privacy.
|
- Must explain what the project brings to the table in regard to privacy.
|
||||||
|
@ -7,7 +7,7 @@ It takes a lot of [people](https://github.com/privacyguides/privacyguides.org/gr
|
|||||||
|
|
||||||
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
||||||
|
|
||||||
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate ""){.md-button.md-button--primary}
|
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
||||||
|
|
||||||
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2 ""){.md-button.md-button--primary}
|
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## Discourse
|
## Discourse
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s
|
|||||||
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
||||||
```
|
```
|
||||||
|
|
||||||
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS etc) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS, etc.) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
||||||
|
|
||||||
=== "Linux, macOS"
|
=== "Linux, macOS"
|
||||||
|
|
||||||
@ -118,7 +118,7 @@ When we do a DNS lookup, it's generally because we want to access a resource. Be
|
|||||||
|
|
||||||
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
||||||
|
|
||||||
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
||||||
|
|
||||||
### Server Name Indication (SNI)
|
### Server Name Indication (SNI)
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
|
|||||||
|
|
||||||
### How Do I Protect My Private Keys?
|
### How Do I Protect My Private Keys?
|
||||||
|
|
||||||
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
||||||
|
|
||||||
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
||||||
|
|
||||||
|
@ -48,7 +48,7 @@ VPNs cannot provide anonymity. Your VPN provider will still see your real IP add
|
|||||||
|
|
||||||
## What about VPN providers that provide Tor nodes?
|
## What about VPN providers that provide Tor nodes?
|
||||||
|
|
||||||
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc.), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
||||||
|
|
||||||
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr
|
|||||||
|
|
||||||
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://proton.me/drive){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
||||||
@ -44,7 +44,7 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a
|
|||||||
|
|
||||||
**Tresorit** is a Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
**Tresorit** is a Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://tresorit.com/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
@ -126,7 +126,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-
|
|||||||
|
|
||||||
### Recommended Configuration
|
### Recommended Configuration
|
||||||
|
|
||||||
These options can be found in :material-menu: → **Settings** → **Privacy & Security**.
|
These options can be found in :material-menu: → **Settings**
|
||||||
|
|
||||||
|
#### Search
|
||||||
|
|
||||||
|
- [ ] Uncheck **Provide search suggestions**
|
||||||
|
|
||||||
|
Search suggestion features may not be available in your region.
|
||||||
|
|
||||||
|
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
||||||
|
|
||||||
|
#### Privacy & Security
|
||||||
|
|
||||||
##### Enhanced Tracking Protection
|
##### Enhanced Tracking Protection
|
||||||
|
|
||||||
@ -134,6 +144,13 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S
|
|||||||
|
|
||||||
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
||||||
|
|
||||||
|
##### Firefox Suggest (US only)
|
||||||
|
|
||||||
|
[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes.
|
||||||
|
|
||||||
|
- [ ] Uncheck **Suggestions from the web**
|
||||||
|
- [ ] Uncheck **Suggestions from sponsors**
|
||||||
|
|
||||||
##### Sanitize on Close
|
##### Sanitize on Close
|
||||||
|
|
||||||
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
||||||
@ -142,14 +159,6 @@ If you want to stay logged in to particular sites, you can allow exceptions in *
|
|||||||
|
|
||||||
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
||||||
|
|
||||||
##### Search Suggestions
|
|
||||||
|
|
||||||
- [ ] Uncheck **Provide search suggestions**
|
|
||||||
|
|
||||||
Search suggestion features may not be available in your region.
|
|
||||||
|
|
||||||
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
|
||||||
|
|
||||||
##### Telemetry
|
##### Telemetry
|
||||||
|
|
||||||
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
||||||
@ -169,7 +178,7 @@ Additionally, the Firefox Accounts service collects [some technical data](https:
|
|||||||
|
|
||||||
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
||||||
|
|
||||||
### Firefox Sync
|
#### Sync
|
||||||
|
|
||||||
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
||||||
|
|
||||||
@ -212,6 +221,8 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand
|
|||||||
|
|
||||||
These options can be found in :material-menu: → **Settings**.
|
These options can be found in :material-menu: → **Settings**.
|
||||||
|
|
||||||
|
#### Settings
|
||||||
|
|
||||||
##### Shields
|
##### Shields
|
||||||
|
|
||||||
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
||||||
@ -250,6 +261,7 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
|
|||||||
- [ ] Uncheck **Private window with Tor** (1)
|
- [ ] Uncheck **Private window with Tor** (1)
|
||||||
|
|
||||||
!!! tip "Sanitizing on Close"
|
!!! tip "Sanitizing on Close"
|
||||||
|
|
||||||
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
||||||
|
|
||||||
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
||||||
@ -267,17 +279,13 @@ Disable built-in extensions you do not use in **Extensions**
|
|||||||
|
|
||||||
##### Web3
|
##### Web3
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled.
|
||||||
|
|
||||||
- [x] Select **Disabled** on Method to resolve IPFS resources (1)
|
- [ ] Set **Default Ethereum Wallet** to **None**
|
||||||
|
- [ ] Set **Default Solana Wallet** to **None**
|
||||||
|
- [ ] Set **Method to resolve IPFS resources** to **Disabled
|
||||||
|
|
||||||
</div>
|
##### System
|
||||||
|
|
||||||
1. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it.
|
|
||||||
|
|
||||||
##### Additional settings
|
|
||||||
|
|
||||||
Under the *System* menu
|
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
@ -287,10 +295,16 @@ Under the *System* menu
|
|||||||
|
|
||||||
1. This option is not present on all platforms.
|
1. This option is not present on all platforms.
|
||||||
|
|
||||||
### Brave Sync
|
#### Sync
|
||||||
|
|
||||||
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
||||||
|
|
||||||
|
#### Brave Rewards and Wallet
|
||||||
|
|
||||||
|
**Brave Rewards** lets you recieve Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#other-coins-bitcoin-ethereum-etc), so we would discourage using this feature.
|
||||||
|
|
||||||
|
**Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well.
|
||||||
|
|
||||||
## Additional Resources
|
## Additional Resources
|
||||||
|
|
||||||
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
||||||
|
@ -409,7 +409,7 @@ We regard these features as important in order to provide a safe and optimal ser
|
|||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
|
||||||
- Encrypts all account data (Contacts, Calendars, etc) at rest with zero-access encryption.
|
- Encrypts all account data (Contacts, Calendars, etc.) at rest with zero-access encryption.
|
||||||
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
||||||
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
||||||
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
|
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
|
||||||
@ -484,14 +484,14 @@ With the email providers we recommend we like to see responsible marketing.
|
|||||||
|
|
||||||
**Minimum to Qualify:**
|
**Minimum to Qualify:**
|
||||||
|
|
||||||
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc.). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
||||||
|
|
||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
|
|
||||||
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc)
|
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
@ -191,7 +191,7 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube
|
|||||||
|
|
||||||
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
||||||
|
|
||||||
!!! Warning
|
!!! warning
|
||||||
|
|
||||||
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech
|
|||||||
|
|
||||||
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human.
|
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human.
|
||||||
|
|
||||||
[:material-target-account: Common Internet Threats](basics/common-threats.md ""){.md-button.md-button--primary}
|
[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## What should I do?
|
## What should I do?
|
||||||
|
|
||||||
@ -53,7 +53,7 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
|||||||
|
|
||||||
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
|
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
|
||||||
|
|
||||||
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button.md-button--primary}
|
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -89,7 +89,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
||||||
|
@ -115,7 +115,7 @@ Additionally, some distributions will not download firmware updates automaticall
|
|||||||
|
|
||||||
### MAC Address Randomization
|
### MAC Address Randomization
|
||||||
|
|
||||||
Many desktop Linux distributions (Fedora, openSUSE, etc) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
Many desktop Linux distributions (Fedora, openSUSE, etc.) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
||||||
|
|
||||||
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
||||||
|
|
||||||
|
@ -310,7 +310,7 @@ With the VPN providers we recommend we like to see responsible marketing.
|
|||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc.)
|
- Reusing personal information (e.g., email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
|
- Claim that a single circuit VPN is "more anonymous" than Tor, which is a circuit of three or more hops that regularly changes.
|
||||||
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
|
- Use responsible language: i.e., it is okay to say that a VPN is "disconnected" or "not connected", however claiming that someone is "exposed", "vulnerable" or "compromised" is needless use of alarming language that may be incorrect. For example, that person might simply be on another VPN provider's service or using Tor.
|
||||||
|
@ -7,7 +7,7 @@ Se necesita a un montón de [personas](https://github.com/privacyguides/privacyg
|
|||||||
|
|
||||||
Si nos quieres ayudar financialmente, el método más conveniente para nosotros es que contribuyas vía Open Collective, un sitio web operado por nuestro anfitrión fiscal. Open Collective acepta pagos vía tarjeta de crédito o débito, PayPal, y transferencias bancarias.
|
Si nos quieres ayudar financialmente, el método más conveniente para nosotros es que contribuyas vía Open Collective, un sitio web operado por nuestro anfitrión fiscal. Open Collective acepta pagos vía tarjeta de crédito o débito, PayPal, y transferencias bancarias.
|
||||||
|
|
||||||
[Dona en OpenCollective.com](https://opencollective.com/privacyguides/donate ""){.md-button.md-button--primary}
|
[Donar en OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
Las donaciones hechas directamente a Open Collective son generalmente deducibles de impuestos en los Estados Unidos, porque nuestro anfitrión fiscal (la Fundación Open Collective) es una organización registrada 501(c)3. Recibirás un recibo de Open Collective Foundation después de donar. Privacy Guides no ofrece asesoramiento financiero, por lo que debe ponerse en contacto con su asesor fiscal para saber si esto es aplicable en su caso.
|
Las donaciones hechas directamente a Open Collective son generalmente deducibles de impuestos en los Estados Unidos, porque nuestro anfitrión fiscal (la Fundación Open Collective) es una organización registrada 501(c)3. Recibirás un recibo de Open Collective Foundation después de donar. Privacy Guides no ofrece asesoramiento financiero, por lo que debe ponerse en contacto con su asesor fiscal para saber si esto es aplicable en su caso.
|
||||||
|
|
||||||
|
@ -93,7 +93,7 @@ Los miembros de nuestro equipo revisan todos los cambios realizados en el sitio
|
|||||||
|
|
||||||
## Licencia de sitio
|
## Licencia de sitio
|
||||||
|
|
||||||
!!! Peligro ""
|
!!! danger ""
|
||||||
|
|
||||||
El siguiente es un resumen legible por humanos de (y no un sustituto de) la [license](/licencia).
|
El siguiente es un resumen legible por humanos de (y no un sustituto de) la [license](/licencia).
|
||||||
|
|
||||||
|
@ -14,7 +14,7 @@ Además, Privacy Guides no garantiza que este sitio web esté disponible, de for
|
|||||||
|
|
||||||
## Resumen de licencias
|
## Resumen de licencias
|
||||||
|
|
||||||
!!! Peligro ""
|
!!! danger ""
|
||||||
|
|
||||||
El siguiente es un resumen legible por humanos de (y no un sustituto de) la [license](/licencia).
|
El siguiente es un resumen legible por humanos de (y no un sustituto de) la [license](/licencia).
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
Ejecutamos una serie de servicios web para probar las características y promover proyectos descentralizados, federados y/o de código abierto. Muchos de estos servicios están disponibles al público y están detallados a continuación.
|
Ejecutamos una serie de servicios web para probar las características y promover proyectos descentralizados, federados y/o de código abierto. Muchos de estos servicios están disponibles al público y están detallados a continuación.
|
||||||
|
|
||||||
[:material-comment-alert: Reportar un problema](https://discuss.privacyguides.net/c/services/2 ""){.md-button.md-button--primary}
|
[:material-comment-alert: Informar de un problema](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## Discourse
|
## Discourse
|
||||||
|
|
||||||
|
@ -118,7 +118,7 @@ Cuando hacemos una búsqueda en el DNS, generalmente es porque queremos acceder
|
|||||||
|
|
||||||
La forma más sencilla de determinar la actividad de navegación podría ser mirar las direcciones IP a las que acceden sus dispositivos. Por ejemplo, si el observador sabe que `privacyguides.org` está en `198.98.54.105`, y tu dispositivo solicita datos de `198.98.54.105`, es muy probable que estés visitando Privacy Guides.
|
La forma más sencilla de determinar la actividad de navegación podría ser mirar las direcciones IP a las que acceden sus dispositivos. Por ejemplo, si el observador sabe que `privacyguides.org` está en `198.98.54.105`, y tu dispositivo solicita datos de `198.98.54.105`, es muy probable que estés visitando Privacy Guides.
|
||||||
|
|
||||||
Este método sólo es útil cuando la dirección IP pertenece a un servidor que sólo aloja unos pocos sitios web. Tampoco es muy útil si el sitio está alojado en una plataforma compartida (por ejemplo, Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc). Tampoco es muy útil si el servidor está alojado detrás de un [proxy inverso](https://es.wikipedia.org/wiki/Proxy_inverso), lo cual es muy común en la Internet moderna.
|
Este método sólo es útil cuando la dirección IP pertenece a un servidor que sólo aloja unos pocos sitios web. Tampoco es muy útil si el sitio está alojado en una plataforma compartida (por ejemplo, Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). Tampoco es muy útil si el servidor está alojado detrás de un [proxy inverso](https://es.wikipedia.org/wiki/Proxy_inverso), lo cual es muy común en la Internet moderna.
