diff --git a/i18n/ar/android.md b/i18n/ar/android.md index e0436d69..918c953b 100644 --- a/i18n/ar/android.md +++ b/i18n/ar/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/ar/cryptocurrency.md b/i18n/ar/cryptocurrency.md index 551fe3b0..5db3fcd9 100644 --- a/i18n/ar/cryptocurrency.md +++ b/i18n/ar/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/ar/news-aggregators.md b/i18n/ar/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/ar/news-aggregators.md +++ b/i18n/ar/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/bn/android.md b/i18n/bn/android.md index 1b7a4ff8..b871ab44 100644 --- a/i18n/bn/android.md +++ b/i18n/bn/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/bn/cryptocurrency.md b/i18n/bn/cryptocurrency.md index 551fe3b0..5db3fcd9 100644 --- a/i18n/bn/cryptocurrency.md +++ b/i18n/bn/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/bn/news-aggregators.md b/i18n/bn/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/bn/news-aggregators.md +++ b/i18n/bn/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/cs/android.md b/i18n/cs/android.md index e0436d69..918c953b 100644 --- a/i18n/cs/android.md +++ b/i18n/cs/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/cs/cryptocurrency.md b/i18n/cs/cryptocurrency.md index 551fe3b0..5db3fcd9 100644 --- a/i18n/cs/cryptocurrency.md +++ b/i18n/cs/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/cs/news-aggregators.md b/i18n/cs/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/cs/news-aggregators.md +++ b/i18n/cs/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/de/android.md b/i18n/de/android.md index b5075dd3..9d3f589e 100644 --- a/i18n/de/android.md +++ b/i18n/de/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/de/cryptocurrency.md b/i18n/de/cryptocurrency.md index 551fe3b0..5db3fcd9 100644 --- a/i18n/de/cryptocurrency.md +++ b/i18n/de/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/de/news-aggregators.md b/i18n/de/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/de/news-aggregators.md +++ b/i18n/de/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/el/android.md b/i18n/el/android.md index e0436d69..918c953b 100644 --- a/i18n/el/android.md +++ b/i18n/el/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/el/cryptocurrency.md b/i18n/el/cryptocurrency.md index 551fe3b0..5db3fcd9 100644 --- a/i18n/el/cryptocurrency.md +++ b/i18n/el/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/el/news-aggregators.md b/i18n/el/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/el/news-aggregators.md +++ b/i18n/el/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/eo/android.md b/i18n/eo/android.md index e0436d69..918c953b 100644 --- a/i18n/eo/android.md +++ b/i18n/eo/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/eo/cryptocurrency.md b/i18n/eo/cryptocurrency.md index 551fe3b0..5db3fcd9 100644 --- a/i18n/eo/cryptocurrency.md +++ b/i18n/eo/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/eo/news-aggregators.md b/i18n/eo/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/eo/news-aggregators.md +++ b/i18n/eo/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/es/android.md b/i18n/es/android.md index c0841b4c..5121075e 100644 --- a/i18n/es/android.md +++ b/i18n/es/android.md @@ -131,12 +131,12 @@ Los teléfonos Pixel de Google son los únicos dispositivos que actualmente cump **DivestOS** es un soft-fork de [LineageOS](https://lineageos.org/). DivestOS hereda muchos [dispositivos soportados](https://divestos.org/index.php?page=devices&base=LineageOS) de LineageOS. Tiene compilaciones firmadas, lo que hace posible tener [arranque verificado](https://source.android.com/security/verifiedboot) en algunos dispositivos que no son Pixel. - [:octicons-home-16: Página Principal](https://divestos.org){ .md-button .md-button--primary } - [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Servicio Onion" } - [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Politica de Privacidad" } - [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentación} - [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Código Fuente" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribuir } + [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } + [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Onion Service" } + [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS ha automatizado la vulnerabilidad del kernel ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [parcheando](https://gitlab.com/divested-mobile/cve_checker), menos bloques propietarios, y un archivo personalizado [hosts](https://divested.dev/index.php?page=dnsbl). Su WebView reforzado, [Mulch](https://gitlab.com/divested-mobile/mulch), permite [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) para todas las arquitecturas, [partición del estado de la red](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) y recibe actualizaciones fuera de banda. DivestOS también incluye parches de GrapheneOS para el kernel y habilita todas las características de seguridad del kernel disponibles a través de [endurecimiento defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Todos los kernels más recientes que la versión 3.4 incluyen [saneamiento](https://lwn.net/Articles/334747/) de página completa y todos los ~22 kernels compilados por Clang tienen [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) habilitado. diff --git a/i18n/es/cryptocurrency.md b/i18n/es/cryptocurrency.md index 0d3730ef..50bcffda 100644 --- a/i18n/es/cryptocurrency.md +++ b/i18n/es/cryptocurrency.md @@ -38,7 +38,7 @@ Para una mejor privacidad, se debe asegurar de utilizar una billetera no monitor Para obtener un nivel máximo de privacidad (incluso con una billetera monitoreada), usted debe ejecutar su propio nodo de Monero. Al utilizar el nodo de otra persona, usted expondrá alguna información a dicha persona, como la dirección IP que utiliza para conectarse, las marcas de tiempo que sincroniza su billetera, y las transacciones que realiza desde su billetera (aunque no hay otros detalles sobre esas transacciones). Alternativamente, usted puede conectarse al nodo de Monero de otra persona a través de Tor o i2p. -En agosto de 2021, CipherTrace [anunció](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) mejores capacidades de rastreo de Monero para agencias gubernamentales. Publicaciones públicas muestran cómo la Red de Ejecución de Delitos Financieros del Departamento de Tesorería del Gobierno de los Estados Unidos [licenció](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) el módulo CipherTrace de Monero a finales de 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Publicaciones públicas muestran cómo la Red de Ejecución de Delitos Financieros del Departamento de Tesorería del Gobierno de los Estados Unidos [licenció](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) el módulo CipherTrace de Monero a finales de 2022. La privacidad del gráfico transaccional de Monero está limitada por sus firmas de anillo relativamente pequeñas, especialmente contra ataques dirigidos. Las características de privacidad de Monero también han sido [cuestionadas](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) por algunos investigadores de seguridad, y una serie de vulnerabilidades graves han sido encontradas y corregidas en el pasado, haciendo que los reclamos de organizaciones como CipherTrace no están descartadas. Mientras es poco probable que las herramientas