|
||||||
|
|
||||||
### Indicación del Nombre del Servidor (SNI)
|
### Indicación del Nombre del Servidor (SNI)
|
||||||
|
|
||||||
@ -262,15 +262,15 @@ Hemos elaborado este diagrama de flujo para describir cuándo *deberías* usar e
|
|||||||
|
|
||||||
``` mermaid
|
``` mermaid
|
||||||
graph TB
|
graph TB
|
||||||
Comienzo[Start] --> anonymous{¿Tratando de ser<br> anónimo?}
|
Comienzo[Start] --> anonymous{"¿Tratando de ser<br> anónimo?"}
|
||||||
anonymous--> | Sí | tor(Usa Tor)
|
anonymous--> | Sí | tor(Usa Tor)
|
||||||
anonymous --> | No | censorship{¿Evitando la<br> censura?}
|
anonymous --> | No | censorship{"¿Evitando la<br> censura?"}
|
||||||
censorship --> | Sí | vpnOrTor(Usa una<br> VPN o Tor)
|
censorship --> | Sí | vpnOrTor(Usa una<br> VPN o Tor)
|
||||||
censorship --> | No | privacy{¿Quieres privacidad<br> del ISP?}
|
censorship --> | No | privacy{"¿Quieres privacidad<br> del ISP?"}
|
||||||
privacy --> | Sí | vpnOrTor
|
privacy --> | Sí | vpnOrTor
|
||||||
privacy --> | No | obnoxious{¿El ISP hace<br> odiosas<br> redirecciones?}
|
privacy --> | No | obnoxious{"¿El ISP hace<br> odiosas<br> redirecciones?"}
|
||||||
obnoxious --> | Sí | encryptedDNS(Usa<br> DNS cifrado<br> con terceros)
|
obnoxious --> | Sí | encryptedDNS(Usa<br> DNS cifrado<br> con terceros)
|
||||||
obnoxious --> | No | ispDNS{¿El ISP soporta<br> DNS cifrado?}
|
obnoxious --> | No | ispDNS{"¿El ISP soporta<br> DNS cifrado?"}
|
||||||
ispDNS --> | Sí | useISP(Usa<br> DNS cifrado<br> con ISP)
|
ispDNS --> | Sí | useISP(Usa<br> DNS cifrado<br> con ISP)
|
||||||
ispDNS --> | No | nothing(No hagas nada)
|
ispDNS --> | No | nothing(No hagas nada)
|
||||||
```
|
```
|
||||||
|
@ -14,14 +14,14 @@ schema:
|
|||||||
name: Android
|
name: Android
|
||||||
image: /assets/img/android/android.svg
|
image: /assets/img/android/android.svg
|
||||||
url: https://source.android.com/
|
url: https://source.android.com/
|
||||||
sameAs: https://en.wikipedia.org/wiki/Android_(operating_system)
|
sameAs: https://es.wikipedia.org/wiki/Android_(operating_system)
|
||||||
-
|
-
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
"@type": CreativeWork
|
"@type": CreativeWork
|
||||||
name: GrapheneOS
|
name: GrapheneOS
|
||||||
image: /assets/img/android/grapheneos.svg
|
image: /assets/img/android/grapheneos.svg
|
||||||
url: https://grapheneos.org/
|
url: https://grapheneos.org/
|
||||||
sameAs: https://en.wikipedia.org/wiki/GrapheneOS
|
sameAs: https://es.wikipedia.org/wiki/GrapheneOS
|
||||||
subjectOf:
|
subjectOf:
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
"@type": WebPage
|
"@type": WebPage
|
||||||
@ -45,7 +45,7 @@ schema:
|
|||||||
"@type": Brand
|
"@type": Brand
|
||||||
name: Google
|
name: Google
|
||||||
image: /assets/img/android/google-pixel.png
|
image: /assets/img/android/google-pixel.png
|
||||||
sameAs: https://en.wikipedia.org/wiki/Google_Pixel
|
sameAs: https://es.wikipedia.org/wiki/Google_Pixel
|
||||||
review:
|
review:
|
||||||
"@type": Review
|
"@type": Review
|
||||||
author:
|
author:
|
||||||
@ -97,10 +97,7 @@ Recomendamos instalar uno de estos sistemas operativos Android personalizados en
|
|||||||
|
|
||||||
!!! note "Nota"
|
!!! note "Nota"
|
||||||
|
|
||||||
{ align=right }
|
Los dispositivos al final de su vida útil (como GrapheneOS o los dispositivos de "soporte extendido" de CalyxOS) no disponen de parches de seguridad completos (actualizaciones de firmware) debido a que el OEM ha interrumpido el soporte. Estos dispositivos no pueden considerarse completamente seguros independientemente del software instalado.
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**GrapheneOS** es la mejor opción cuando se trata de privacidad y seguridad. GrapheneOS proporciona mejoras adicionales de [seguridad](https://es.wikipedia.org/wiki/Endurecimiento_(inform%C3%A1tica)) y de privacidad.
|
|
||||||
|
|
||||||
### GrapheneOS
|
### GrapheneOS
|
||||||
|
|
||||||
@ -111,7 +108,7 @@ Recomendamos instalar uno de estos sistemas operativos Android personalizados en
|
|||||||
|
|
||||||
**GrapheneOS** es la mejor opción cuando se trata de privacidad y seguridad.
|
**GrapheneOS** es la mejor opción cuando se trata de privacidad y seguridad.
|
||||||
|
|
||||||
GrapheneOS proporciona mejoras adicionales de seguridad (https://en.wikipedia.org/wiki/Hardening_(computing)) y privacidad. Dispone de un [asignador de memoria reforzado](https://github.com/GrapheneOS/hardened_malloc), permisos de red y de sensores, y otras [características de seguridad](https://grapheneos.org/features). GrapheneOS también incluye actualizaciones completas de firmware y compilaciones firmadas, por lo que el arranque verificado es totalmente compatible.
|
GrapheneOS proporciona mejoras [adicionales de seguridad](https://en.wikipedia.org/wiki/Hardening_(computing)) y privacidad. Dispone de un [asignador de memoria reforzado](https://github.com/GrapheneOS/hardened_malloc), permisos de red y de sensores, y otras [características de seguridad](https://grapheneos.org/features). GrapheneOS también incluye actualizaciones completas de firmware y compilaciones firmadas, por lo que el arranque verificado es totalmente compatible.
|
||||||
|
|
||||||
[:octicons-home-16: Página Principal](https://grapheneos.org/){ .md-button .md-button--primary }
|
[:octicons-home-16: Página Principal](https://grapheneos.org/){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Política de Privacidad" }
|
[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Política de Privacidad" }
|
||||||
@ -318,7 +315,7 @@ La tienda de Google Play requiere una cuenta de Google para iniciar sesión, lo
|
|||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Aurora Store** es un cliente de Google Play Store que no requiere de una cuenta de Google, Servicios Google Play, o microG para descargar aplicaciones.
|
**Aurora Store** es un cliente de Google Play Store que no requiere de una cuenta de Google, Servicios Google Play, o microG para descargar aplicaciones.
|
||||||
|
|
||||||
|
@ -16,7 +16,7 @@ Esto es llamado [suplantación de identidad](https://en.wikipedia.org/wiki/Crede
|
|||||||
|
|
||||||
### Utilizar contraseñas generadas aleatoriamente
|
### Utilizar contraseñas generadas aleatoriamente
|
||||||
|
|
||||||
===**Nunca** debes confiar en ti mismo para inventar una buena contraseña.== Recomendamos utilizar [contraseñas generadas aleatoriamente](#passwords) o [frases de contraseña](#diceware-passphrases) con suficiente entropía para proteger tus cuentas y dispositivos.
|
==**Nunca** debes confiar en ti mismo para inventar una buena contraseña.== Recomendamos utilizar [contraseñas generadas aleatoriamente](#passwords) o [frases de contraseña](#diceware-passphrases) con suficiente entropía para proteger tus cuentas y dispositivos.
|
||||||
|
|
||||||
Todos nuestros [gestores recomendados de contraseñas](../passwords.md) incluyen un generador integrado de contraseñas que puedes usar.
|
Todos nuestros [gestores recomendados de contraseñas](../passwords.md) incluyen un generador integrado de contraseñas que puedes usar.
|
||||||
|
|
||||||
|
@ -20,10 +20,10 @@ Si estas alternativas no se ajustan a tus necesidades, te sugerimos que busques
|
|||||||
|
|
||||||
**Proton Drive** es un proveedor suizo de almacenamiento cifrado en la nube del popular proveedor de correo electrónico cifrado [Proton Mail](email.md#proton-mail).
|
**Proton Drive** es un proveedor suizo de almacenamiento cifrado en la nube del popular proveedor de correo electrónico cifrado [Proton Mail](email.md#proton-mail).
|
||||||
|
|
||||||
[:octicons-home-16: Inicio](https://proton.me/drive){ .md-button .md-button--primary }
|
[:octicons-home-16: Página Principal](https://proton.me/drive){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Politica de privacidad" }
|
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Política de Privacidad" }
|
||||||
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentación}
|
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Código fuente" }
|
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? downloads "Descargas"
|
??? downloads "Descargas"
|
||||||
|
|
||||||
@ -44,8 +44,8 @@ Los nuevos clientes móviles de Proton Drive aún no han sido auditados pública
|
|||||||
|
|
||||||
**Tresorit** es un proveedor húngaro de almacenamiento cifrado en la nube fundado en 2011. Tresorit es propiedad de Swiss Post, el servicio postal nacional de Suiza.
|
**Tresorit** es un proveedor húngaro de almacenamiento cifrado en la nube fundado en 2011. Tresorit es propiedad de Swiss Post, el servicio postal nacional de Suiza.
|
||||||
|
|
||||||
[:octicons-home-16: Inicio](https://tresorit.com/){ .md-button .md-button--primary }
|
[:octicons-home-16: Página Principal](https://tresorit.com/){ class="md-button md-button--primary" }
|
||||||
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Politica de privacidad" }
|
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Política de Privacidad" }
|
||||||
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentación}
|
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentación}
|
||||||
|
|
||||||
??? downloads "Descargas"
|
??? downloads "Descargas"
|
||||||
|
@ -71,7 +71,7 @@ La aplicación ofrece múltiples formas de borrar los metadatos de las imágenes
|
|||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Metapho** es un visor simple y limpio para metadatos de fotos como fecha, nombre de archivo, tamaño, modelo de cámara, velocidad de obturación y ubicación.
|
**Metapho** es un visor simple y limpio para metadatos de fotos como fecha, nombre de archivo, tamaño, modelo de cámara, velocidad de obturación y ubicación.
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Navegadores de Escritorio"
|
title: "Navegadores de Escritorio"
|
||||||
icon: material/laptop
|
icon: material/laptop
|
||||||
description: These web browsers provide stronger privacy protections than Google Chrome.
|
description: Estos navegadores web ofrecen protecciones de privacidad más sólidas que Google Chrome.
|
||||||
schema:
|
schema:
|
||||||
-
|
-
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
@ -55,9 +55,9 @@ schema:
|
|||||||
url: "./"
|
url: "./"
|
||||||
---
|
---
|
||||||
|
|
||||||
Estas son nuestras recomendaciones de navegadores web para computadoras y las configuraciones para la navegación estándar/no anónima por Internet. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility.
|
Estas son nuestras recomendaciones de navegadores web para computadoras y las configuraciones para la navegación estándar/no anónima por Internet. Recomendamos [Mullvad Browser](#mullvad-browser) si estás centrado en fuertes protecciones de privacidad y contra huellas digitales desde el primer momento, [Firefox](#firefox) para navegantes ocasionales que buscan una buena alternativa a Google Chrome, y [Brave](#brave) si necesitas compatibilidad con el navegador Chromium.
|
||||||
|
|
||||||
Si necesita navegar por Internet de forma anónima, debería utilizar [Tor](tor.md). We make some configuration recommendations on this page, but all browsers other than Tor Browser will be traceable by *somebody* in some manner or another.
|
Si necesitas navegar por Internet de forma anónima, deberías utilizar [Tor](tor.md) . Hacemos algunas recomendaciones de configuración en esta página, pero todos los navegadores que no sean Tor Browser serán rastreables por *alguien* de una forma u otra.
|
||||||
|
|
||||||
## Mullvad Browser
|
## Mullvad Browser
|
||||||
|
|
||||||
@ -65,12 +65,12 @@ Si necesita navegar por Internet de forma anónima, debería utilizar [Tor](tor.
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN.
|
**Mullvad Browser** es una versión de [Tor Browser](tor.md#tor-browser) con las integraciones de la red Tor eliminadas, con el objetivo de proporcionar las tecnologías de navegación anti huella digital de Tor Browser a los usuarios de VPN. Es desarrollado por el Proyecto Tor y distribuido por [Mullvad](vpn.md#mullvad), y **no** requiere el uso de la VPN de Mullvad.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary }
|
[:octicons-home-16: Página Principal](https://mullvad.net/en/browser){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Política de Privacidad }
|
||||||
[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation}
|
[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? downloads "Descargas"
|
??? downloads "Descargas"
|
||||||
|
|
||||||
@ -78,27 +78,27 @@ Si necesita navegar por Internet de forma anónima, debería utilizar [Tor](tor.
|
|||||||
- [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos)
|
- [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos)
|
||||||
- [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux)
|
- [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux)
|
||||||
|
|
||||||
Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead.
|
Al igual que [Tor Browser](tor.md), Mullvad Browser está diseñado para evitar el fingerprinting haciendo que la huella digital de tu navegador sea idéntica a la de todos los demás usuarios de Mullvad Browser, e incluye ajustes por defecto y extensiones que se configuran automáticamente según los niveles de seguridad por defecto: *Standard*, *Safer* y *Safest*. Por lo tanto, es imperativo que no modifiques el navegador en absoluto, más allá de ajustar los [niveles de seguridad](https://tb-manual.torproject.org/security-settings/) por defecto. Otras modificaciones harían que tu huella digital fuera única, anulando el propósito de utilizar este navegador. Si deseas configurar tu navegador de forma más exhaustiva y la huella digital no te preocupa, te recomendamos [Firefox](#firefox) en su lugar.
|
||||||
|
|
||||||
### Anti-Fingerprinting
|
### Anti Huella Digital
|
||||||
|
|
||||||
**Without** using a [VPN](vpn.md), Mullvad Browser provides the same protections against [naive fingerprinting scripts](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) as other private browsers like Firefox+[Arkenfox](#arkenfox-advanced) or [Brave](#brave). Mullvad Browser provides these protections out of the box, at the expense of some flexibility and convenience that other private browsers can provide.
|
**Sin** utilizar una VPN [](vpn.md), Mullvad Browser proporciona las mismas protecciones contra [scripts primitivos de huellas digitales](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) que otros navegadores privados como Firefox+[Arkenfox](#arkenfox-advanced) o [Brave](#brave). Mullvad Browser proporciona estas protecciones desde el principio, a expensas de cierta flexibilidad y comodidad que otros navegadores privados pueden proporcionar.