de vigilancia masiva de Monero existan como lo hacen para Bitcoin y otras, es seguro que las herramientas de rastreo ayudan en las investigaciones dirigidas. diff --git a/i18n/es/news-aggregators.md b/i18n/es/news-aggregators.md index 22c974e0..98e87375 100644 --- a/i18n/es/news-aggregators.md +++ b/i18n/es/news-aggregators.md @@ -101,10 +101,10 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma **NetNewsWire** es un lector de fuentes gratuito y de código abierto para macOS e iOS centrado en un diseño y unas funciones nativos. Es compatible con los formatos de fuente típicos, además incluye soporte integrado para fuentes de Reddit. - [:octicons-home-16: Página Principal](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Política de Privacidad" } - [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentación} - [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Código Fuente" } + [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } ??? downloads "Descargas" diff --git a/i18n/fa/android.md b/i18n/fa/android.md index e0436d69..918c953b 100644 --- a/i18n/fa/android.md +++ b/i18n/fa/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/fa/cryptocurrency.md b/i18n/fa/cryptocurrency.md index 551fe3b0..5db3fcd9 100644 --- a/i18n/fa/cryptocurrency.md +++ b/i18n/fa/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/fa/news-aggregators.md b/i18n/fa/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/fa/news-aggregators.md +++ b/i18n/fa/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/fr/android.md b/i18n/fr/android.md index 44fff97b..be3baa50 100644 --- a/i18n/fr/android.md +++ b/i18n/fr/android.md @@ -131,12 +131,12 @@ Les téléphones Google Pixel sont les seuls appareils qui répondent actuelleme **DivestOS** est un léger dérivé de [LineageOS](https://lineageos.org/). DivestOS hérite de nombreux [appareils pris en charge](https://divestos.org/index.php?page=devices&base=LineageOS) de LineageOS. Il a des versions signées, ce qui permet d'avoir un [démarrage vérifié](https://source.android.com/security/verifiedboot) sur certains appareils autres que des Pixel. - [:octicons-home-16: Page d'accueil](https://divestos.org){ .md-button .md-button--primary } - [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Service oignon" } - [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Politique de confidentialité" } + [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } + [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Onion Service" } + [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Code source" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribuer } + [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS a une [correction](https://gitlab.com/divested-mobile/cve_checker) automatique des vulnérabilités de noyau ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)), moins de blobs propriétaires, et un fichier [hosts](https://divested.dev/index.php?page=dnsbl) personnalisé. Sa WebView renforcée, [Mulch](https://gitlab.com/divested-mobile/mulch), permet [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) pour toutes les architectures et [un partitionnement de l'état du réseau](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), et reçoit des mises à jour hors bande. DivestOS inclut également les correctifs de noyau de GrapheneOS et active toutes les fonctions de sécurité de noyau disponibles via le [renforcement defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Tous les noyaux plus récents que la version 3.4 incluent une [désinfection](https://lwn.net/Articles/334747/) complète de la page et tous les ~22 noyaux compilés par Clang ont [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) activé. diff --git a/i18n/fr/cryptocurrency.md b/i18n/fr/cryptocurrency.md index d9ace73d..d09a4d1a 100644 --- a/i18n/fr/cryptocurrency.md +++ b/i18n/fr/cryptocurrency.md @@ -38,7 +38,7 @@ Pour une confidentialité optimale, assurez-vous d'utiliser un portefeuille sans Pour une confidentialité maximale (même avec un portefeuille sans garde), vous devriez utiliser votre propre nœud Monero. L'utilisation du nœud d'une autre personne expose certaines informations, telles que l'adresse IP à partir de laquelle vous vous connectez, les heures auxquelles vous synchronisez votre portefeuille et les transactions que vous envoyez à partir de votre portefeuille (mais pas d'autres détails sur ces transactions). Vous pouvez également vous connecter au nœud Monero de quelqu'un d'autre via Tor ou i2p. -En août 2021, CipherTrace [a annoncé](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) des capacités de traçage de Monero améliorées pour les agences gouvernementales. Des publications publiques montrent que le Financial Crimes Enforcement Network du département du Trésor américain [a accordé une licence à](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace pour son "module Monero" à la fin de l'année 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Des publications publiques montrent que le Financial Crimes Enforcement Network du département du Trésor américain [a accordé une licence à](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace pour son "module Monero" à la fin de l'année 2022. La confidentialité du graphe des transactions Monero est limitée par son cercle de signatures relativement petit, en particulier contre les attaques ciblées. Les caractéristiques de confidentialité de Monero ont également été [remises en question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) par certains chercheurs en sécurité, et un certain nombre de vulnérabilités graves ont été trouvées et corrigées dans le passé, de sorte que les affirmations faites par des organisations comme CipherTrace ne sont pas hors de question. S'il est peu probable qu'il existe des outils de surveillance de masse de Monero comme il en existe pour le Bitcoin et d'autres, il est certain que les outils de traçage facilitent les enquêtes ciblées. diff --git a/i18n/fr/news-aggregators.md b/i18n/fr/news-aggregators.md index a4d411d1..6bdeee4d 100644 --- a/i18n/fr/news-aggregators.md +++ b/i18n/fr/news-aggregators.md @@ -101,10 +101,10 @@ Un [agrégateur d'actualités](https://en.wikipedia.org/wiki/News_aggregator) es **NetNewsWire** est un lecteur de flux gratuit et open-source pour macOS et iOS qui met l'accent sur un design et des fonctionnalités natives. Il prend en charge les formats de flux habituels, ainsi que les flux Reddit. - [:octicons-home-16: Page d'accueil](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Politique de confidentialité" } + [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Code source" } + [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } ??? downloads "Téléchargements" diff --git a/i18n/he/android.md b/i18n/he/android.md index ae9eab94..e22b53cc 100644 --- a/i18n/he/android.md +++ b/i18n/he/android.md @@ -131,12 +131,12 @@ GrapheneOS תומך ב-[Sandboxed Google Play](https://grapheneos.org/usage#sand **DivestOS** הוא נגזרת חלקית של [LineageOS](https://lineageos.org/). DivestOS יורשת [מכשירים נתמכים](https://divestos.org/index.php?page=devices&base=LineageOS) רבים מ-LineageOS. יש לו builds חתומים, מה שמאפשר לקבל [אתחול מאומת](https://source.android.com/security/verifiedboot) בחלק מהמכשירים שאינם Pixel. - [:octicons-home-16: דף הבית](https://divestos.org){ .md-button .md-button--primary } - [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="שירות בצל" } - [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="מדיניות פרטיות" } - [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=תיעוד} - [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="קוד מקור" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=לתרומה } + [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } + [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Onion Service" } + [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } ל - DivestOS יש פגיעות ליבה ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [שמתוקן](https://gitlab.com/divested-mobile/cve_checker) אוטומטית, פחות בועות קנייניות, וקובץ [מארחים](https://divested.dev/index.php?page=dnsbl) מותאם. ה-WebView המוקשה שלו, [Mulch](https://gitlab.com/divested-mobile/mulch), מאפשר [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) עבור כל הארכיטקטורות ו[חלוקת מצבי רשת](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), ומקבל עדכונים מחוץ לפס. DivestOS כוללת גם תיקוני ליבה מ-GrapheneOS ומאפשרת את כל תכונות האבטחה הזמינות של הליבה באמצעות [הקשחת defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). כל הליבות החדשות יותר מגרסה 3.4 כוללים עמוד מלא [חיטוי](https://lwn.net/Articles/334747/) ולכל ~22 הליבות המחוברים יש Clang [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) מופעל. diff --git a/i18n/he/cryptocurrency.md b/i18n/he/cryptocurrency.md index ea996f82..18ce3a24 100644 --- a/i18n/he/cryptocurrency.md +++ b/i18n/he/cryptocurrency.md @@ -38,7 +38,7 @@ cover: cryptocurrency.png לפרטיות מקסימלית (אפילו עם ארנק לא משמורן), עליך להפעיל צומת Monero משלך. שימוש בצומת של אדם אחר יחשוף בפניו מידע מסוים, כגון כתובת ה-IP שממנה אתה מתחבר אליו, חותמות הזמן שאתה מסנכרן את הארנק שלך והעסקאות שאתה שולח מהארנק שלך (אם כי אין פרטים נוספים על עסקאות אלו). לחלופין, אתה יכול להתחבר לצומת Monero של מישהו אחר באמצעות Tor או i2p. -באוגוסט 2021, [הודיעה](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) CipherTrace על יכולות מעקב משופרות של Monero עבור סוכנויות ממשלתיות. פרסומים פומביים מראים כי רשת אכיפת הפשעים הפיננסיים של משרד האוצר האמריקאי העניקה [רישיון](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) ל-"Monero Module" של CipherTrace בסוף 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. פרסומים פומביים מראים כי רשת אכיפת הפשעים הפיננסיים של משרד האוצר האמריקאי העניקה [רישיון](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) ל-"Monero Module" של CipherTrace בסוף 2022. פרטיות גרף העסקאות של Monero מוגבלת על ידי חתימות הטבעות הקטנות יחסית שלה, במיוחד נגד התקפות ממוקדות. תכונות הפרטיות של Monero גם [הוטלו בספק](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) על ידי כמה חוקרי אבטחה, ומספר נקודות תורפה חמורות נמצאו ותוקנו בעבר, כך שהטענות שהועלו על ידי ארגונים כמו CipherTrace אינן באות בחשבון. אמנם אין זה סביר שכלי מעקב המוני Monero קיימים כפי שהם קיימים עבור ביטקוין ואחרים, אך בטוח שכלי מעקב מסייעים בחקירות ממוקדות. diff --git a/i18n/he/news-aggregators.md b/i18n/he/news-aggregators.md index f38e0529..cc51586d 100644 --- a/i18n/he/news-aggregators.md +++ b/i18n/he/news-aggregators.md @@ -101,10 +101,10 @@ cover: news-aggregators.png **NetNewsWire** קורא עדכונים חינמי וקוד פתוח עבור macOS ו-iOS עם התמקדות בעיצוב ותכונות מקוריות. הוא תומך בפורמטי ההזנה האופייניים לצד תמיכה מובנית בפיד טוויטר ו-Reddit. - [:octicons-home-16: דף הבית](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="מדיניות פרטיות" } - [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=תיעוד} - [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="קוד מקור" } + [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } ??? downloads "הורדות" diff --git a/i18n/hi/android.md b/i18n/hi/android.md index e0436d69..918c953b 100644 --- a/i18n/hi/android.md +++ b/i18n/hi/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/hi/cryptocurrency.md b/i18n/hi/cryptocurrency.md index 551fe3b0..5db3fcd9 100644 --- a/i18n/hi/cryptocurrency.md +++ b/i18n/hi/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/hi/news-aggregators.md b/i18n/hi/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/hi/news-aggregators.md +++ b/i18n/hi/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/hu/android.md b/i18n/hu/android.md index fb3ffec7..0e007e25 100644 --- a/i18n/hu/android.md +++ b/i18n/hu/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/hu/cryptocurrency.md b/i18n/hu/cryptocurrency.md index 6e0d13ba..02d3e635 100644 --- a/i18n/hu/cryptocurrency.md +++ b/i18n/hu/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/hu/news-aggregators.md b/i18n/hu/news-aggregators.md index 0ad7f063..1fc339e4 100644 --- a/i18n/hu/news-aggregators.md +++ b/i18n/hu/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/id/android.md b/i18n/id/android.md index e0436d69..918c953b 100644 --- a/i18n/id/android.md +++ b/i18n/id/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/id/cryptocurrency.md b/i18n/id/cryptocurrency.md index af605001..476ce6d3 100644 --- a/i18n/id/cryptocurrency.md +++ b/i18n/id/cryptocurrency.md @@ -38,7 +38,7 @@ Untuk privasi yang optimal, pastikan untuk menggunakan dompet nonkustodian di ma For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/id/news-aggregators.md b/i18n/id/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/id/news-aggregators.md +++ b/i18n/id/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/it/android.md b/i18n/it/android.md index 41150963..d590958e 100644 --- a/i18n/it/android.md +++ b/i18n/it/android.md @@ -131,12 +131,12 @@ I telefoni Google Pixel sono gli unici dispositivi che attualmente soddisfano i **DivestOS** è un soft-fork di [LineageOS](https://lineageos.org/). DivestOS eredita molti [dispositivi supportati] (https://divestos.org/index.php?page=devices&base=LineageOS) da LineageOS. Fornisce build firmate, che consentono di avere [verified boot](https://source.android.com/security/verifiedboot) su alcuni dispositivi non-Pixel. - [:octicons-home-16: Pagnia Principale](https://divestos.org){ .md-button .md-button--primary } - [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title=Onion } - [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Politica sulla privacy" } + [:octicons-home-16: Pagina principale](https://divestos.org){ .md-button .md-button--primary } + [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Servizi Onion" } + [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentazione} - [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Codice sorgente" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribuisci } + [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Codice Sorgente" } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribuisci } DivestOS offre [patch](https://gitlab.com/divested-mobile/cve_checker) automatizzate per vulnerabilità del kernel ([CVE](https://it.