|
||||||
|
|
||||||
==For the strongest anti-fingerprinting protection, we recommend using Mullvad Browser in conjunction **with** a VPN==, whether that is Mullvad or another recommended VPN provider. When using a VPN with Mullvad Browser, you will share a fingerprint and a pool of IP addresses with many other users, giving you a "crowd" to blend in with. This strategy is the only way to thwart advanced tracking scripts, and is the same anti-fingerprinting technique used by Tor Browser.
|
==Para obtener la mayor protección contra las huellas dactilares, recomendamos usar el navegador Mullvad en conjunción **con** una VPN==, ya sea de Mullvad o de otro proveedor de VPN recomendado. Al utilizar una VPN con Mullvad Browser, compartirás una huella digital y un conjunto de direcciones IP con muchos otros usuarios, lo que le proporcionará una "multitud" con la que mezclarse. Esta estrategia es la única manera de frustrar los scripts de rastreo avanzados, y es la misma técnica contra las huellas digitales utilizada por Tor Browser.
|
||||||
|
|
||||||
Note that while you can use Mullvad Browser with any VPN provider, other people on that VPN must also be using Mullvad Browser for this "crowd" to exist, something which is more likely on Mullvad VPN compared to other providers, particularly this close to the launch of Mullvad Browser. Mullvad Browser does not have built-in VPN connectivity, nor does it check whether you are using a VPN before browsing; your VPN connection has to be configured and managed separately.
|
Ten en cuenta que aunque puedes usar Mullvad Browser con cualquier proveedor de VPN, otras personas en esa VPN también deben estar usando Mullvad Browser para que exista esta "multitud", algo que es más probable en Mullvad VPN en comparación con otros proveedores, especialmente tan cerca del lanzamiento de Mullvad Browser. Mullvad Browser no tiene conectividad VPN integrada, ni comprueba si estás usando una VPN antes de navegar; tu conexión VPN tiene que ser configurada y gestionada por separado.
|
||||||
|
|
||||||
Mullvad Browser comes with the *uBlock Origin* and *NoScript* browser extensions pre-installed. While we typically [don't recommend](#extensions) adding *additional* browser extensions, these extensions that come pre-installed with the browser should **not** be removed or configured outside their default values, because doing so would noticeably make your browser fingerprint distinct from other Mullvad Browser users. It also comes pre-installed with the Mullvad Browser Extension, which *can* be safely removed without impacting your browser fingerprint if you would like, but is also safe to keep even if you don't use Mullvad VPN.
|
Mullvad Browser viene con las extensiones de navegador *uBlock Origin* y *NoScript* preinstaladas. Aunque normalmente [no recomendamos](#extensions) añadir extensiones de navegador *adicionales*, estas extensiones que vienen preinstaladas con el navegador **no** deben ser eliminadas o configuradas fuera de sus valores por defecto, ya que hacerlo haría tu huella digital del navegador notablemente distinta de la de otros usuarios de Mullvad Browser. También viene preinstalado con la extensión Mullvad Browser Extension, que *puede* ser eliminada de forma segura sin afectar a tu huella digital del navegador si lo deseas, pero también es seguro mantenerla incluso si no utilizas Mullvad VPN.
|
||||||
|
|
||||||
### Private Browsing Mode
|
### Modo de Navegación Privada
|
||||||
|
|
||||||
Mullvad Browser operates in permanent private browsing mode, meaning your history, cookies, and other site data will always be cleared every time the browser is closed. Your bookmarks, browser settings, and extension settings will still be preserved.
|
Mullvad Browser funciona en modo de navegación privada permanente, lo que significa que el historial, las cookies y otros datos del sitio se borrarán siempre que se cierre el navegador. Tus marcadores y tu configuración del navegador y de las extensiones se conservarán.
|
||||||
|
|
||||||
This is required to prevent advanced forms of tracking, but does come at the cost of convenience and some Firefox features, such as Multi-Account Containers. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise don't work properly in Mullvad Browser, and Mullvad Browser for general browsing.
|
Esto es necesario para evitar formas avanzadas de rastreo, pero a costa de la comodidad y de algunas funciones de Firefox, como los contenedores multicuenta. Recuerda que siempre puedes utilizar varios navegadores, por ejemplo, podrías considerar utilizar Firefox+Arkenfox para algunos sitios en los que quieras mantener la sesión iniciada o que no funcionen correctamente en Mullvad Browser, y Mullvad Browser para la navegación general.
|
||||||
|
|
||||||
### Mullvad Leta
|
### Mullvad Leta
|
||||||
|
|
||||||
Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-engines.md), but it also comes preinstalled with **Mullvad Leta**, a search engine which requires an active Mullvad VPN subscription to access. Mullvad Leta queries Google's paid search API directly (which is why it is limited to paying subscribers), however because of this limitation it is possible for Mullvad to correlate search queries and Mullvad VPN accounts. For this reason we discourage the use of Mullvad Leta, even though Mullvad collects very little information about their VPN subscribers.
|
Mullvad Browser viene con DuckDuckGo configurado como [motor de búsqueda](search-engines.md) por defecto, pero también viene preinstalado con **Mullvad Leta**, un motor de búsqueda que requiere una suscripción activa a Mullvad VPN para poder acceder. Mullvad Leta consulta directamente la API de búsqueda de pago de Google (razón por la cual está limitada a los suscriptores de pago), sin embargo, debido a esta limitación, es posible que Mullvad correlacione las consultas de búsqueda y las cuentas VPN de Mullvad. Por este motivo, desaconsejamos el uso de Mullvad Leta, a pesar de que Mullvad recopila muy poca información sobre sus suscriptores de VPN.
|
||||||
|
|
||||||
## Firefox
|
## Firefox
|
||||||
|
|
||||||
@ -126,62 +126,71 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-
|
|||||||
|
|
||||||
### Configuración Recomendada
|
### Configuración Recomendada
|
||||||
|
|
||||||
Estas opciones se encuentran en :material-menu: → **Ajustes** → **Privacidad y seguridad**.
|
Estas opciones se encuentran en :material-menu: → **Ajustes**
|
||||||
|
|
||||||
##### Protección antirrastreo mejorada
|
#### Buscar
|
||||||
|
|
||||||
- [x] Seleccione **Estricto** Protección de seguimiento mejorada
|
- [ ] Desmarca **Proporcionar sugerencias de búsqueda**
|
||||||
|
|
||||||
Esto le protege bloqueando los rastreadores de redes sociales, las secuencias de comandos de huellas digitales (ten en cuenta que esto no le protege de *todas* las huellas digitales), los criptomineros, las cookies de rastreo de sitios cruzados y algunos otros contenidos de rastreo. ETP protege contra muchas amenazas comunes, pero no bloquea todas las vías de rastreo porque está diseñado para tener un impacto mínimo o nulo en la usabilidad del sitio.
|
Es posible que las funciones de sugerencia de búsqueda no estén disponibles en tu región.
|
||||||
|
|
||||||
|
Las sugerencias de búsqueda envían todo lo que escribes en la barra de direcciones al motor de búsqueda predeterminado, independientemente de si realizas una búsqueda real. Desactivar las sugerencias de búsqueda te permite controlar con mayor precisión los datos que envías al proveedor de tu motor de búsqueda.
|
||||||
|
|
||||||
|
#### Privacidad & Seguridad
|
||||||
|
|
||||||
|
##### Protección contra el rastreo mejorada
|
||||||
|
|
||||||
|
- [x] Selecciona **Estricto** Protección de seguimiento mejorada
|
||||||
|
|
||||||
|
Esto te protege bloqueando los rastreadores de redes sociales, las secuencias de comandos de huellas digitales (ten en cuenta que esto no te protege de *todas* las huellas digitales), los criptomineros, las cookies de rastreo de sitios cruzados y algunos otros contenidos de rastreo. ETP protege contra muchas amenazas comunes, pero no bloquea todas las vías de rastreo porque está diseñado para tener un impacto mínimo o nulo en la usabilidad del sitio.
|
||||||
|
|
||||||
|
##### Firefox Suggest (solo en EE. UU.)
|
||||||
|
|
||||||
|
[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) es una función similar a las sugerencias de búsqueda que sólo está disponible en Estados Unidos. Recomendamos desactivarlo por la misma razón que recomendamos desactivar las sugerencias de búsqueda. Si no ves estas opciones en lel encabezado de la **Barra de Direcciones**, no tienes la nueva experiencia y puedes ignorar estos cambios.
|
||||||
|
|
||||||
|
- [ ] Desmarca **Suggestions from the web**
|
||||||
|
- [ ] Desmarque **Suggestions from sponsors**
|
||||||
|
|
||||||
##### Desinfectar al cerrar
|
##### Desinfectar al cerrar
|
||||||
|
|
||||||
Si deseas seguir conectado a determinados sitios, puede permitir excepciones en **Cookies y datos del sitio** → **Administrar excepciones....**
|
Si deseas seguir conectado a determinados sitios, puedes permitir excepciones en **Cookies y datos del sitio** → **Gestionar excepciones....**
|
||||||
|
|
||||||
- [x] Marque **Eliminar cookies y datos del sitio cuando se cierra Firefox**
|
- [x] Selecciona **Eliminar cookies y datos del sitio cuando cierre Firefox**
|
||||||
|
|
||||||
Esto le protege de las cookies persistentes, pero no le protege de las cookies adquiridas durante una sesión de navegación. Cuando esta opción está activada, es posible limpiar fácilmente las cookies del navegador simplemente reiniciando Firefox. Puedes establece excepciones por sitio, si desea permanecer conectado a un sitio concreto que visite con frecuencia.
|
Esto te protege de las cookies persistentes, pero no te protege de las cookies adquiridas durante una sesión de navegación. Cuando esta opción está activada, es posible limpiar fácilmente las cookies del navegador simplemente reiniciando Firefox. Puedes establecer excepciones por sitio, si deseas permanecer conectado a un sitio concreto que visites con frecuencia.
|
||||||
|
|
||||||
##### Buscar sugerencias
|
|
||||||
|
|
||||||
- [ ] Desmarque **Proporcionar sugerencias de búsqueda**
|
|
||||||
|
|
||||||
Es posible que las funciones de sugerencia de búsqueda no estén disponibles en su región.
|
|
||||||
|
|
||||||
Las sugerencias de búsqueda envían todo lo que escribe en la barra de direcciones al motor de búsqueda predeterminado, independientemente de si realiza una búsqueda real. Desactivar las sugerencias de búsqueda le permite controlar con mayor precisión los datos que envía al proveedor de su motor de búsqueda.
|
|
||||||
|
|
||||||
##### Telemetría
|
##### Telemetría
|
||||||
|
|
||||||
- [ ] Desmarque **Permitir que Firefox envíe infromación técnica y de interacción a Mozilla**
|
- [ ] Desmarca **Permitir a Firefox enviar datos técnicos y de interacción a Mozilla**
|
||||||
- [ ] Desmarque **Permitir Firefox para instalar y ejecutar estudios**
|
- [ ] Desmarca **Permitir que Firefox instale y ejecute estudios**
|
||||||
- [ ] Desmarque **Permitir que Firefox envié informes de fallos acumulados en tu nombre**
|
- [ ] Desmarca **Permitir que Firefox envíe informes de fallos acumulados en su nombre**
|
||||||
|
|
||||||
> Firefox envía datos sobre su versión e idioma de Firefox; sistema operativo del dispositivo y configuración del hardware; memoria, información básica sobre fallos y errores; resultado de procesos automatizados como actualizaciones, navegación segura y activación. Cuando Firefox envía datos, su dirección IP se recoge temporalmente como parte de los registros de nuestro servidor.
|
> Firefox envía datos sobre tu versión e idioma de Firefox; sistema operativo del dispositivo y configuración del hardware; memoria, información básica sobre fallos y errores; resultado de procesos automatizados como actualizaciones, navegación segura y activación. Cuando Firefox envía datos, tu dirección IP se recoge temporalmente como parte de los registros de nuestro servidor.
|
||||||
|
|
||||||
Además, el servicio Firefox Accounts recoge [algunos datos técnicos](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). Si usa una cuenta de Firefox, puede excluir:
|
Además, el servicio Firefox Accounts recoge [algunos datos técnicos](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). Si usas una cuenta de Firefox, puedes excluir:
|
||||||
|
|
||||||
1. Abra la [configuración de su perfil en accounts.firefox.com](https://accounts.firefox.com/settings#data-collection)
|
1. Abre la [configuración de tu perfil en accounts.firefox.com](https://accounts.firefox.com/settings#data-collection)
|
||||||
2. Desmarque **Recopilación y uso de datos** > **Ayuda a mejorar Cuentas de Firefox**
|
2. Desmarca **Recopilación y uso de datos** > **Ayuda a mejorar Cuentas de Firefox**
|
||||||
|
|
||||||
##### Modo solo HTTPS
|
##### Modo solo HTTPS
|
||||||
|
|
||||||
- [x] Seleccione **Habilitar el modo solo HTTPS en todas las ventanas**
|
- [x] Selecciona **Activar el modo solo-HTTPS en todas las ventanas**
|
||||||
|
|
||||||
Esto evita que se conecte involuntariamente a un sitio web en texto plano HTTP. Los sitios sin HTTPS son poco comunes hoy en día, por lo que esto debería tener poco o ningún impacto en su navegación diaria.
|
Esto evita que te conectes involuntariamente a un sitio web en texto plano HTTP. Los sitios sin HTTPS son poco comunes hoy en día, por lo que esto debería tener poco o ningún impacto en tu navegación diaria.
|
||||||
|
|
||||||
### Firefox Sync
|
#### Sincronización
|
||||||
|
|
||||||
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) permite que sus datos de navegación (historial, marcadores, etc.) sean accesibles en todos sus dispositivos y los protege con E2EE.
|
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) permite que tus datos de navegación (historial, marcadores, etc.) sean accesibles desde todos tus dispositivos y los protege con E2EE.
|
||||||
|
|
||||||
### Arkenfox (avanzado)
|
### Arkenfox (avanzado)
|
||||||
|
|
||||||
!!! tip "Use Mullvad Browser for advanced anti-fingerprinting"
|
!!! tip "Consejo" "Utiliza Mullvad Browser para la protección avanzada contra huella digital"
|
||||||
|
|
||||||
[Mullvad Browser](#mullvad-browser) provides the same anti-fingerprinting protections as Arkenfox out of the box, and does not require the use of Mullvad's VPN to benefit from these protections. Coupled with a VPN, Mullvad Browser can thwart more advanced tracking scripts which Arkenfox cannot. Arkenfox still has the advantage of being much more flexible, and allowing per-site exceptions for websites which you need to stay logged in to.