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)), meno blob proprietari e un file [hosts](https://divested.dev/index.php?page=dnsbl) modificato. Il suo WebView rafforzato, [Mulch](https://gitlab.com/divested-mobile/mulch), attiva [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) per tutte le architetture e [il partizionamento dello stato di rete](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), e riceve aggiornamenti fuori programma. DivestOS include anche le patch del kernel di GrapheneOS e abilita tutte le funzionalità di sicurezza del kernel disponibili tramite [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Tutti i kernel più recenti della versione 3.4 includono una completa [sanificazione](https://lwn.net/Articles/334747/) delle pagine e tutti i ~22 kernel compilati con Clang hanno [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) abilitato. diff --git a/i18n/it/cryptocurrency.md b/i18n/it/cryptocurrency.md index af053673..f07ad444 100644 --- a/i18n/it/cryptocurrency.md +++ b/i18n/it/cryptocurrency.md @@ -38,7 +38,7 @@ Per una privacy ottimale, assicuratevi di utilizzare un portafoglio non custodia Per ottenere la massima privacy (anche con un portafoglio non custodial), è consigliabile gestire un proprio nodo Monero. Utilizzare un nodo di un'altra persona espone alcune informazioni, come l'indirizzo IP da cui ci si connette, i timestamp con cui si sincronizza il proprio portafoglio e le transazioni inviate dal proprio portafoglio (ma nessun altro dettaglio su tali transazioni). In alternativa, puoi collegarti al nodo Monero di qualcun altro utilizzando Tor o i2p. -Nell'agosto 2021, CipherTrace [ha annunciato](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) delle migliorie per quanto riguarda le capacità di tracciamento per le agenzie governative. I post pubblici mostrano che il Financial Crimes Enforcement Network del Dipartimento del Tesoro degli Stati Uniti [ha concesso una licenza ](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) per il "modulo Monero" di CipherTrace alla fine del 2022. +Nell'agosto 2021, CipherTrace [ha annunciato](https://ciphertrace.com/enhanced-monero-tracing/) delle migliorie per quanto riguarda la capacità di tracciamento di Monero per le agenzie governative. I post pubblici mostrano che il Financial Crimes Enforcement Network del Dipartimento del Tesoro degli Stati Uniti [ha concesso una licenza ](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) per il "modulo Monero" di CipherTrace alla fine del 2022. La privacy del grafico delle transazioni di Monero è limitata dalle firme ad anello relativamente piccole, soprattutto contro gli attacchi mirati. Anche le caratteristiche circa la privacy di Monero sono state [messe in discussione](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) da alcuni esperti di sicurezza, e in passato sono state individuate e corrette diverse vulnerabilità gravi, quindi le affermazioni di organizzazioni come CipherTrace non sono fuori discussione. Sebbene sia improbabile che esistano strumenti di sorveglianza di massa per Monero come per Bitcoin e altri, è certo che gli strumenti di tracciamento aiutino nelle indagini mirate. diff --git a/i18n/it/news-aggregators.md b/i18n/it/news-aggregators.md index dc147ac1..493f4d49 100644 --- a/i18n/it/news-aggregators.md +++ b/i18n/it/news-aggregators.md @@ -102,9 +102,9 @@ Un [Aggregatore di news](https://en.wikipedia.org/wiki/News_aggregator)è un mod **NetNewsWire** è un lettore di feed gratuito ed open-source per macOS e iOS, con un focus su design e funzionalità native. Supporta i formati classici dei feed, oltre al supporto integrato per i feed di Reddit. [:octicons-home-16: Pagina principale](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentazione} - [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Codice sorgente" } + [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Codice Sorgente" } ??? downloads "Scaricare" diff --git a/i18n/ja/android.md b/i18n/ja/android.md index e0436d69..918c953b 100644 --- a/i18n/ja/android.md +++ b/i18n/ja/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/ja/cryptocurrency.md b/i18n/ja/cryptocurrency.md index 6007a46f..e141f409 100644 --- a/i18n/ja/cryptocurrency.md +++ b/i18n/ja/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/ja/news-aggregators.md b/i18n/ja/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/ja/news-aggregators.md +++ b/i18n/ja/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/ko/advanced/dns-overview.md b/i18n/ko/advanced/dns-overview.md index 9edc9e92..8bbb1fa3 100644 --- a/i18n/ko/advanced/dns-overview.md +++ b/i18n/ko/advanced/dns-overview.md @@ -10,11 +10,11 @@ description: DNS, 즉 도메인 네임 시스템은 '인터넷의 전화번호 사이트를 방문하면 숫자로 구성된 주소가 반환됩니다. 예를 들어, `privacyguides.org`를 방문할 경우에는 `192.98.54.105` 주소가 반환됩니다. -DNS는 [인터넷의 초창기](https://ko.wikipedia.org/wiki/%EB%8F%84%EB%A9%94%EC%9D%B8_%EB%84%A4%EC%9E%84_%EC%8B%9C%EC%8A%A4%ED%85%9C#%EC%97%AD%EC%82%AC)부터 존재해 왔습니다. DNS 서버와 주고받는 DNS 요청은 일반적으로 암호화가 적용되어 있지 **않습니다**. In a residential setting, a customer is given servers by the ISP via [DHCP](https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol). +DNS는 [인터넷의 초창기](https://ko.wikipedia.org/wiki/%EB%8F%84%EB%A9%94%EC%9D%B8_%EB%84%A4%EC%9E%84_%EC%8B%9C%EC%8A%A4%ED%85%9C#%EC%97%AD%EC%82%AC)부터 존재해 왔습니다. DNS 서버와 주고받는 DNS 요청은 일반적으로 암호화가 적용되어 있지 **않습니다**. 가정 환경에서는 [DHCP](https://ko.wikipedia.org/wiki/%EB%8F%99%EC%A0%81_%ED%98%B8%EC%8A%A4%ED%8A%B8_%EA%B5%AC%EC%84%B1_%ED%94%84%EB%A1%9C%ED%86%A0%EC%BD%9C)를 통해 ISP로부터 서버를 제공받습니다. -암호화되지 않은 DNS 요청은 전송 도중에 쉽게 **감시** 및 **변조**될 수 있습니다. 일부 지역에서는 ISP가 기초적인 [DNS 필터링](https://en.wikipedia.org/wiki/DNS_blocking)을 수행하도록 명령받기도 합니다. 이 경우, ISP가 차단하고 있는 도메인의 IP 주소를 요청하면 서버가 응답하지 않거나, 목적지가 아닌 다른 IP 주소로 응답이 돌아옵니다. As the DNS protocol is not encrypted, the ISP (or any network operator) can use [DPI](https://en.wikipedia.org/wiki/Deep_packet_inspection) to monitor requests. ISPs can also block requests based on common characteristics, regardless of which DNS server is used. Unencrypted DNS always uses [port](https://en.wikipedia.org/wiki/Port_(computer_networking)) 53 and always uses UDP. +암호화되지 않은 DNS 요청은 전송 도중에 쉽게 **감시** 및 **변조**될 수 있습니다. 일부 지역에서는 ISP가 기초적인 [DNS 필터링](https://en.wikipedia.org/wiki/DNS_blocking)을 수행하도록 명령받기도 합니다. 이 경우, ISP가 차단하고 있는 도메인의 IP 주소를 요청하면 서버가 응답하지 않거나, 목적지가 아닌 다른 IP 주소로 응답이 돌아옵니다. DNS 프로토콜은 암호화되지 않아서 ISP를 비롯한 모든 네트워크 사업자는 [DPI](https://ko.wikipedia.org/wiki/%EC%8B%AC%EC%B8%B5_%ED%8C%A8%ED%82%B7_%EA%B2%80%EC%82%AC)를 통해 요청을 모니터링할 수 있습니다. 또한 ISP는 어떤 DNS 서버를 사용하든 공통된 특징을 이용해 요청을 차단하는 것도 가능합니다. 암호화되지 않은 DNS는 항상 [53번 포트](https://ko.wikipedia.org/wiki/%ED%8F%AC%ED%8A%B8_(%EC%BB%B4%ED%93%A8%ED%84%B0_%EB%84%A4%ED%8A%B8%EC%9B%8C%ED%82%B9))와 UDP를 사용합니다. -Below, we discuss and provide a tutorial to prove what an outside observer may see using regular unencrypted DNS and [encrypted DNS](#what-is-encrypted-dns). +다음 내용은 암호화되지 않은 일반적인 DNS와 [암호화가 적용된 DNS](#what-is-encrypted-dns)를 비교해 외부 관찰자가 볼 수 있는 것은 무엇이 있는지 증명하는 튜토리얼입니다. ### 암호화되지 않은 DNS @@ -129,25 +129,25 @@ DoH 네이티브 구현은 iOS 14, macOS 11, Microsoft Windows, Android 13(단, ## 암호화 DNS를 사용하지 **말아야** 하는 이유는 무엇인가요? -In locations where there is internet filtering (or censorship), visiting forbidden resources may have its own consequences which you should consider in your [threat model](../basics/threat-modeling.md). We do **not** suggest the use of encrypted DNS for this purpose. Use [Tor](https://torproject.org) or a [VPN](../vpn.md) instead. If you're using a VPN, you should use your VPN's DNS servers. When using a VPN, you are already trusting them with all your network activity. +인터넷 필터링(혹은 검열)이 존재하는 지역에서는 '차단된 정보에 접근하는 행위' 자체가 자신의 [위협 모델](../basics/threat-modeling.md)에서 고려해야 할 어떠한 결과를 초래할 수도 있습니다. Privacy Guides는 이러한 목적으로 암호화 DNS를 사용하는 것은 추천드리지 **않습니다**. 대신 [Tor](https://torproject.org)나 [VPN](../vpn.md)을 사용하세요. VPN을 사용하는 경우, 자신이 사용하는 VPN의 DNS 서버를 사용해야 합니다. VPN을 사용하는 순간부터 이미 자신의 모든 네트워크 활동을 VPN 업체에게 맡기고 있는 것이기 때문입니다. -When we do a DNS lookup, it's generally because we want to access a resource. Below, we will discuss some of the methods that may disclose your browsing activities even when using encrypted DNS: +When we do a DNS lookup, it's generally because we want to access a resource. 다음은 암호화 DNS를 사용하더라도 여러분의 인터넷 탐색 활동이 노출될 수 있는 몇 가지 경우입니다. ### IP 주소 -The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides. +인터넷 탐색 활동을 알아내는 가장 쉬운 방법은 해당 기기에서 접근하는 IP 주소를 확인하는 것입니다. 예를 들어, 어떤 관찰자가 `privacyguides.org`는 `198.98.54.105`에 존재함을 알고 있는 상태에서, 여러분의 기기가 `198.98.54.105`로 데이터를 요청한 것을 확인했다면, 여러분이 Privacy Guides를 방문했을 것으로 예상할 수 있습니다. -This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet. +이 방식은 해당 IP 주소의 서버가 호스팅하고 있는 웹사이트의 개수가 적을 경우에만 유효합니다. 또한 공유 플랫폼(Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger 등)에서 사이트가 호스팅되고 있는 경우에도 그다지 효과가 없습니다. 최신 인터넷 환경에서는 매우 일반적인 [리버스 프록시](https://ko.wikipedia.org/wiki/%EB%A6%AC%EB%B2%84%EC%8A%A4_%ED%94%84%EB%A1%9D%EC%8B%9C) 뒤에 호스팅되고 있는 경우에도 마찬가지로 그다지 효과가 없습니다. ### SNI(Server Name Indication) -Server Name Indication is typically used when a IP address hosts many websites. This could be a service like Cloudflare, or some other [Denial-of-service attack](https://en.wikipedia.org/wiki/Denial-of-service_attack) protection. +SNI(Server Name Indication, 서버 이름 표시)는 주로 하나의 IP 주소에서 여러 웹사이트를 호스팅하는 경우에 사용됩니다. Cloudflare 등의 서비스나, 그 외 [서비스 거부 공격(DosS공격)](https://ko.wikipedia.org/wiki/%EC%84%9C%EB%B9%84%EC%8A%A4_%EA%B1%B0%EB%B6%80_%EA%B3%B5%EA%B2%A9) 보호 서비스 등이 해당 예시입니다. -1. Start capturing again with `tshark`. We've added a filter with our IP address so you don't capture many packets: +1. 마찬가지로 `tshark`로 캡처를 시작합니다. 지나치게 많은 패킷이 캡처되지 않도록 Privacy Guides의 IP 주소 필터를 추가합시다. @@ -156,11 +156,11 @@ Server Name Indication is typically used when a IP address hosts many websites. ``` -2. Then we visit [https://privacyguides.org](https://privacyguides.org). +2. 이제 [https://privacyguides.org](https://privacyguides.org)를 방문합니다. -3. After visiting the website, we want to stop the packet capture with CTRL + C. +3. 사이트를 방문한 이후에는 CTRL + C로 패킷 캡처를 중지합니다. -4. Next we want to analyze the results: +4. 이제 결과를 분석합시다. @@ -169,9 +169,9 @@ Server Name Indication is typically used when a IP address hosts many websites. ``` -We will see the connection establishment, followed by the TLS handshake for the Privacy Guides website. Around frame 5. you'll see a "Client Hello". +연결이 설정이 이루어지고 Privacy Guides 사이트에 대한 TLS 핸드셰이크 과정을 확인할 수 있습니다. 프레임 5 주변에서 "Client Hello"를 확인할 수 있습니다. -5. Expand the triangle ▸ next to each field: +5. 각 필드 옆의 삼각형 ▸을 눌러 펼칩니다. @@ -184,7 +184,7 @@ We will see the connection establishment, followed by the TLS handshake for the ``` -6. We can see the SNI value which discloses the website we are visiting. The `tshark` command can give you the value directly for all packets containing a SNI value: +6. 방문 중인 사이트를 나타내는 SNI 값을 확인할 수 있습니다. `tshark` 명령어로 SNI 값을 포함한 모든 패킷 값을 직접 확인 가능합니다. @@ -193,9 +193,9 @@ We will see the connection establishment, followed by the TLS handshake for the ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +즉, '암호화 DNS'를 사용하더라도 도메인은 SNI를 통해 노출될 가능성이 높습니다. [TLS 1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) 프로토콜에는 이런 방식의 유출을 방지하는 [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/) 기능이 존재합니다. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +하지만 Encrypted Client Hello 또한 여러 정부(특히 [중국](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/), [러시아](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/))에서 [차단을 시작했거나](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello), 차단을 시도하고 있습니다. 최근 러시아는 [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) 표준을 사용하는 [해외 사이트를 차단하기 시작했습니다](https://github.com/net4people/bbs/issues/108). HTTP/3의 일부인 [QUIC](https://ko.wikipedia.org/wiki/QUIC) 프로토콜에서는 `ClientHello` 암호화가 필수적이기 때문입니다. @@ -207,7 +207,7 @@ The OCSP request contains the certificate "[serial number](https://en.wikipedia. We can simulate what a browser would do using the [`openssl`](https://en.wikipedia.org/wiki/OpenSSL) command. -1. Get the server certificate and use [`sed`](https://en.wikipedia.org/wiki/Sed) to keep just the important part and write it out to a file: +1. 서버 인증서를 가져오고 [`sed`](https://ko.wikipedia.org/wiki/Sed_(%EC%9C%A0%ED%8B%B8%EB%A6%AC%ED%8B%B0))를 이용해 중요한 부분만 파일에 기록합니다. @@ -370,9 +370,9 @@ DNSSEC implements a hierarchical digital signing policy across all layers of DNS -## What is QNAME minimization? +## QNAME 최소화란 무엇인가요? -A QNAME is a "qualified name", for example `privacyguides.org`. QNAME minimisation reduces the amount of information sent from the DNS server to the [authoritative name server](https://en.wikipedia.org/wiki/Name_server#Authoritative_name_server). +QNAME은 '정규화된 이름(Qualified Name)'입니다(예시: `privacyguides.org`). QNAME minimisation reduces the amount of information sent from the DNS server to the [authoritative name server](https://en.wikipedia.org/wiki/Name_server#Authoritative_name_server). Instead of sending the whole domain `privacyguides.org`, QNAME minimization means the DNS server will ask for all the records that end in `.org`. Further technical description is defined in [RFC 7816](https://datatracker.ietf.org/doc/html/rfc7816). diff --git a/i18n/ko/android.md b/i18n/ko/android.md index 69d11bd8..1f7d9400 100644 --- a/i18n/ko/android.md +++ b/i18n/ko/android.md @@ -131,12 +131,12 @@ Google Pixel 스마트폰은 현재 GrapheneOS [하드웨어 보안 요구 사 **DivestOS**는 [LineageOS](https://lineageos.org/)의 소프트 포크입니다. DivestOS는 LineageOS의 다양한 [지원 기기](https://divestos.org/index.php?page=devices&base=LineageOS)를 물려받았습니다. 서명된 빌드가 존재하여, Pixel 외 기기에서 [검증 부팅(Verified Boot)](https://source.android.com/security/verifiedboot)을 사용할 수 있습니다. - [:octicons-home-16: 홈페이지](https://divestos.org){ .md-button .md-button--primary } - [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Onion 서비스" } - [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="프라이버시 정책" } - [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=문서} - [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="소스 코드" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=기부 } + [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } + [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Onion Service" } + [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/ko/basics/threat-modeling.md b/i18n/ko/basics/threat-modeling.md index b7b8a729..d8276c1f 100644 --- a/i18n/ko/basics/threat-modeling.md +++ b/i18n/ko/basics/threat-modeling.md @@ -2,16 +2,16 @@ meta_title: "위협 모델링: 프라이버시 보호의 첫걸음 - Privacy Guides" title: "위협 모델링" icon: 'material/target-account' -description: 보안, 개인정보 보호, 사용성 간의 균형 조절은 개인정보 보호 여정에서 제일 먼저 직면하게 될 가장 어려운 과제 중 하나입니다. +description: 보안, 프라이버시, 사용성 간의 균형 조절은 프라이버시 보호 여정에서 제일 먼저 직면하게 될 가장 어려운 과제 중 하나입니다. --- -보안, 개인정보 보호, 사용성 간의 균형 조절은 개인정보 보호 여정에서 가장 먼저 직면하게 될 가장 어려운 과제 중 하나입니다. 무엇이든 장단점이 있습니다. '더 뛰어난 보안'은 일반적으로 '더 많은 제약이나 불편함'을 의미합니다. 사람들로부터 권장 툴의 문제점으로 자주 지적되는 것은, "사용하기 너무 어렵다"라는 점입니다. +보안, 프라이버시, 사용성 간의 균형 조절은 프라이버시 보호 여정에서 제일 먼저 직면하게 될 가장 어려운 과제 중 하나입니다. 무엇이든 장단점이 있습니다. '더 뛰어난 보안'은 일반적으로 '더 많은 제약이나 불편함'을 의미합니다. 프라이버시를 보호하기 위해 권장되는 서비스나 프로그램을 사용해보는 사람들이 자주 지적하는 문제점은 "사용하기 너무 어렵다"라는 점입니다. **가장 안전한** 보안 툴을 사용하고자 한다면, 사용성을 **대폭 희생**해야 합니다. 게다가 ==완벽한 보안은 존재하지 않습니다.== **높은** 보안은 존재하지만 **완벽한** 보안은 존재하지 않습니다. 그렇기에 위협 모델링이 중요한 것입니다. **그래서, 위협 모델이 대체 뭘까요?** -==위협 모델은 보안과 개인정보 보호를 위해 가장 신경 써야 할 위험 요소들의 목록입니다.== **모든** 공격 및 공격자로부터 스스로를 보호하는 것은 불가능하므로, **가장 가능성 높은** 위협에 초점을 맞춰야 합니다. 컴퓨터 보안 분야에서 '위협'이란 개인 정보와 보안을 보호하고 유지함에 방해가 되는 이벤트를 의미합니다. +==위협 모델은 보안과 프라이버시를 지키기 위해 가장 신경 써야 할 위험 요소들의 목록입니다.== **모든** 공격 및 공격자로부터 스스로를 보호하는 것은 불가능하므로, **가장 가능성 높은** 위협에 초점을 맞춰야 합니다. 