|
[Mullvad Browser](#mullvad-browser) proporciona las mismas protecciones anti-fingerprinting que Arkenfox, y no requiere el uso de la VPN de Mullvad para beneficiarse de estas protecciones. Junto con una VPN, Mullvad Browser puede frustrar scripts de rastreo más avanzados que Arkenfox no puede. Arkenfox sigue teniendo la ventaja de ser mucho más flexible y de permitir excepciones por sitio para los sitios web en los que es necesario permanecer conectado.
|
||||||
|
|
||||||
El [proyecto Arkenfox](https://github.com/arkenfox/user.js) proporciona un conjunto de opciones cuidadosamente consideradas para Firefox. Si [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) utilizar Arkenfox, unas [pocas opciones](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) son subjetivamente estrictas y/o pueden hacer que algunos sitios web no funcionen correctamente - [lo que puede cambiar fácilmente](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) para adaptarse a sus necesidades. Nosotros **recomendamos encarecidamente** que lea su [wiki ](https://github.com/arkenfox/user.js/wiki)(lamentablemente solo en inglés). Arkenfox también permite el soporte de [contenedores](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users).
|
El [proyecto Arkenfox](https://github.com/arkenfox/user.js) proporciona un conjunto de opciones cuidadosamente consideradas para Firefox. Si [decides](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) utilizar Arkenfox, unas [pocas opciones](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) son subjetivamente estrictas y/o pueden hacer que algunos sitios web no funcionen correctamente - [que puede cambiar fácilmente](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) para adaptarse a tus necesidades. Nosotros **recomendamos encarecidamente** que leas su [wiki ](https://github.com/arkenfox/user.js/wiki)(lamentablemente solo en inglés). Arkenfox también permite el soporte de [contenedores](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users).
|
||||||
|
|
||||||
Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing.
|
Arkenfox sólo pretende frustrar los scripts de rastreo básicos o primitivos mediante la aleatorización del lienzo (canvas randomization) y los ajustes de configuración de resistencia a las huellas digitales incorporados en Firefox. No pretende hacer que tu navegador se mezcle con una gran multitud de otros usuarios de Arkenfox de la misma manera que lo hacen Mullvad Browser o Tor Browser, que es la única manera de frustrar los scripts avanzados de rastreo de huellas dactilares. Recuerda que siempre puedes utilizar varios navegadores, por ejemplo, podrías considerar utilizar Firefox+Arkenfox para algunos sitios en los que quieras mantener la sesión iniciada o en los que confíes, y Mullvad Browser para la navegación general.
|
||||||
|
|
||||||
## Brave
|
## Brave
|
||||||
|
|
||||||
@ -212,7 +221,9 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand
|
|||||||
|
|
||||||
Estas opciones se encuentran en :material-menu: → **Configuración**.
|
Estas opciones se encuentran en :material-menu: → **Configuración**.
|
||||||
|
|
||||||
##### Protecciones
|
#### Configuración
|
||||||
|
|
||||||
|
##### Escudos
|
||||||
|
|
||||||
Brave incluye algunas medidas anti-fingerprinting en su función de [Escudos](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Sugerimos configurar estas opciones [globalmente](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) en todas las páginas que visite.
|
Brave incluye algunas medidas anti-fingerprinting en su función de [Escudos](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Sugerimos configurar estas opciones [globalmente](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) en todas las páginas que visite.
|
||||||
|
|
||||||
@ -220,14 +231,14 @@ Las opciones de los escudos pueden reducirse según las necesidades de cada siti
|
|||||||
|
|
||||||
<div class="annotate" markdown>
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
- [x] Seleccione **Impedir que los sitios obtengan mis huellas digitales en función de mis preferencias de idioma**
|
- [x] Selecciona **Impedir que los sitios obtengan mis huellas digitales en función de mis preferencias de idioma**
|
||||||
- [x] Selecciona **Agresivo** en Bloqueo de rastreadores y anuncios
|
- [x] Selecciona **Agresivo** en Bloqueo de rastreadores y anuncios
|
||||||
|
|
||||||
??? advertencia "Use listas de filtros predeterminadas"
|
??? advertencia "Usa listas de filtros predeterminadas"
|
||||||
Brave le permite seleccionar filtros de contenido adicionales dentro de la página interna `brave://adblock`. Le aconsejamos que no utilice esta función; en su lugar, mantenga las listas de filtros predeterminadas. El uso de listas adicionales le hará destacar entre los demás usuarios de Brave y también puede aumentar la superficie de ataque si hay un exploit en Brave y se añade una regla maliciosa a una de las listas que utiliza.
|
Brave te permite seleccionar filtros de contenido adicionales dentro de la página interna `brave://adblock`. Te aconsejamos que no utilices esta función; en su lugar, mantén las listas de filtros predeterminadas. El uso de listas adicionales te hará destacar entre los demás usuarios de Brave y también puede aumentar la superficie de ataque si hay un exploit en Brave y se añade una regla maliciosa a una de las listas que utilizas.
|
||||||
|
|
||||||
- [x] (Opcional) Seleccione **Bloquear Scripts** (1)
|
- [x] (Opcional) Selecciona **Bloquear Scripts** (1)
|
||||||
- [x] Seleccione **Estricto, puede dañar los sitios** en Bloquear huellas digitales
|
- [x] Selecciona **Estricto, puede dañar los sitios** en Bloquear huellas digitales
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
@ -235,49 +246,46 @@ Las opciones de los escudos pueden reducirse según las necesidades de cada siti
|
|||||||
|
|
||||||
##### Bloqueo de RRSS
|
##### Bloqueo de RRSS
|
||||||
|
|
||||||
- [ ] Desmarque todos los componentes de redes sociales
|
- [ ] Desmarca todos los componentes de redes sociales
|
||||||
|
|
||||||
##### Privacidad y seguridad
|
##### Privacidad y seguridad
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
- [x] Selecciona **Desactivar UDP no proxy** en [Política de gestión de IP de WebRTC](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)
|
- [x] Selecciona **Desactivar el UDP sin proxy** en [Política de gestión de IP de WebRTC](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)
|
||||||
- [ ] Desmarca **Utilizar los servicios de Google para la mensajería push**
|
- [ ] Desmarca **Utiliza los servicios de Google para la mensajería push**
|
||||||
- [ ] Desmarca **Permitir análisis de productos que preservan la privacidad (P3A)**
|
- [ ] Desmarca **Permitir estadísticas del producto con preservación de la privacidad (P3A)**
|
||||||
- ¡[ ] Desmarcar **Enviar automáticamente ping de uso diario a Brave**
|
- [ ] Desmarca **Enviar automáticamente el ping de uso diario a Brave**
|
||||||
- [ ] Desmarca **Enviar automáticamente informes de diagnóstico**
|
- [ ] Desmarca **Enviar informes de diagnóstico automáticamente**
|
||||||
- [x] Selecciona **Usar siempre conexiones seguras** en el menú **Seguridad**
|
- [x] Selecciona **Usar siempre conexiones seguras** en el menú **Seguridad**
|
||||||
- [ ] Desmarca **Ventana privada con Tor** (1)
|
- [ ] Desmarca **Ventana privada con Tor** (1)
|
||||||
|
|
||||||
!!! consejo "Desinfectar al cerrar"
|
!!! tip "Desinfectar al cerrar"
|
||||||
|
|
||||||
- [x] Selecciona **Borrar cookies y datos de sitios al cerrar todas las ventanas** en el menú *Cookies y otros datos de sitios*
|
- [x] Selecciona **Borrar cookies y datos de sitios al cerrar todas las ventanas** en el menú *Cookies y otros datos de sitios*
|
||||||
|
|
||||||
Si deseas permanecer conectado a un sitio concreto que visitas con frecuencia, puedes establecer excepciones por sitio en la sección *Comportamientos personalizados*.
|
Si deseas permanecer conectado a un sitio concreto que visitas con frecuencia, puedes establecer excepciones por sitio en la sección *Comportamientos personalizados*.
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
1. Brave **no** es tan resistente a las huellas dactilares como Tor Browser y mucha menos gente usa Brave con Tor, así que usted destacará. Cuando se requiera un [fuerte anonimato](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) utilice [Tor Browser ](tor.md#tor-browser).
|
1. Brave **no** es tan resistente a las huellas digitales como Tor Browser y mucha menos gente usa Brave con Tor, así que destacarás. Cuando necesites un [fuerte anonimato](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) utiliza [Tor Browser ](tor.md#tor-browser).
|
||||||
|
|
||||||
##### Extensiones
|
##### Extensiones
|
||||||
|
|
||||||
Desactive las extensiones integradas que no utilice en **Extensiones**
|
Desactiva las extensiones integradas que no utilice en **Extensiones**
|
||||||
|
|
||||||
- [ ] Desmarca **Hangouts**
|
- [ ] Desmarca **Hangouts**
|
||||||
- [ ] Desmarca **WebTorrent**
|
- [ ] Desmarca **WebTorrent**
|
||||||
|
|
||||||
##### Web3
|
##### Web3
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
Las funciones Web3 de Brave pueden aumentar potencialmente la huella digital de tu navegador y la superficie de ataque. A menos que utilices alguna de las funciones, deberían estar desactivadas.
|
||||||
|
|
||||||
- [x] Selecciona Deshabilitado en Método para resolver los recursos IPFS (1)
|
- [ ] Establece **Cartera predeterminada de Ethereum** como **Ninguno**
|
||||||
|
- [ ] Establece **Cartera predeterminada de Solana** como **Ninguno**
|
||||||
|
- [ ] Establece **Método para resolver los recursos IPFS** como **Deshabilitado
|
||||||
|
|
||||||
</div>
|
##### Sistema
|
||||||
|
|
||||||
1. El Sistema de Archivos InterPlanetario (IPFS) es una red descentralizada, de igual a igual, para almacenar y compartir datos en un sistema de archivos distribuido. A menos que utilice la función, desactívela.
|
|
||||||
|
|
||||||
##### Ajustes Adicionales
|
|
||||||
|
|
||||||
En el menú *Sistema*
|
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
@ -287,13 +295,19 @@ En el menú *Sistema*
|
|||||||
|
|
||||||
1. Esta opción no está presente en todas las plataformas.
|
1. Esta opción no está presente en todas las plataformas.
|
||||||
|
|
||||||
### Brave Sync
|
#### Sincronización
|
||||||
|
|
||||||
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) permite que sus datos de navegación (historial, marcadores, etc.) sean accesibles en todos sus dispositivos sin necesidad de una cuenta y los protege con E2EE.
|
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) permite que sus datos de navegación (historial, marcadores, etc.) sean accesibles en todos sus dispositivos sin necesidad de una cuenta y los protege con E2EE.
|
||||||
|
|
||||||
|
#### Brave Rewards y Wallet
|
||||||
|
|
||||||
|
**Brave Rewards** te permite recibir la criptomoneda Basic Attention Token (BAT) por realizar ciertas acciones dentro de Brave. Se basa en una cuenta de custodia y KYC de un número selecto de proveedores. No recomendamos BAT como [criptomoneda privada](cryptocurrency.md), ni tampoco recomendamos utilizar un [monedero de custodia](advanced/payments.md#other-coins-bitcoin-ethereum-etc), por lo que desaconsejamos utilizar esta función.
|
||||||
|
|
||||||
|
**Brave Wallet** funciona localmente en tu ordenador, pero no admite ninguna criptomoneda privada, por lo que desaconsejamos utilizar esta función también.
|
||||||
|
|
||||||
## Recursos Adicionales
|
## Recursos Adicionales
|
||||||
|
|
||||||
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. Sin embargo, uBlock Origin puede resultarte útil si valoras la funcionalidad de bloqueo de contenidos.
|
En general, recomendamos mantener las extensiones al mínimo; ya que tienen acceso privilegiado dentro de su navegador y requieren que confíes en el desarrollador, pueden hacerle [destacar](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), y [debilitan](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) el aislamiento del sitio. Sin embargo, uBlock Origin puede resultarte útil si valoras la funcionalidad de bloqueo de contenidos.
|
||||||
|
|
||||||
### uBlock Origin
|
### uBlock Origin
|
||||||
|
|
||||||
@ -329,7 +343,7 @@ Estas son algunas otras [listas de filtros](https://github.com/gorhill/uBlock/wi
|
|||||||
|
|
||||||
!!! example "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
### Requisitos Mínimos
|
### Requisitos Mínimos
|
||||||
|
|
||||||
|
@ -109,7 +109,7 @@ Proton Mail no ofrece la función de legado digital.
|
|||||||
[:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Politica de Privacidad" }
|
[:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Politica de Privacidad" }
|
||||||
[:octicons-info-16:](https://kb.mailbox.org/en/private){ .card-link title=Documentación}
|
[:octicons-info-16:](https://kb.mailbox.org/en/private){ .card-link title=Documentación}
|
||||||
|
|
||||||
??? downloads "Descargas'
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:octicons-browser-16: Web](https://login.mailbox.org)
|
- [:octicons-browser-16: Web](https://login.mailbox.org)
|
||||||
|
|
||||||
|
@ -222,7 +222,7 @@ Las herramientas con interfaces de línea de comandos son útiles para integrar
|
|||||||
[:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-windows11: Windows](https://www.kryptor.co.uk)
|
- [:simple-windows11: Windows](https://www.kryptor.co.uk)
|
||||||
- [:simple-apple: macOS](https://www.kryptor.co.uk)
|
- [:simple-apple: macOS](https://www.kryptor.co.uk)
|
||||||
@ -247,7 +247,7 @@ OpenPGP es a veces necesario para tareas específicas como la firma digital y el
|
|||||||
|
|
||||||
Al cifrar con PGP, tiene la opción de configurar diferentes opciones en su archivo `gpg.conf`. Recomendamos utilizar las opciones estándar especificadas en las preguntas frecuentes de los usuarios de [GnuPG](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).
|
Al cifrar con PGP, tiene la opción de configurar diferentes opciones en su archivo `gpg.conf`. Recomendamos utilizar las opciones estándar especificadas en las preguntas frecuentes de los usuarios de [GnuPG](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).