컴퓨터 보안 분야에서 '위협'이란 프라이버시와 보안을 보호하고 유지함에 방해가 되는 이벤트를 의미합니다. 자신의 상황에 적합한 툴을 제대로 선택하기 위해선 중대한 위협에 집중하여 고민 요소를 줄여야 합니다. diff --git a/i18n/ko/basics/why-privacy-matters.md b/i18n/ko/basics/why-privacy-matters.md index 5aee8e1c..6dca72f2 100644 --- a/i18n/ko/basics/why-privacy-matters.md +++ b/i18n/ko/basics/why-privacy-matters.md @@ -3,7 +3,7 @@ title: "프라이버시를 신경 써야 하는 이유" icon: 'material/shield-account' --- -현대 사회에서는 디지털 데이터가 온갖 곳에서 남용되고 있습니다. 디지털 프라이버시의 중요성은 그 어느때보다 높아졌지만, 많은 사람들은 이제와서 자신이 할 수 있는 것은 없다고 생각하는 경향이 있습니다. 하지만 실제로는 그렇지 않습니다. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. +현대 사회에서는 디지털 데이터가 온갖 곳에서 남용되고 있습니다. 디지털 프라이버시의 중요성은 그 어느때보다 높아졌지만, 많은 사람들은 이제와서 자신이 할 수 있는 것은 없다고 생각하는 경향이 있습니다. 하지만 실제로는 그렇지 않습니다. ==자신의 프라이버시는 자신의 행동에 달려있습니다.== 즉, 여러분은 프라이버시에 관심을 갖고 신경을 써야 합니다. 프라이버시는 권리입니다. 이 권리를 타인의 손에 넘겨주어서는 안 됩니다. Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. diff --git a/i18n/ko/cryptocurrency.md b/i18n/ko/cryptocurrency.md index 07379c16..2f05dd20 100644 --- a/i18n/ko/cryptocurrency.md +++ b/i18n/ko/cryptocurrency.md @@ -38,7 +38,7 @@ Monero를 사용할 경우, Monero를 거래하는 주소, 거래 금액, 주소 (비수탁형 지갑을 사용하더라도) 프라이버시를 극대화하려면 자체 Monero 노드를 운용해야 합니다. 다른 사람의 노드를 사용할 경우 해당 노드에 연결할 때 사용한 IP 주소, 지갑을 동기화한 시각, 지갑에서 전송된 트랜잭션(해당 트랜잭션에 대한 자세한 정보는 알 수 없음) 등 일부 정보가 해당 노드에 노출됩니다. 다른 사람의 Monero 노드에 연결할 때에 Tor 혹은 i2p를 사용하는 것이 대안이 될 수 있습니다. -2021년 8월, CipherTrace는 정부 기관을 위해 향상된 Monero 추적 기능을 [발표했습니다](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html). 공개 포스트에 따르면, 미국 재무부의 금융 범죄 단속 네트워크(Financial Crimes Enforcement Network)는 2022년 말 CipherTrace의 'Monero 모듈'에 라이선스 자격을 [부여했습니다](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view). +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. 공개 포스트에 따르면, 미국 재무부의 금융 범죄 단속 네트워크(Financial Crimes Enforcement Network)는 2022년 말 CipherTrace의 'Monero 모듈'에 라이선스 자격을 [부여했습니다](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view). Monero 트랜잭션 그래프는 프라이버시 면에서 제한적입니다. 상대적으로 작은 링 서명(Ring Signature)으로 인해, 표적 공격에 취약합니다. 이 외에도 Monero의 프라이버시 기능은 일부 보안 연구자들에 의해 [의문이 제기된 바 있으며](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/), 과거에는 여러 심각한 취약점이 발견되어 패치되기도 했습니다. 따라서 CipherTrace 같은 단체의 주장은 충분히 일리가 있습니다. 비트코인이나 다른 암호화폐처럼 대규모 감시 도구가 Monero에도 존재할 가능성은 낮지만, 추적 툴이 표적 수사에 효과가 있을 것은 확실합니다. diff --git a/i18n/ko/news-aggregators.md b/i18n/ko/news-aggregators.md index 1ac343cd..02ee4d8e 100644 --- a/i18n/ko/news-aggregators.md +++ b/i18n/ko/news-aggregators.md @@ -101,10 +101,10 @@ cover: news-aggregators.png **NetNewsWire**는 네이티브 디자인 및 기능에 중점을 둔 macOS, iOS용 무료 오픈소스 피드 리더입니다. 일반적인 피드 형식과 함께 Reddit 피드를 기본 지원합니다. - [:octicons-home-16: 홈페이지](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="프라이버시 정책" } - [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=문서} - [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="소스 코드" } + [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } ??? downloads "다운로드" diff --git a/i18n/ku-IQ/android.md b/i18n/ku-IQ/android.md index 49aa5bfa..1479e278 100644 --- a/i18n/ku-IQ/android.md +++ b/i18n/ku-IQ/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/ku-IQ/cryptocurrency.md b/i18n/ku-IQ/cryptocurrency.md index 551fe3b0..5db3fcd9 100644 --- a/i18n/ku-IQ/cryptocurrency.md +++ b/i18n/ku-IQ/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/ku-IQ/news-aggregators.md b/i18n/ku-IQ/news-aggregators.md index 069fc2ef..2be5a22c 100644 --- a/i18n/ku-IQ/news-aggregators.md +++ b/i18n/ku-IQ/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/nl/about/donate.md b/i18n/nl/about/donate.md index 02c6f135..90b4bcab 100644 --- a/i18n/nl/about/donate.md +++ b/i18n/nl/about/donate.md @@ -15,9 +15,9 @@ Als je al gebruik maakt van GitHub sponsoring, kun je onze organisatie daar ook [Sponsor ons op GitHub](https://github.com/sponsors/privacyguides ""){.md-button} -Another option to support us is by buying our merchandise from HelloTux. We get roughly $4 for every shirt sold, and you get a quality product to show for it. +Een andere optie om ons te steunen is door onze merchandise te kopen bij HelloTux. We krijgen ruwweg $4 voor elk verkocht shirt en je krijgt er een kwaliteitsproduct voor terug. -[Buy on HelloTux.com](https://hellotux.com/privacyguides){ class="md-button" } +[Kopen op HelloTux.com](https://hellotux.com/privacyguides){ class="md-button" } } ## Backers diff --git a/i18n/nl/android.md b/i18n/nl/android.md index 970e954b..231e5cff 100644 --- a/i18n/nl/android.md +++ b/i18n/nl/android.md @@ -133,10 +133,10 @@ Google Pixel-telefoons zijn de enige apparaten die momenteel voldoen aan Graphen [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Onion Service" } - [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacybeleid" } - [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentatie} - [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Broncode" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Bijdragen } + [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS heeft geautomatiseerde kernel kwetsbaarheden ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), minder propriëtaire blobs, en een aangepaste [hosts](https://divested.dev/index.php?page=dnsbl) bestand. Zijn geharde WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), maakt [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) mogelijk voor alle architecturen en [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), en ontvangt out-of-band updates. DivestOS bevat ook kernelpatches van GrapheneOS en schakelt alle beschikbare kernelbeveiligingsfuncties in via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Alle kernels nieuwer dan versie 3.4 bevatten volledige pagina [sanitization](https://lwn.net/Articles/334747/) en alle ~22 Clang-gecompileerde kernels hebben [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) ingeschakeld. diff --git a/i18n/nl/cloud.md b/i18n/nl/cloud.md index 6b086058..3ec500f9 100644 --- a/i18n/nl/cloud.md +++ b/i18n/nl/cloud.md @@ -42,9 +42,9 @@ De gloednieuwe mobiele klanten van Proton Drive zijn nog niet publiekelijk gecon !!! recommendation - ![Tresorit logo](assets/img/cloud/tresorit.svg){ align=right } + Tresorit logo](assets/img/cloud/tresorit.svg){ align=right } - **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is eigendom van de Zwitserse Post, de nationale postdienst van Zwitserland. + **Tresorit** is een Zwitsers-Hongaarse aanbieder van versleutelde cloud-opslag, opgericht in 2011. Tresorit is eigendom van de Zwitserse Post, de nationale postdienst van Zwitserland. [:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } diff --git a/i18n/nl/cryptocurrency.md b/i18n/nl/cryptocurrency.md index 6787f606..62db1418 100644 --- a/i18n/nl/cryptocurrency.md +++ b/i18n/nl/cryptocurrency.md @@ -38,7 +38,7 @@ Voor optimale privacy, zorg ervoor dat je een noncustodial wallet gebruikt waar Voor maximale privacy (zelfs met een niet-custodiale wallet) moet je jouw eigen Monero-knooppunt beheren. Als je een knooppunt van een ander gebruikt, krijgt hij enige informatie, zoals het IP-adres van waaruit je verbinding maakt, de tijdstempels waarmee je jouw portemonnee synchroniseert, en de transacties die je vanuit jouw portemonnee verstuurt (maar geen andere details over die transacties). Als alternatief kun je via Tor of i2p verbinding maken met het Monero-knooppunt van iemand anders. -In augustus 2021 kondigde CipherTrace [](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) verbeterde Monero-tracing-mogelijkheden aan voor overheidsinstanties. Uit openbare