|
||||||
|
|
||||||
!!! consejo "Utilice future defaults al generar una clave"
|
!!! tip "Utilice future defaults al generar una clave"
|
||||||
|
|
||||||
Al [generar claves](https://www.gnupg.org/gph/en/manual/c14.html) sugerimos usar el comando `future-default` ya que esto instruirá a GnuPG a usar criptografía moderna como [Curve25519](https://es.wikipedia.org/wiki/Curve25519#Popularidad) y [Ed25519](https://ed25519.cr.yp.to/):
|
Al [generar claves](https://www.gnupg.org/gph/en/manual/c14.html) sugerimos usar el comando `future-default` ya que esto instruirá a GnuPG a usar criptografía moderna como [Curve25519](https://es.wikipedia.org/wiki/Curve25519#Popularidad) y [Ed25519](https://ed25519.cr.yp.to/):
|
||||||
|
|
||||||
@ -268,7 +268,7 @@ Al cifrar con PGP, tiene la opción de configurar diferentes opciones en su arch
|
|||||||
[:octicons-info-16:](https://gnupg.org/documentation/index.html){ .card-link title=Documentación}
|
[:octicons-info-16:](https://gnupg.org/documentation/index.html){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain)
|
||||||
- [:simple-windows11: Windows](https://gpg4win.org/download.html)
|
- [:simple-windows11: Windows](https://gpg4win.org/download.html)
|
||||||
@ -289,7 +289,7 @@ Al cifrar con PGP, tiene la opción de configurar diferentes opciones en su arch
|
|||||||
[:octicons-code-16:](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpg4win.git;a=summary){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpg4win.git;a=summary){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://gpg4win.org/donate.html){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://gpg4win.org/donate.html){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-windows11: Windows](https://gpg4win.org/download.html)
|
- [:simple-windows11: Windows](https://gpg4win.org/download.html)
|
||||||
|
|
||||||
@ -312,7 +312,7 @@ Al cifrar con PGP, tiene la opción de configurar diferentes opciones en su arch
|
|||||||
[:octicons-info-16:](https://gpgtools.tenderapp.com/kb){ .card-link title=Documentación}
|
[:octicons-info-16:](https://gpgtools.tenderapp.com/kb){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/GPGTools){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/GPGTools){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-apple: macOS](https://gpgtools.org)
|
- [:simple-apple: macOS](https://gpgtools.org)
|
||||||
|
|
||||||
@ -329,7 +329,7 @@ Al cifrar con PGP, tiene la opción de configurar diferentes opciones en su arch
|
|||||||
[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentación}
|
[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain)
|
||||||
|
|
||||||
@ -337,7 +337,7 @@ Al cifrar con PGP, tiene la opción de configurar diferentes opciones en su arch
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -41,7 +41,7 @@ ffsend upload --host https://send.vis.ee/ FILE
|
|||||||
[:octicons-info-16:](https://docs.onionshare.org){ .card-link title=Documentation}
|
[:octicons-info-16:](https://docs.onionshare.org){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/onionshare/onionshare){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/onionshare/onionshare){ .card-link title="Source Code" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-windows11: Windows](https://onionshare.org/#download)
|
- [:simple-windows11: Windows](https://onionshare.org/#download)
|
||||||
- [:simple-apple: macOS](https://onionshare.org/#download)
|
- [:simple-apple: macOS](https://onionshare.org/#download)
|
||||||
@ -51,7 +51,7 @@ ffsend upload --host https://send.vis.ee/ FILE
|
|||||||
|
|
||||||
**Por favor, tome en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** En adición a [nuestros criterios estándares](about/criteria.md), hemos desarrollado un claro conjunto de requisitos para permitirnos brindar recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista antes de optar por utilizar un proyecto, y realizar su propia investigación para asegurarse que es la elección adecuada.
|
**Por favor, tome en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** En adición a [nuestros criterios estándares](about/criteria.md), hemos desarrollado un claro conjunto de requisitos para permitirnos brindar recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista antes de optar por utilizar un proyecto, y realizar su propia investigación para asegurarse que es la elección adecuada.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna pregunta sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no consideramos algo al hacer nuestras recomendaciones, si no se encuentra listado aquí. Hay múltiples factores considerados y discutidos cuando recomendamos un proyecto, y documentar cada uno es un trabajo en progreso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna pregunta sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no consideramos algo al hacer nuestras recomendaciones, si no se encuentra listado aquí. Hay múltiples factores considerados y discutidos cuando recomendamos un proyecto, y documentar cada uno es un trabajo en progreso.
|
||||||
|
|
||||||
@ -88,7 +88,7 @@ ffsend upload --host https://send.vis.ee/ FILE
|
|||||||
[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102)
|
||||||
@ -115,7 +115,7 @@ ffsend upload --host https://send.vis.ee/ FILE
|
|||||||
[:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid)
|
||||||
- [:simple-windows11: Windows](https://syncthing.net/downloads/)
|
- [:simple-windows11: Windows](https://syncthing.net/downloads/)
|
||||||
@ -129,7 +129,7 @@ ffsend upload --host https://send.vis.ee/ FILE
|
|||||||
|
|
||||||
**Por favor, tome en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** En adición a [nuestros criterios estándares](about/criteria.md), hemos desarrollado un claro conjunto de requisitos para permitirnos brindar recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista antes de optar por utilizar un proyecto, y realizar su propia investigación para asegurarse que es la elección adecuada.
|
**Por favor, tome en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** En adición a [nuestros criterios estándares](about/criteria.md), hemos desarrollado un claro conjunto de requisitos para permitirnos brindar recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista antes de optar por utilizar un proyecto, y realizar su propia investigación para asegurarse que es la elección adecuada.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ Realizar pagos en línea es uno de los principales desafíos para la privacidad.
|
|||||||
|
|
||||||
Hay una serie de servicios que ofrecen "tarjetas de débito virtuales" que puede utilizar con comercios en línea sin revelar sus datos bancarios o de facturación reales en la mayoría de los casos. Es importante tener en cuenta que estos servicios financieros **no** son anónimos y están sujetos a las leyes de "Conozca a su cliente" (KYC) y pueden requerir su DNI u otra información identificativa. Estos servicios son útiles principalmente para protegerle de las filtraciones de datos de los comercios, del seguimiento menos sofisticado o de la correlación de compras por parte de las agencias de marketing y del robo de datos en línea; y **no** para realizar una compra de forma totalmente anónima.
|
Hay una serie de servicios que ofrecen "tarjetas de débito virtuales" que puede utilizar con comercios en línea sin revelar sus datos bancarios o de facturación reales en la mayoría de los casos. Es importante tener en cuenta que estos servicios financieros **no** son anónimos y están sujetos a las leyes de "Conozca a su cliente" (KYC) y pueden requerir su DNI u otra información identificativa. Estos servicios son útiles principalmente para protegerle de las filtraciones de datos de los comercios, del seguimiento menos sofisticado o de la correlación de compras por parte de las agencias de marketing y del robo de datos en línea; y **no** para realizar una compra de forma totalmente anónima.
|
||||||
|
|
||||||
!!! consejo "Compruebe su banco actual"
|
!!! tip "Compruebe su banco actual"
|
||||||
|
|
||||||
Muchos bancos y proveedores de tarjetas de crédito ofrecen funciones nativas de tarjeta virtual. Si ya utiliza uno que ofrezca esta opción, debería utilizarlo en lugar de las siguientes recomendaciones en la mayoría de los casos. De este modo, no estará confiando su información personal a varias personas.
|
Muchos bancos y proveedores de tarjetas de crédito ofrecen funciones nativas de tarjeta virtual. Si ya utiliza uno que ofrezca esta opción, debería utilizarlo en lugar de las siguientes recomendaciones en la mayoría de los casos. De este modo, no estará confiando su información personal a varias personas.
|
||||||
|
|
||||||
@ -47,7 +47,7 @@ Privacy.com facilita por defecto a su banco información sobre los comercios en
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de elegir utilizar un proyecto y realizar su propia investigación para asegurarse que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de elegir utilizar un proyecto y realizar su propia investigación para asegurarse que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
@ -86,7 +86,7 @@ Estos servicios le permiten comprar tarjetas de regalo para una gran variedad de
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de elegir utilizar un proyecto y realizar su propia investigación para asegurarse que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de elegir utilizar un proyecto y realizar su propia investigación para asegurarse que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -24,11 +24,11 @@ A veces, los servicios intentarán obligarle a registrarse mediante el bloqueo a
|
|||||||
[:octicons-info-16:](https://codeberg.org/librarian/librarian/wiki){ .card-link title=Documentación}
|
[:octicons-info-16:](https://codeberg.org/librarian/librarian/wiki){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://codeberg.org/librarian/librarian){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://codeberg.org/librarian/librarian){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
!!! advertencia
|
!!! warning "Advertencia"
|
||||||
|
|
||||||
Librarian no proporciona un proxy para los vídeos por defecto. Los vídeos vistos a través de Librarian seguirán realizando conexiones directas a los servidores de Odysee (por ejemplo, 'odycdn.com'); sin embargo, algunas instancias pueden habilitar el proxy, lo que se detallaría en la política de privacidad de la instancia.
|
Librarian no proporciona un proxy para los vídeos por defecto. Los vídeos vistos a través de Librarian seguirán realizando conexiones directas a los servidores de Odysee (por ejemplo, 'odycdn.com'); sin embargo, algunas instancias pueden habilitar el proxy, lo que se detallaría en la política de privacidad de la instancia.
|
||||||
|
|
||||||
!!! consejo
|
!!! tip "Consejo"
|
||||||
|
|
||||||
Librarian es útil si quiere ver contenido LBRY en el móvil sin telemetría obligatoria y si quiere desactivar JavaScript en su navegador, como es el caso de [Tor Browser](https://www.torproject.org/) en el nivel de seguridad Más Seguro.
|
Librarian es útil si quiere ver contenido LBRY en el móvil sin telemetría obligatoria y si quiere desactivar JavaScript en su navegador, como es el caso de [Tor Browser](https://www.torproject.org/) en el nivel de seguridad Más Seguro.
|
||||||
|
|
||||||
@ -54,7 +54,7 @@ Cuando utilice una instancia de Librarian, asegúrese de leer la política de pr
|
|||||||
[:octicons-code-16:](https://github.com/zedeus/nitter){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/zedeus/nitter){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://github.com/zedeus/nitter#nitter){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://github.com/zedeus/nitter#nitter){ .card-link title=Contribuir }
|
||||||
|
|
||||||
!!! consejo
|
!!! tip "Consejo"
|
||||||
|
|
||||||
Nitter es útil si quiere navegar por el contenido de Twitter sin tener que iniciar sesión y si quieres desactiva JavaScript en su navegador, como es el caso de [Tor Browser](https://www.torproject.org/) en el nivel de seguridad Más Seguro. También le permite [crear canales RSS para Twitter](news-aggregators.md#twitter).
|
Nitter es útil si quiere navegar por el contenido de Twitter sin tener que iniciar sesión y si quieres desactiva JavaScript en su navegador, como es el caso de [Tor Browser](https://www.torproject.org/) en el nivel de seguridad Más Seguro. También le permite [crear canales RSS para Twitter](news-aggregators.md#twitter).
|
||||||
|
|
||||||
@ -79,7 +79,7 @@ Cuando utilice una instancia de Nitter, asegúrese de leer la política de priva
|
|||||||
[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentación}
|
[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
!!! consejo
|
!!! tip "Consejo"
|
||||||
|
|
||||||
PorxiTok es útil si quiere desactivar JavaScript en su navegador como en el navegador [Tor](https://www.torproject.org/) en la configuración de seguridad Más Segura.
|
PorxiTok es útil si quiere desactivar JavaScript en su navegador como en el navegador [Tor](https://www.torproject.org/) en la configuración de seguridad Más Segura.
|
||||||
|
|
||||||
@ -105,14 +105,14 @@ Cuando utilice una instancia de ProxiTok, asegúrese de leer la política de pri
|
|||||||
[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-windows11: Windows](https://freetubeapp.io/#download)
|
- [:simple-windows11: Windows](https://freetubeapp.io/#download)
|
||||||
- [:simple-apple: macOS](https://freetubeapp.io/#download)
|
- [:simple-apple: macOS](https://freetubeapp.io/#download)
|
||||||
- [:simple-linux: Linux](https://freetubeapp.io/#download)
|
- [:simple-linux: Linux](https://freetubeapp.io/#download)
|
||||||
- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube)
|
- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube)
|
||||||
|
|
||||||
!!! advertencia
|
!!! warning "Advertencia"
|
||||||
|
|
||||||
Al utilizar FreeTube, su dirección IP puede seguir siendo conocida por YouTube, [Invidious](https://instances.invidious.io), o [SponsorBlock](https://sponsor.ajay.app/) dependiendo de su configuración. Considere la posibilidad de utilizar una [VPN](vpn.md) o [Tor](https://www.torproject.org) si su [modelo de amenaza](basics/threat-modeling.md) requiere ocultar su dirección IP.
|
Al utilizar FreeTube, su dirección IP puede seguir siendo conocida por YouTube, [Invidious](https://instances.invidious.io), o [SponsorBlock](https://sponsor.ajay.app/) dependiendo de su configuración. Considere la posibilidad de utilizar una [VPN](vpn.md) o [Tor](https://www.torproject.org) si su [modelo de amenaza](basics/threat-modeling.md) requiere ocultar su dirección IP.
|
||||||
|
|
||||||
@ -132,12 +132,12 @@ Cuando utilice una instancia de ProxiTok, asegúrese de leer la política de pri
|
|||||||
[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629)
|
- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629)
|
||||||
- [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
|
- [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
|
||||||
|
|
||||||
!!! advertencia
|
!!! warning "Advertencia"
|
||||||
|
|
||||||
Al utilizar Yattee, su dirección IP puede seguir siendo conocida por YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances/) o [SponsorBlock](https://sponsor.ajay.app/) dependiendo de su configuración. Considere la posibilidad de utilizar una [VPN](vpn.md) o [Tor](https://www.torproject.org) si su [modelo de amenaza](basics/threat-modeling.md) requiere ocultar su dirección IP.
|
Al utilizar Yattee, su dirección IP puede seguir siendo conocida por YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances/) o [SponsorBlock](https://sponsor.ajay.app/) dependiendo de su configuración. Considere la posibilidad de utilizar una [VPN](vpn.md) o [Tor](https://www.torproject.org) si su [modelo de amenaza](basics/threat-modeling.md) requiere ocultar su dirección IP.
|
||||||
|
|
||||||
@ -159,11 +159,11 @@ Por defecto, Yattee bloquea todos los anuncios de YouTube. Además, Yattee se in
|
|||||||
[:octicons-info-16:](https://github.com/libre-tube/LibreTube#readme){ .card-link title=Documentación}
|
[:octicons-info-16:](https://github.com/libre-tube/LibreTube#readme){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases)
|
- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases)
|
||||||
|
|
||||||
!!! advertencia
|
!!! warning "Advertencia"
|
||||||
|
|
||||||
Al usar LibreTube, su dirección IP será visible para la instancia [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) que elija y/o [SponsorBlock](https://sponsor.ajay.app/) dependiendo de su configuración. Considere la posibilidad de utilizar una [VPN](vpn.md) o [Tor](https://www.torproject.org) si su [modelo de amenaza](basics/threat-modeling.md) requiere ocultar su dirección IP.
|
Al usar LibreTube, su dirección IP será visible para la instancia [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) que elija y/o [SponsorBlock](https://sponsor.ajay.app/) dependiendo de su configuración. Considere la posibilidad de utilizar una [VPN](vpn.md) o [Tor](https://www.torproject.org) si su [modelo de amenaza](basics/threat-modeling.md) requiere ocultar su dirección IP.
|
||||||
|
|
||||||
@ -185,13 +185,13 @@ Por defecto, LibreTube bloquea todos los anuncios de YouTube. Además, Libretube
|
|||||||
[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases)
|
- [:simple-github: GitHub](https://github.com/TeamNewPipe/NewPipe/releases)
|
||||||
|
|
||||||
1. La instancia por defecto es [FramaTube](https://framatube.org/), sin embargo, se pueden añadir más a través de **Ajustes** → **Contenido** → **Instancias de PeerTube**
|
1. La instancia por defecto es [FramaTube](https://framatube.org/), sin embargo, se pueden añadir más a través de **Ajustes** → **Contenido** → **Instancias de PeerTube**
|
||||||
|
|
||||||
!!! Advertencia
|
!!! warning "Advertencia"
|
||||||
|
|
||||||
Al utilizar NewPipe, su dirección IP será visible para los proveedores de vídeo utilizados. Considere la posibilidad de utilizar una [VPN](vpn.md) o [Tor](https://www.torproject.org) si su [modelo de amenaza](basics/threat-modeling.md) requiere ocultar su dirección IP.
|
Al utilizar NewPipe, su dirección IP será visible para los proveedores de vídeo utilizados. Considere la posibilidad de utilizar una [VPN](vpn.md) o [Tor](https://www.torproject.org) si su [modelo de amenaza](basics/threat-modeling.md) requiere ocultar su dirección IP.
|
||||||
|
|
||||||
@ -212,11 +212,11 @@ Por defecto, LibreTube bloquea todos los anuncios de YouTube. Además, Libretube
|
|||||||
[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribuir }
|
||||||
|
|
||||||
!!! advertencia
|
!!! warning "Advertencia"
|
||||||
|
|
||||||
Invidious no proporciona un proxy para los vídeos por defecto. Los vídeos que se vean a través de Invidious seguirán realizando conexiones directas a los servidores de Google (ej. 'googlevideo.com'); sin embargo, algunas instancias admiten el proxy de vídeo; basta con habilitar *Proxy videos* en la configuración de las instancias o añadir `&local=true` a la URL.
|
Invidious no proporciona un proxy para los vídeos por defecto. Los vídeos que se vean a través de Invidious seguirán realizando conexiones directas a los servidores de Google (ej. 'googlevideo.com'); sin embargo, algunas instancias admiten el proxy de vídeo; basta con habilitar *Proxy videos* en la configuración de las instancias o añadir `&local=true` a la URL.
|
||||||
|
|
||||||
!!! consejo
|
!!! tip "Consejo"
|
||||||
|
|
||||||
Invidious es útil si quiere desactivar JavaScript en su navegador como en el navegador [Tor](https://www.torproject.org/) en la configuración de seguridad Msás Segura. No proporciona privacidad por sí mismo y no se recomienda entrar con ninguna cuenta.
|
Invidious es útil si quiere desactivar JavaScript en su navegador como en el navegador [Tor](https://www.torproject.org/) en la configuración de seguridad Msás Segura. No proporciona privacidad por sí mismo y no se recomienda entrar con ninguna cuenta.
|
||||||
|
|
||||||
@ -240,7 +240,7 @@ Cuando utilice una instancia de Invidious, asegúrese de leer la política de pr
|
|||||||
[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribuir }
|
||||||
|
|
||||||
!!! consejo
|
!!! tip "Consejo"
|
||||||
|
|
||||||
Piped es útil si desea utilizar [SponsorBlock](https://sponsor.ajay.app) sin instalar una extensión o acceder a contenidos restringidos por edad sin una cuenta. No proporciona privacidad por sí mismo y no se recomienda entrar con ninguna cuenta.
|
Piped es útil si desea utilizar [SponsorBlock](https://sponsor.ajay.app) sin instalar una extensión o acceder a contenidos restringidos por edad sin una cuenta. No proporciona privacidad por sí mismo y no se recomienda entrar con ninguna cuenta.
|
||||||
|
|
||||||
@ -252,7 +252,7 @@ Cuando utilice una instancia de Piped, asegúrese de leer la política de privac
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ Al igual que el derecho al matrimonio interracial, el sufragio femenino, la libe
|
|||||||
|
|
||||||
No deberías confundir privacidad con secretismo. Sabemos lo que pasa en el cuarto de baño, pero aún así cierras la puerta. Esto se debe a que quieres privacidad, no secretismo. **Todo el mundo** tiene algo que proteger. La privacidad es algo que nos hace humanos.
|
No deberías confundir privacidad con secretismo. Sabemos lo que pasa en el cuarto de baño, pero aún así cierras la puerta. Esto se debe a que quieres privacidad, no secretismo. **Todo el mundo** tiene algo que proteger. La privacidad es algo que nos hace humanos.
|
||||||
|
|
||||||
[:material-target-account: Amenazas frecuentes en el internet](basics/common-threats.md ""){.md-button.md-button--primary}
|
[:material-target-account: Amenazas Comunes en Internet](basics/common-threats.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## ¿Qué debo hacer?
|
## ¿Qué debo hacer?
|
||||||
|
|
||||||
@ -53,11 +53,11 @@ Intentar proteger todos tus datos de todo el mundo y en todo momento es impráct
|
|||||||
|
|
||||||
==Este proceso de identificación de amenazas y definición de contramedidas se llama **modelado de amenazas**==, y constituye la base de todo buen plan de seguridad y privacidad.
|
==Este proceso de identificación de amenazas y definición de contramedidas se llama **modelado de amenazas**==, y constituye la base de todo buen plan de seguridad y privacidad.
|
||||||
|
|
||||||
[:material-book-outline: Aprende más sobre el modelado de amenazas](basics/threat-modeling.md ""){.md-button.md-button--primary}
|
[:material-book-outline: Más Información sobre el Modelado de Amenazas](basics/threat-modeling.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## ¡Te necesitamos! Aquí está cómo involucrarse:
|
## ¡Te necesitamos! Aquí te indicamos cómo involucrarse:
|
||||||
|
|
||||||
[:simple-discourse:](https://discuss.privacyguides.net/){ title="Únete a nuestro foro" }
|
[:simple-discourse:](https://discuss.privacyguides.net/){ title="Únete a nuestro foro" }
|
||||||
[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Síguenos en Mastodon" }
|
[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Síguenos en Mastodon" }
|
||||||
|
@ -6,7 +6,7 @@ schema:
|
|||||||
-
|
-
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
"@type": WebPage
|
"@type": WebPage
|
||||||
name: Private Mobile Browser Recommendations
|
name: Recomendaciones de Navegadores de Escritorio Privados
|
||||||
url: "./"
|
url: "./"
|
||||||
relatedLink: "../desktop-browsers/"
|
relatedLink: "../desktop-browsers/"
|
||||||
-
|
-
|
||||||
@ -35,7 +35,7 @@ schema:
|
|||||||
url: "./"
|
url: "./"
|
||||||
---
|
---
|
||||||
|
|
||||||
Estos son nuestras recomendaciones actuales sobre navegadores web para móviles y configuraciones para la navegación estándar/no anónima por Internet. Si necesita navegar por Internet de forma anónima, debería utilizar [Tor](tor.md). En general, recomendamos mantener las extensiones al mínimo; tienen acceso privilegiado dentro de su navegador, requieren que confíe en el desarrollador, pueden hacerle [destacar](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), y [debilitar](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) el aislamiento del sitio.
|
Estos son nuestras recomendaciones actuales sobre navegadores web para móviles y configuraciones para la navegación estándar/no anónima por Internet. Si necesitas navegar por Internet de forma anónima, deberías utilizar [Tor](tor.md) . En general, recomendamos mantener las extensiones al mínimo; tienen acceso privilegiado dentro de su navegador, requieren que confíe en el desarrollador, pueden hacerle [destacar](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), y [debilitar](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) el aislamiento del sitio.
|
||||||
|
|
||||||
## Android
|
## Android
|
||||||
|
|
||||||
@ -57,7 +57,7 @@ En Android, Firefox es incluso menos seguro que las alternativas basadas en Chro
|
|||||||
[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentación}
|
[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? notas de descarga
|
??? downloads annotate "Descarga"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser)
|
||||||
- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
|
- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
|
||||||
@ -80,7 +80,7 @@ Las opciones de los escudos pueden reducirse según las necesidades de cada siti
|
|||||||
|
|
||||||
- [x] Seleccione **Agresivo** en Bloquear rastreadores y anuncios
|
- [x] Seleccione **Agresivo** en Bloquear rastreadores y anuncios
|
||||||
|
|
||||||
??? advertencia "Usar listas de filtros predeterminadas"
|
??? warning "Usar listas de filtros predeterminadas"
|
||||||
Brave le permite seleccionar filtros de contenido adicionales dentro de la página interna `brave://adblock`. Desaconsejamos el uso de esta función; en su lugar, mantenga las listas de filtros por defecto. El uso de listas adicionales le hará destacar entre los demás usuarios de Brave y también puede aumentar la superficie de ataque si hay un exploit en Brave y se añade una regla maliciosa a una de las listas que utiliza.
|
Brave le permite seleccionar filtros de contenido adicionales dentro de la página interna `brave://adblock`. Desaconsejamos el uso de esta función; en su lugar, mantenga las listas de filtros por defecto. El uso de listas adicionales le hará destacar entre los demás usuarios de Brave y también puede aumentar la superficie de ataque si hay un exploit en Brave y se añade una regla maliciosa a una de las listas que utiliza.
|
||||||
|
|
||||||
- [x] Seleccione **Mejorar conexiones a HTTPS**
|
- [x] Seleccione **Mejorar conexiones a HTTPS**
|
||||||
@ -195,7 +195,7 @@ Si utilizas iCloud con la Protección de Datos Avanzada desactivada, también te
|
|||||||
[:octicons-info-16:](https://kb.adguard.com/ios){ .card-link title=Documentació}
|
[:octicons-info-16:](https://kb.adguard.com/ios){ .card-link title=Documentació}
|
||||||
[:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162)
|
||||||
|
|
||||||
@ -205,7 +205,7 @@ Las listas de filtros adicionales ralentizan las cosas y pueden aumentar su supe
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -47,11 +47,11 @@ Los modelos de Nitrokey se pueden configurar usando la [aplicación de Nitrokey]
|
|||||||
|
|
||||||
Para los modelos que admiten HOTP y TOTP, hay 3 ranuras para HOTP y 15 para TOTP. Algunas Nitrokeys pueden actuar como administrador de contraseñas. Pueden almacenar 16 credenciales diferentes y cifrarlas utilizando la misma contraseña que la interfaz OpenPGP.
|
Para los modelos que admiten HOTP y TOTP, hay 3 ranuras para HOTP y 15 para TOTP. Algunas Nitrokeys pueden actuar como administrador de contraseñas. Pueden almacenar 16 credenciales diferentes y cifrarlas utilizando la misma contraseña que la interfaz OpenPGP.
|
||||||
|
|
||||||
!!! advertencia
|
!!! warning "Advertencia"
|
||||||
|
|
||||||
Aunque las Nitrokeys no revelan los secretos HOTP/TOTP al dispositivo al que están conectadas, el almacenamiento HOTP y TOTP **no** está cifrado y es vulnerable a ataques físicos. Si desea almacenar con HOTP o TOTP estos secretos, le recomendamos encarecidamente que utilice un Yubikey en su lugar.
|
Aunque las Nitrokeys no revelan los secretos HOTP/TOTP al dispositivo al que están conectadas, el almacenamiento HOTP y TOTP **no** está cifrado y es vulnerable a ataques físicos. Si desea almacenar con HOTP o TOTP estos secretos, le recomendamos encarecidamente que utilice un Yubikey en su lugar.
|
||||||
|
|
||||||
!!! advertencia
|
!!! warning "Advertencia"
|
||||||
|
|
||||||
El restablecimiento de la interfaz OpenPGP en una Nitrokey también hará la base de datos de contraseñas [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset).
|
El restablecimiento de la interfaz OpenPGP en una Nitrokey también hará la base de datos de contraseñas [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset).
|
||||||
|
|
||||||
@ -63,7 +63,7 @@ El firmware de Nitrokey es de código abierto, a diferencia del de YubiKey. El f
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
@ -103,7 +103,7 @@ Recomendamos encarecidamente que utilice aplicaciones TOTP para móviles en luga
|
|||||||
[:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.beemdevelopment.aegis)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.beemdevelopment.aegis)
|
||||||
- [:simple-github: GitHub](https://github.com/beemdevelopment/Aegis/releases)
|
- [:simple-github: GitHub](https://github.com/beemdevelopment/Aegis/releases)
|
||||||
@ -121,7 +121,7 @@ Recomendamos encarecidamente que utilice aplicaciones TOTP para móviles en luga
|
|||||||
[:octicons-code-16:](https://github.com/raivo-otp/ios-application){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/raivo-otp/ios-application){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://raivo-otp.com/donate){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://raivo-otp.com/donate){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/raivo-otp/id1459042137)
|
- [:simple-appstore: App Store](https://apps.apple.com/us/app/raivo-otp/id1459042137)
|
||||||
|
|
||||||
@ -129,11 +129,11 @@ Recomendamos encarecidamente que utilice aplicaciones TOTP para móviles en luga
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
- Source code must be publicly available.
|
- El código fuente debe estar a disposición del público.
|
||||||
- No debe requerir conexión a Internet.
|
- No debe requerir conexión a Internet.
|
||||||
- No debe sincronizarse con un servicio de sincronización/copia de seguridad en la nube de terceros.
|
- No debe sincronizarse con un servicio de sincronización/copia de seguridad en la nube de terceros.
|
||||||
- Es aceptable el soporte de sincronización E2EE** Opcional** con herramientas nativas del sistema operativo, por ejemplo, sincronización cifrada a través de iCloud.
|
- Es aceptable el soporte de sincronización E2EE** Opcional** con herramientas nativas del sistema operativo, por ejemplo, sincronización cifrada a través de iCloud.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: "Lectores de noticias"
|
title: "Lectores de noticias"
|
||||||
icon: octicons/rss-24
|
icon: material/rss
|
||||||
description: Estos clientes para la lectura de noticias le permiten estar al día con sus páginas de noticias favoritas, utilizando estándares de Internet como RSS.
|
description: Estos clientes para la lectura de noticias le permiten estar al día con sus páginas de noticias favoritas, utilizando estándares de Internet como RSS.
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -22,7 +22,7 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma
|
|||||||
[:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.kde.akregator)
|
- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.kde.akregator)
|
||||||
|
|
||||||
@ -38,7 +38,7 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma
|
|||||||
[:octicons-code-16:](https://gitlab.com/spacecowboy/Feeder){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://gitlab.com/spacecowboy/Feeder){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nononsenseapps.feeder.play)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nononsenseapps.feeder.play)
|
||||||
|
|
||||||
@ -56,7 +56,7 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma
|
|||||||
[:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-windows11: Windows](https://hyliu.me/fluent-reader)
|
- [:simple-windows11: Windows](https://hyliu.me/fluent-reader)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1520907427)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1520907427)
|
||||||
@ -73,7 +73,7 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma
|
|||||||
[:octicons-code-16:](https://gitlab.gnome.org/World/gfeeds){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://gitlab.gnome.org/World/gfeeds){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://liberapay.com/gabmus/){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://liberapay.com/gabmus/){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-linux: Linux](https://gfeeds.gabmus.org/#install)
|
- [:simple-linux: Linux](https://gfeeds.gabmus.org/#install)
|
||||||
- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.gabmus.gfeeds)
|
- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.gabmus.gfeeds)
|
||||||
@ -105,7 +105,7 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma
|
|||||||
[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentación}
|
[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210)
|
- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210)
|
||||||
- [:simple-apple: macOS](https://netnewswire.com)
|
- [:simple-apple: macOS](https://netnewswire.com)
|
||||||
@ -126,7 +126,7 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
@ -141,7 +141,7 @@ Algunos servicios de redes sociales también admiten RSS, aunque esto no se suel
|
|||||||
|
|
||||||
Reddit le permite suscribirse a subreddits a través de RSS.
|
Reddit le permite suscribirse a subreddits a través de RSS.
|
||||||
|
|
||||||
!!! ejemplo
|
!!! example "Ejemplo"
|
||||||
Sustituya `subreddit_name` por el subreddit al que desee suscribirse.
|
Sustituya `subreddit_name` por el subreddit al que desee suscribirse.
|
||||||
|
|
||||||
```text
|
```text
|
||||||
@ -152,7 +152,7 @@ Reddit le permite suscribirse a subreddits a través de RSS.
|
|||||||
|
|
||||||
Utilizando cualquiera de las [instancias](https://github.com/zedeus/nitter/wiki/Instances) de Nitter puede suscribirse fácilmente mediante RSS.
|
Utilizando cualquiera de las [instancias](https://github.com/zedeus/nitter/wiki/Instances) de Nitter puede suscribirse fácilmente mediante RSS.
|
||||||
|
|
||||||
!!! ejemplo
|
!!! example "Ejemplo"
|
||||||
1. Elija una instancia y ponga `nitter_instance`.
|
1. Elija una instancia y ponga `nitter_instance`.
|
||||||
2. Sustituya `twitter_account` por el nombre de la cuenta.
|
2. Sustituya `twitter_account` por el nombre de la cuenta.
|
||||||
|
|
||||||
@ -164,7 +164,7 @@ Utilizando cualquiera de las [instancias](https://github.com/zedeus/nitter/wiki/
|
|||||||
|
|
||||||
Puede suscribirse a los canales de YouTube sin iniciar sesión ni asociar la información de uso con su cuenta de Google.
|
Puede suscribirse a los canales de YouTube sin iniciar sesión ni asociar la información de uso con su cuenta de Google.
|
||||||
|
|
||||||
!!! ejemplo
|
!!! example "Ejemplo"
|
||||||
|
|
||||||
Para suscribirse a un canal de YouTube con un cliente RSS, busque primero su [código de canal](https://support.google.com/youtube/answer/6180214), sustituya el `[ID DEl CANAL]` a continuación:
|
Para suscribirse a un canal de YouTube con un cliente RSS, busque primero su [código de canal](https://support.google.com/youtube/answer/6180214), sustituya el `[ID DEl CANAL]` a continuación:
|
||||||
```text
|
```text
|
||||||
|
@ -18,18 +18,13 @@ Si actualmente utilizas una aplicación como Evernote, Google Keep o Microsoft O
|
|||||||
|
|
||||||
**Joplin** es una aplicación gratuita, de código abierto y con todas las funciones para tomar notas y hacer tareas, que puede manejar un gran número de notas markdown organizadas en cuadernos y etiquetas. Ofrece encriptación de extremo a extremo y puede sincronizar a través de Nextcloud, Dropbox y más. También ofrece una fácil importación desde Evernote y notas en texto plano.
|
**Joplin** es una aplicación gratuita, de código abierto y con todas las funciones para tomar notas y hacer tareas, que puede manejar un gran número de notas markdown organizadas en cuadernos y etiquetas. Ofrece encriptación de extremo a extremo y puede sincronizar a través de Nextcloud, Dropbox y más. También ofrece una fácil importación desde Evernote y notas en texto plano.
|
||||||
|
|
||||||
[Visita joplinapp.org](https://joplinapp.org/){ .md-button .md-button--primary }
|
[:octicons-home-16: Página Principal](https://joplinapp.org/){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Política de Privacidad" }
|
||||||
|
[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentación}
|
||||||
|
[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Código Fuente" }
|
||||||
|
[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribuir }
|
||||||
|
|
||||||
**Descargas**
|
??? downloads "Descargas"
|
||||||
- [:fontawesome-brands-windows: Windows](https://joplinapp.org/#desktop-applications)
|
|
||||||
- [:fontawesome-brands-apple: macOS](https://joplinapp.org/#desktop-applications)
|
|
||||||
- [:fontawesome-brands-linux: Linux](https://joplinapp.org/#desktop-applications)
|
|
||||||
- [:fontawesome-brands-firefox-browser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/)
|
|
||||||
- [:fontawesome-brands-chrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjfek)
|
|
||||||
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin)
|
|
||||||
- [:pg-f-droid: F-Droid](https://f-droid.org/es/packages/net.cozic.joplin)
|
|
||||||
- [:fontawesome-brands-android: Android](https://joplinapp.org/#mobile-applications)
|
|
||||||
- [:fontawesome-brands-github: GitHub](https://github.com/laurent22/joplin) descargas
|
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797)
|
- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797)
|
||||||
@ -56,7 +51,7 @@ Joplin no admite la protección mediante contraseña/PIN de la[ propia aplicaci
|
|||||||
[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1285392450)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1285392450)
|
||||||
@ -80,7 +75,7 @@ Joplin no admite la protección mediante contraseña/PIN de la[ propia aplicaci
|
|||||||
[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentación}
|
[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:octicons-globe-16: PWA](https://crypt.ee/download)
|
- [:octicons-globe-16: PWA](https://crypt.ee/download)
|
||||||
|
|
||||||
@ -105,7 +100,7 @@ Cryptee ofrece 100MB de almacenamiento gratuito, con opciones de pago si necesit
|
|||||||
|
|
||||||
**Por favor, ten en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten proporcionar recomendaciones objetivas. Te sugerimos que te familiarices con esta lista antes de elegir usar un proyecto, y que lleves a cabo tu propia investigación para asegurarte de que es la elección correcta para ti.
|
**Por favor, ten en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten proporcionar recomendaciones objetivas. Te sugerimos que te familiarices con esta lista antes de elegir usar un proyecto, y que lleves a cabo tu propia investigación para asegurarte de que es la elección correcta para ti.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -6,7 +6,7 @@ schema:
|
|||||||
-
|
-
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
"@type": WebPage
|
"@type": WebPage
|
||||||
name: Password Manager Recommendations
|
name: Recomendaciones sobre gestores de contraseñas
|
||||||
url: "./"
|
url: "./"
|
||||||
-
|
-
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
@ -14,7 +14,7 @@ schema:
|
|||||||
name: Bitwarden
|
name: Bitwarden
|
||||||
image: /assets/img/password-management/bitwarden.svg
|
image: /assets/img/password-management/bitwarden.svg
|
||||||
url: https://bitwarden.com
|
url: https://bitwarden.com
|
||||||
sameAs: https://en.wikipedia.org/wiki/Bitwarden
|
sameAs: https://es.wikipedia.org/wiki/Bitwarden
|
||||||
applicationCategory: Administrador de contraseñas
|
applicationCategory: Administrador de contraseñas
|
||||||
operatingSystem:
|
operatingSystem:
|
||||||
- Windows
|
- Windows
|
||||||
@ -32,7 +32,7 @@ schema:
|
|||||||
name: 1Password
|
name: 1Password
|
||||||
image: /assets/img/password-management/1password.svg
|
image: /assets/img/password-management/1password.svg
|
||||||
url: https://1password.com
|
url: https://1password.com
|
||||||
sameAs: https://en.wikipedia.org/wiki/1Password
|
sameAs: https://es.wikipedia.org/wiki/1Password
|
||||||
applicationCategory: Administrador de contraseñas
|
applicationCategory: Administrador de contraseñas
|
||||||
operatingSystem:
|
operatingSystem:
|
||||||
- Windows
|
- Windows
|
||||||
@ -64,7 +64,7 @@ schema:
|
|||||||
name: KeePassXC
|
name: KeePassXC
|
||||||
image: /assets/img/password-management/keepassxc.svg
|
image: /assets/img/password-management/keepassxc.svg
|
||||||
url: https://keepassxc.org/
|
url: https://keepassxc.org/
|
||||||
sameAs: https://en.wikipedia.org/wiki/KeePassXC
|
sameAs: https://es.wikipedia.org/wiki/KeePassXC
|
||||||
applicationCategory: Administrador de contraseñas
|
applicationCategory: Administrador de contraseñas
|
||||||
operatingSystem:
|
operatingSystem:
|
||||||
- Windows
|
- Windows
|
||||||
@ -334,7 +334,7 @@ Estos productos son administradores de contraseñas mínimos que se pueden utili
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ La mayoría de las paquetes de ofimática en línea no admiten E2EE, lo que sign
|
|||||||
[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102)
|
||||||
@ -54,7 +54,7 @@ La mayoría de las paquetes de ofimática en línea no admiten E2EE, lo que sign
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
@ -90,7 +90,7 @@ Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto
|
|||||||
[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/)
|
- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/)
|
||||||
- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/)
|
- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/)
|
||||||
@ -113,7 +113,7 @@ Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto
|
|||||||
[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentación}
|
[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id944896972)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id944896972)
|
||||||
@ -127,7 +127,7 @@ Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -28,7 +28,7 @@ Estos servicios de mensajería son ideales para proteger sus comunicaciones conf
|
|||||||
[:octicons-code-16:](https://github.com/signalapp){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/signalapp){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribuir }
|
[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribuir }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id874139669)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id874139669)
|
||||||
@ -58,7 +58,7 @@ Tenemos algunos consejos adicionales para configurar y endurecer su instalación
|
|||||||
[:octicons-info-16:](https://github.com/simplex-chat/simplex-chat/tree/stable/docs){ .card-link title=Documentación}
|
[:octicons-info-16:](https://github.com/simplex-chat/simplex-chat/tree/stable/docs){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/simplex-chat){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/simplex-chat){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084)
|
- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084)
|
||||||
@ -84,7 +84,7 @@ Sus datos se pueden exportar e importar a otro dispositivo, ya que no hay servid
|
|||||||
[:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Código Fuente" }
|
||||||
[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Las opciones de donación están listadas en la parte inferior de la página principal" }
|
[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Las opciones de donación están listadas en la parte inferior de la página principal" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android)
|
||||||
- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/)
|
- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/)
|
||||||
@ -101,7 +101,7 @@ Briar admite el secreto de reenvío perfecto utilizando el protocolo Bramble [Ha
|
|||||||
|
|
||||||
## Opciones Adicionales
|
## Opciones Adicionales
|
||||||
|
|
||||||
!!! advertencia
|
!!! warning "Advertencia"
|
||||||
|
|
||||||
Estos servicios de mensajería no tienen Perfect [Forward Secrecy](https://es.wikipedia.org/wiki/Perfect_forward_secrecy) (PFS), y aunque satisfacen ciertas necesidades que nuestras recomendaciones anteriores no pueden satisfacer, no los recomendamos para comunicaciones a largo plazo o sensibles. Cualquier compromiso de claves entre los destinatarios de los mensajes afectaría a la confidencialidad de **todas** las comunicaciones anteriores.
|
Estos servicios de mensajería no tienen Perfect [Forward Secrecy](https://es.wikipedia.org/wiki/Perfect_forward_secrecy) (PFS), y aunque satisfacen ciertas necesidades que nuestras recomendaciones anteriores no pueden satisfacer, no los recomendamos para comunicaciones a largo plazo o sensibles. Cualquier compromiso de claves entre los destinatarios de los mensajes afectaría a la confidencialidad de **todas** las comunicaciones anteriores.
|
||||||
|
|
||||||
@ -120,7 +120,7 @@ Briar admite el secreto de reenvío perfecto utilizando el protocolo Bramble [Ha
|
|||||||
[:octicons-info-16:](https://element.io/help){ .card-link title=Documentación}
|
[:octicons-info-16:](https://element.io/help){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/vector-im){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/vector-im){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067)
|
||||||
@ -153,7 +153,7 @@ El protocolo fue [auditado](https://matrix.org/blog/2016/11/21/matrixs-olm-end-t
|
|||||||
[:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentación}
|
[:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Código Fuente" }
|
[:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Código Fuente" }
|
||||||
|
|
||||||
??? descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=network.loki.messenger)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=network.loki.messenger)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1470168868)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1470168868)
|
||||||
@ -174,7 +174,7 @@ Session tiene un [informe oficial](https://arxiv.org/pdf/2002.04609.pdf) que des
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ Puedes consultar [ la tabla de hardware](https://openwrt.org/toh/start) de OpenW
|
|||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**OPNsense** es una plataforma de enrutamiento y cortafuegos de código abierto basada en FreeBSD que incorpora muchas características avanzadas, como la conformación del tráfico, el equilibrio de carga y las capacidades de VPN, con muchas más características disponibles en forma de plugins. OPNsense se implementa habitualmente como cortafuegos perimetral, router, punto de acceso inalámbrico, servidor DHCP, servidor DNS y punto final VPN.
|
**OPNsense** es una plataforma de enrutamiento y cortafuegos de código abierto basada en FreeBSD que incorpora muchas características avanzadas, como la conformación del tráfico, el equilibrio de carga y las capacidades de VPN, con muchas más características disponibles en forma de plugins. OPNsense se implementa habitualmente como cortafuegos perimetral, router, punto de acceso inalámbrico, servidor DHCP, servidor DNS y punto final VPN.
|
||||||
|
|
||||||
@ -41,7 +41,7 @@ OPNsense se desarrolló originalmente como una bifurcación de [pfSense](https:/
|
|||||||
|
|
||||||
**Por favor, ten en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten proporcionar recomendaciones objetivas. Te sugerimos que te familiarices con esta lista antes de elegir usar un proyecto, y que lleves a cabo tu propia investigación para asegurarte de que es la elección correcta para ti.
|
**Por favor, ten en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten proporcionar recomendaciones objetivas. Te sugerimos que te familiarices con esta lista antes de elegir usar un proyecto, y que lleves a cabo tu propia investigación para asegurarte de que es la elección correcta para ti.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujero a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujero a cambios. Si tienes alguna duda sobre nuestros criterios, por favor [pregunta en nuestro foro](https://discuss.privacyguides.net/latest) y no asumas que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -79,7 +79,7 @@ Cuando utilice una instancia de SearXNG, asegúrese de leer su política de priv
|
|||||||
[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Política de Privacidad" }
|
[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Política de Privacidad" }
|
||||||
[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentación}
|
[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentación}
|
||||||
|
|
||||||
!!! advertencia
|
!!! warning "Advertencia"
|
||||||
|
|
||||||
Startpage limita regularmente el acceso al servicio a ciertas direcciones IP, como las IPs reservadas para VPNs o Tor. [DuckDuckGo](#duckduckgo) y [Brave Search](#brave-search) son opciones más amigables si su modelo de amenazas requiere ocultar su dirección IP al proveedor de búsquedas.
|
Startpage limita regularmente el acceso al servicio a ciertas direcciones IP, como las IPs reservadas para VPNs o Tor. [DuckDuckGo](#duckduckgo) y [Brave Search](#brave-search) son opciones más amigables si su modelo de amenazas requiere ocultar su dirección IP al proveedor de búsquedas.
|
||||||
|
|
||||||
@ -91,7 +91,7 @@ El accionista mayoritario de Startpage es System1, una empresa de tecnología pu
|
|||||||
|
|
||||||
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted.
|
||||||
|
|
||||||
!!! ejemplo "Esta sección es nueva"
|
!!! example "Esta sección es nueva"
|
||||||
|
|
||||||
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
Estamos trabajando en establecer criterios definidos para cada sección de nuestra página, y esto puede estar sujeto a cambios. Si tiene alguna duda sobre nuestros criterios, por favor [pregunte en nuestro foro](https://discuss.privacyguides.net/latest) y no asuma que no hemos tenido en cuenta algo a la hora de hacer nuestras recomendaciones si no aparece aquí. Son muchos los factores que se tienen en cuenta y se debaten cuando recomendamos un proyecto, y documentar cada uno de ellos es un trabajo en curso.
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Red Tor"
|
title: "Red Tor"
|
||||||
icon: simple/torproject
|
icon: simple/torproject
|
||||||
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
|
description: Protege tu navegación por Internet de miradas intrusas utilizando la red Tor, una red segura que elude la censura.
|
||||||
---
|
---
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
@ -51,9 +51,9 @@ Hay varias maneras de conectarte a la red Tor desde tu dispositivo, la más util
|
|||||||
|
|
||||||
**Nunca** deberías instalar ninguna extensión adicional en el Navegador Tor, ni siquiera las que sugerimos para Firefox. Las extensiones del navegador y las configuraciones no estándar te hacen destacar de los demás en la red Tor, haciendo así que tu navegador sea más fácil de [fingerprint](https://support.torproject.org/glossary/browser-fingerprinting).
|
**Nunca** deberías instalar ninguna extensión adicional en el Navegador Tor, ni siquiera las que sugerimos para Firefox. Las extensiones del navegador y las configuraciones no estándar te hacen destacar de los demás en la red Tor, haciendo así que tu navegador sea más fácil de [fingerprint](https://support.torproject.org/glossary/browser-fingerprinting).
|
||||||
|
|
||||||
El navegador Tor está diseñado para evitar la toma de huellas dactilares o tu identificación basado en la configuración de tu navegador. Por lo tanto, es imperativo que **no** modifiques el navegador más allá de los [niveles de seguridad](https://tb-manual.torproject.org/security-settings/) predeterminados.
|
El navegador Tor está diseñado para evitar la toma de huellas digirtales o tu identificación debido a la configuración de tu navegador. Por lo tanto, es imperativo que **no** modifiques el navegador más allá de los [niveles de seguridad](https://tb-manual.torproject.org/security-settings/) predeterminados.
|
||||||
|
|
||||||
### Perfiles de usuario
|
### Orbot
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
@ -73,17 +73,17 @@ El navegador Tor está diseñado para evitar la toma de huellas dactilares o tu
|
|||||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599)
|
- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599)
|
||||||
- [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
|
- [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
|
||||||
|
|
||||||
We previously recommended enabling the *Isolate Destination Address* preference in Orbot settings. While this setting can theoretically improve privacy by enforcing the use of a different circuit for each IP address you connect to, it doesn't provide a practical advantage for most applications (especially web browsing), can come with a significant performance penalty, and increases the load on the Tor network. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]
|
Anteriormente recomendamos activar la preferencia *Aislar direcciones de destino* en los ajustes de Orbot. Aunque esta configuración puede mejorar teóricamente la privacidad forzando el uso de un circuito diferente para cada dirección IP a la que se conecte, no proporciona una ventaja práctica para la mayoría de las aplicaciones (especialmente navegación web), puede conllevar una penalización significativa del rendimiento, y aumenta la carga en la red Tor. Ya no recomendamos ajustar esta configuración desde su valor predeterminado a menos que sepa que lo necesita.[^1]
|
||||||
|
|
||||||
!!! tip "Consejos para Android"
|
!!! tip "Consejos para Android"
|
||||||
|
|
||||||
Orbot puede hacer de proxy de aplicaciones individuales si soportan SOCKS o proxy HTTP. También puede hacer un proxy de todas sus conexiones de red usando [VpnService](https://developer.android.com/reference/android/net/VpnService) y se puede usar con el killswitch VPN en :gear: * * Configuración → ** *Red e Internet* → **VPN** → :gear: → **Bloquear conexiones sin VPN**.
|
Orbot puede hacer de proxy de aplicaciones individuales si soportan SOCKS o proxy HTTP. También puede hacer de proxy de todas tus conexiones de red usando [VpnService](https://developer.android.com/reference/android/net/VpnService) y se puede usar con el killswitch VPN en :gear: **Ajustes** → ** *Red e Internet* → **VPN** → :gear: → **Bloquear conexiones sin VPN**.
|
||||||
|
|
||||||
Orbot suele estar desactualizado en el [repositorio F-Droid](https://guardianproject.info/fdroid) de Guardian Project y en [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android), así que considera descargarlo directamente desde el [repositorio GitHub](https://github.com/guardianproject/orbot/releases).
|
Orbot suele estar desactualizado en el [repositorio F-Droid](https://guardianproject.info/fdroid) de Guardian Project y en [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android), así que considera descargarlo directamente desde el [repositorio GitHub](https://github.com/guardianproject/orbot/releases).
|
||||||
|
|
||||||
Todas las versiones están firmadas con la misma firma, por lo que deberían ser compatibles entre sí.
|
Todas las versiones están firmadas con la misma firma, por lo que deberían ser compatibles entre sí.
|
||||||
|
|
||||||
## Relés y puentes
|
## Repetidores y puentes
|
||||||
|
|
||||||
### Snowflake
|
### Snowflake
|
||||||
|
|
||||||
@ -118,4 +118,4 @@ Snowflake no aumenta tu privacidad de ninguna manera, ni se utiliza para conecta
|
|||||||
|
|
||||||
Ejecutar un proxy Snowflake es de bajo riesgo, incluso más que ejecutar un relé Tor o un puente ya que no son esfuerzos particularmente arriesgados. Sin embargo, no deja de ser un proxy de tráfico a través de tu red, lo que puede tener consecuencias en algunos aspectos, especialmente si tu red tiene un ancho de banda limitado. Asegúrate de que entiendes [cómo funciona Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) antes de decidir si ejecutas un proxy.
|
Ejecutar un proxy Snowflake es de bajo riesgo, incluso más que ejecutar un relé Tor o un puente ya que no son esfuerzos particularmente arriesgados. Sin embargo, no deja de ser un proxy de tráfico a través de tu red, lo que puede tener consecuencias en algunos aspectos, especialmente si tu red tiene un ancho de banda limitado. Asegúrate de que entiendes [cómo funciona Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) antes de decidir si ejecutas un proxy.
|
||||||
|
|
||||||
[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people.
|
[^1]: El ajuste `IsolateDestAddr` se discute en [Tor mailing lis](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) y [Documentación sobre Stream Isolation de Whonix](https://www.whonix.org/wiki/Stream_Isolation), donde ambos proyectos sugieren que no suele ser un buen enfoque para la mayoría de la gente.
|
||||||
|
@ -21,13 +21,13 @@ La principal amenaza al utilizar una plataforma de streaming es que sus hábitos
|
|||||||
[:octicons-info-16:](https://lbry.com/faq){ .card-link title=Documentación}
|
[:octicons-info-16:](https://lbry.com/faq){ .card-link title=Documentación}
|
||||||
[:octicons-code-16:](https://github.com/lbryio/lbry-desktop){ .card-link title="Código fuente" }
|
[:octicons-code-16:](https://github.com/lbryio/lbry-desktop){ .card-link title="Código fuente" }
|
||||||
|
|
||||||
??? Descargas
|
??? downloads "Descargas"
|
||||||
|
|
||||||
- [:simple-windows11: Windows](https://lbry.com/windows)
|
- [:simple-windows11: Windows](https://lbry.com/windows)
|
||||||
- [:simple-apple: macOS](https://lbry.com/osx)
|
- [:simple-apple: macOS](https://lbry.com/osx)
|
||||||
- [:simple-linux: Linux](https://lbry.com/linux)
|
- [:simple-linux: Linux](https://lbry.com/linux)
|
||||||
|
|
||||||
!!! nota
|
!!! note "Nota"
|
||||||
|
|
||||||
Solo se recomienda el **cliente de escritorio LBRY**, ya que el sitio web [Odysee](https://odysee.com) y los clientes LBRY en F-Droid, Play Store y App Store tienen sincronización y telemetría obligatorias.
|
Solo se recomienda el **cliente de escritorio LBRY**, ya que el sitio web [Odysee](https://odysee.com) y los clientes LBRY en F-Droid, Play Store y App Store tienen sincronización y telemetría obligatorias.
|
||||||
|
|
||||||
|
@ -321,7 +321,7 @@ No debe tener ningún mercadeo que sea irresponsable:
|
|||||||
|
|
||||||
El marketing responsable que es a la vez educativo y útil para el consumidor podría incluir:
|
El marketing responsable que es a la vez educativo y útil para el consumidor podría incluir:
|
||||||
|
|
||||||
- Una comparación precisa para cuando se debe utilizar Tor u otras [redes autónomas](self-contained-networks.md).
|
- Una comparación precisa para cuando [Tor](tor.md) se debe utilizar en su lugar.
|
||||||
- Disponibilidad del sitio web del proveedor de VPN a través de un .onion [Hidden Service](https://es.wikipedia.org/wiki/.onion)
|
- Disponibilidad del sitio web del proveedor de VPN a través de un .onion [Hidden Service](https://es.wikipedia.org/wiki/.onion)
|
||||||
|
|
||||||
### Funcionalidad Adicional
|
### Funcionalidad Adicional
|
||||||
|
@ -29,7 +29,7 @@ We have these requirements in regard to developers which wish to submit their pr
|
|||||||
|
|
||||||
- Must disclose affiliation, i.e. your position within the project being submitted.
|
- Must disclose affiliation, i.e. your position within the project being submitted.
|
||||||
|
|
||||||
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage etc.
|
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage, etc.
|
||||||
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
||||||
|
|
||||||
- Must explain what the project brings to the table in regard to privacy.
|
- Must explain what the project brings to the table in regard to privacy.
|
||||||
|
@ -7,7 +7,7 @@ It takes a lot of [people](https://github.com/privacyguides/privacyguides.org/gr
|
|||||||
|
|
||||||
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
||||||
|
|
||||||
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate ""){.md-button.md-button--primary}
|
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
||||||
|
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user