berichten blijkt dat het Financial Crimes Enforcement Network van het Amerikaanse ministerie van Financiën [eind 2022 een licentie heeft verleend aan](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module". +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Uit openbare berichten blijkt dat het Financial Crimes Enforcement Network van het Amerikaanse ministerie van Financiën [eind 2022 een licentie heeft verleend aan](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module". De privacy van de Monero-transactiegrafiek wordt beperkt door de relatief kleine ringhandtekeningen, vooral tegen gerichte aanvallen. De privacyfuncties van Monero zijn ook diff --git a/i18n/nl/desktop-browsers.md b/i18n/nl/desktop-browsers.md index 2e0e459d..07d24247 100644 --- a/i18n/nl/desktop-browsers.md +++ b/i18n/nl/desktop-browsers.md @@ -283,7 +283,7 @@ Ingebouwde extensies die je niet gebruikt uitschakelen in **Extensies** De Web3-functies van Brave kunnen de vingerafdruk van jouw browser en het aanvalsoppervlak vergroten. Tenzij je een van de functies gebruikt, moeten ze worden uitgeschakeld. -Set **Default Ethereum wallet** to **Extensions (no fallback)** Set **Default Solana wallet** to **Extensions (no fallback)** Set **Method to resolve IPFS resources** to **Disabled** +Stel **Standaard Ethereum portemonnee** in op **Extensies (geen fallback)** Stel **Standaard Solana portemonnee** in op **Extensies (geen fallback)** Stel **Methode om IPFS bronnen op te lossen** in op **Uitgeschakeld** ##### Systeem diff --git a/i18n/nl/email.md b/i18n/nl/email.md index 417d65c9..9b0b520e 100644 --- a/i18n/nl/email.md +++ b/i18n/nl/email.md @@ -378,12 +378,12 @@ Wij geven er de voorkeur aan dat de door ons aanbevolen aanbieders zo weinig mog - Beschermt het IP adres van de afzender. Filter het uit de weergave in het `Received` header veld. - Vereisen geen persoonlijk identificeerbare informatie (PII) naast een gebruikersnaam en een wachtwoord. -- Privacy policy that meets the requirements defined by the GDPR. +- Privacybeleid dat voldoet aan de vereisten van de GDPR. **Beste geval:** - Accepteert [anonieme betalingsopties](advanced/payments.md) ([cryptocurrency](cryptocurrency.md), contant geld, cadeaukaarten, etc.) -- Hosted in a jurisdiction with strong email privacy protection laws. +- Gehost in een jurisdictie met sterke wetgeving ter bescherming van de privacy van e-mails. ### Veiligheid diff --git a/i18n/nl/news-aggregators.md b/i18n/nl/news-aggregators.md index 61e36219..326739ad 100644 --- a/i18n/nl/news-aggregators.md +++ b/i18n/nl/news-aggregators.md @@ -102,9 +102,9 @@ Een [nieuwsaggregator](https://en.wikipedia.org/wiki/News_aggregator) is een man **NetNewsWire** een gratis en open-source feedlezer voor macOS en iOS met een focus op een native ontwerp en functieset. Het ondersteunt de typische feed formaten naast ingebouwde ondersteuning voor Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacybeleid" } - [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentatie} - [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Broncode" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } ??? downloads "Downloaden" diff --git a/i18n/nl/notebooks.md b/i18n/nl/notebooks.md index cc903866..94307d2c 100644 --- a/i18n/nl/notebooks.md +++ b/i18n/nl/notebooks.md @@ -44,7 +44,7 @@ Joplin ondersteunt geen wachtwoord/PIN beveiliging voor de [applicatie zelf of i ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } - Standard Notes is een eenvoudige en persoonlijke notitie app die jouw notities gemakkelijk en overal beschikbaar maakt. Het biedt E2EE op elk platform, en een krachtige desktop-ervaring met thema's en aangepaste editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). + Standard Notes is een eenvoudige en persoonlijke notitie app die jouw notities gemakkelijk en overal beschikbaar maakt. Het biedt E2EE op elk platform, en een krachtige desktop-ervaring met thema's en aangepaste editors. Het is ook [onafhankelijk gecontroleerd](https://standardnotes.com/help/2/has-standard-notes-completed-a-third party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } diff --git a/i18n/nl/productivity.md b/i18n/nl/productivity.md index 2c3affd4..d62bd6e0 100644 --- a/i18n/nl/productivity.md +++ b/i18n/nl/productivity.md @@ -166,12 +166,12 @@ In het algemeen definiëren wij kantoorsuites als toepassingen die voor de meest #### Minimale vereisten - Moet open-source zijn. -- Must implement "zero-trust" end-to-end encryption. -- Must support password-protected files. +- End-to-end versleuteling, "zero-trust", moet worden geïmplementeerd. +- Moet wachtwoordbeveiligde bestanden ondersteunen. #### Beste geval Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte project in deze categorie. Het is mogelijk dat onze aanbevelingen geen of niet alle functies bevatten, maar degene die dat wel doen kunnen hoger gerangschikt worden dan andere op deze pagina. -- Should have a published audit from a reputable, independent third-party. +- Moet een gepubliceerde audit hebben van een gerenommeerde, onafhankelijke derde partij. diff --git a/i18n/nl/tor.md b/i18n/nl/tor.md index f3e7fc43..1e5fa1ef 100644 --- a/i18n/nl/tor.md +++ b/i18n/nl/tor.md @@ -115,9 +115,9 @@ Wij hebben eerder aanbevolen *Isolate Destination Address* in de Orbot instellin [:octicons-code-16:](https://gitweb.torproject.org/pluggable-transports/snowflake.git/){ .card-link title="Source Code" } [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. +Je kunt Snowflake inschakelen in je browser door deze in een ander tabblad te openen en de schakelaar aan te zetten. Je kunt het op de achtergrond laten werken tijdens het browsen om een bijdrage te leveren met jouw verbinding. We raden het installeren van Snowflake niet aan als een browserextensie; het toevoegen van extensies van derden kan je aanvalsoppervlak vergroten. -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} +[Snowflake uitvoeren in je browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} Snowflake verhoogt jouw privacy op geen enkele manier, en wordt ook niet gebruikt om verbinding te maken met het Tor-netwerk binnen jouw persoonlijke browser. Als jouw internetverbinding echter ongecensureerd is, zou je moeten overwegen het te gebruiken om mensen in gecensureerde netwerken te helpen zelf betere privacy te krijgen. Je hoeft je geen zorgen te maken over welke websites mensen via je proxy bezoeken- hun zichtbare surf IP adres zal overeenkomen met hun Tor exit node, niet met die van jou. diff --git a/i18n/nl/vpn.md b/i18n/nl/vpn.md index 137eb501..bc2dc4df 100644 --- a/i18n/nl/vpn.md +++ b/i18n/nl/vpn.md @@ -153,11 +153,11 @@ Mullvad [adviseert](https://mullvad.net/en/help/why-wireguard/) het gebruik van #### :material-check:{ .pg-green } IPv6-ondersteuning -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Met Mullvad heb je via [toegang tot services die gehost worden op IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), in tegenstelling tot andere providers die IPv6-verbindingen blokkeren. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad ondersteunde voorheen port forwarding, maar heeft deze optie verwijderd in [Mei 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Het ontbreken van deze functie kan bepaalde toepassingen negatief beïnvloeden, met name peer-to-peer applicaties zoals torrent clients. #### :material-check:{ .pg-green } Mobiele Clients diff --git a/i18n/pl/android.md b/i18n/pl/android.md index 8eb76c8e..f8e057a9 100644 --- a/i18n/pl/android.md +++ b/i18n/pl/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/pl/cryptocurrency.md b/i18n/pl/cryptocurrency.md index a359373e..9b64376b 100644 --- a/i18n/pl/cryptocurrency.md +++ b/i18n/pl/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/pl/news-aggregators.md b/i18n/pl/news-aggregators.md index e5625d65..3361aa16 100644 --- a/i18n/pl/news-aggregators.md +++ b/i18n/pl/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/pt-BR/android.md b/i18n/pt-BR/android.md index 3069d8cf..4bb92145 100644 --- a/i18n/pt-BR/android.md +++ b/i18n/pt-BR/android.md @@ -136,7 +136,7 @@ Os telefones Google Pixel são os únicos dispositivos que atualmente atendem ao [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/pt-BR/cryptocurrency.md b/i18n/pt-BR/cryptocurrency.md index 8c71af5b..fad65f85 100644 --- a/i18n/pt-BR/cryptocurrency.md +++ b/i18n/pt-BR/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/pt-BR/news-aggregators.md b/i18n/pt-BR/news-aggregators.md index a19e569f..bd0d502e 100644 --- a/i18n/pt-BR/news-aggregators.md +++ b/i18n/pt-BR/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/pt/android.md b/i18n/pt/android.md index 86e97005..06a1669f 100644 --- a/i18n/pt/android.md +++ b/i18n/pt/android.md @@ -138,7 +138,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/pt/cryptocurrency.md b/i18n/pt/cryptocurrency.md index b2346a9c..bd83cc2a 100644 --- a/i18n/pt/cryptocurrency.md +++ b/i18n/pt/cryptocurrency.md @@ -39,7 +39,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/pt/news-aggregators.md b/i18n/pt/news-aggregators.md index b5c3d2c9..41dddc05 100644 --- a/i18n/pt/news-aggregators.md +++ b/i18n/pt/news-aggregators.md @@ -111,10 +111,12 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **Miniflux** é um agregador de notícias baseado na web que você pode auto-hospedar. It supports the typical feed formats alongside built-in support for Reddit feeds. - [Visite miniflux.app](https://miniflux.app){ .md-button .md-button--primary } + [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } - **Downloads*** - - [:fontawesome-brands-github: Fonte](https://github.com/miniflux) downloads + ??? downloads - [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) - [:simple-apple: macOS](https://netnewswire.com) diff --git a/i18n/ru/android.md b/i18n/ru/android.md index 48eaef34..6fe15b45 100644 --- a/i18n/ru/android.md +++ b/i18n/ru/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/ru/cryptocurrency.md b/i18n/ru/cryptocurrency.md index 2c3e775f..63233e8b 100644 --- a/i18n/ru/cryptocurrency.md +++ b/i18n/ru/cryptocurrency.md @@ -38,7 +38,7 @@ cover: cryptocurrency.png For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/ru/encryption.md b/i18n/ru/encryption.md index cf952adb..221ee911 100644 --- a/i18n/ru/encryption.md +++ b/i18n/ru/encryption.md @@ -1,8 +1,8 @@ --- -meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" -title: "Инструменты для шифрования" +meta_title: "Рекомендуемые программы для шифрования: VeraCrypt, Cryptomator, PicoCrypt и OpenPGP - Privacy Guides" +title: "Программы для шифрования" icon: material/file-lock -description: Шифрование данных - единственный способ контролировать доступ к ним. These tools allow you to encrypt your emails and any other files. +description: Шифрование данных - единственный способ контролировать доступ к ним. Эти программы позволяют шифровать электронную почту и любые другие файлы. cover: encryption.png --- @@ -12,71 +12,81 @@ cover: encryption.png Перечисленные здесь программы являются многоплатформенными и отлично подходят для создания зашифрованных резервных копий ваших данных. -### VeraCrypt +### Cryptomator (Облако) !!! recommendation - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ align=right } - ![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ align=right } + ![Логотип Cryptomator](assets/img/encryption-software/cryptomator.svg){ align=right } - **VeraCrypt** - бесплатная и открытая программа, используемая для шифрования «на лету». Программа может создавать виртуальный зашифрованный диск в файле, зашифровать логический раздел или даже зашифровать все устройство с предзагрузочной аутентификацией. + **Cryptomator** - это программа для шифрования, разработанная для приватного хранения файлов в любом облачном хранилище. Программа может создавать хранилища в виртуальном диске, содержимое которых зашифровано и синхронизировано с твоим облачным хранилищем. - [Посетить veracrypt.fr](https://veracrypt.fr){ .md-button .md-button--primary } downloads + [:octicons-home-16: Домашняя страница](https://cryptomator.org){ .md-button .md-button--primary } + [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Политика конфиденциальности" } + [:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Документация} + [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Исходный код" } + [:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Поддержать } - - [:fontawesome-brands-windows: Windows](https://www.veracrypt.fr/en/Downloads.html) - - [:fontawesome-brands-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) - - [:fontawesome-brands-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) - - [:fontawesome-brands-git: Исходный код](https://www.veracrypt.fr/code) + ??? скачать + + - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) + - [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) + - [:simple-android: Android](https://cryptomator.org/android) + - [:simple-windows11: Windows](https://cryptomator.org/downloads) + - [:simple-apple: macOS](https://cryptomator.org/downloads) + - [:simple-linux: Linux](https://cryptomator.org/downloads) + - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.cryptomator.Cryptomator) -VeraCrypt - это форк прекратившего свое существование проекта TrueCrypt. По словам разработчиков, были реализованы улучшения безопасности и решены проблемы, найденные в ходе первоначального аудита кода TrueCrypt. +Cryptomator использует шифрование AES-256 для шифрования как файлов, так и их имён. Cryptomator не может зашифровать метаданные, такие как: время создания, изменения и доступа к файлу, количество и размер файлов и папок. -При шифровании с помощью VeraCrypt пользователь может выбирать различные [хэш-функции](https://en.wikipedia.org/wiki/VeraCrypt#Encryption_scheme) из их списка. Мы настоятельно рекомендуем выбирать [SHA-512](https://en.wikipedia.org/wiki/SHA-512) и блочное шифрование по алгоритму [AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. +Cure53 провёл [аудит](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) некоторых криптографических библиотек Cryptomator. Эти библиотеки включают в себя [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) и [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). Аудит не проходила [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), которая сейчас используется в iOS. -Аудит Truecrypt проводился [несколько раз](https://en.wikipedia.org/wiki/TrueCrypt#Security_audits). Veracrypt [проходил](https://en.wikipedia.org/wiki/VeraCrypt#VeraCrypt_audit) аудит уже отдельно. +В документации Cryptomator подробно описаны его предполагаемые [цели безопасности](https://docs.cryptomator.org/en/latest/security/security-target/), [архитектура безопасности](https://docs.cryptomator.org/en/latest/security/architecture/), и [лучшие практики](https://docs.cryptomator.org/en/latest/security/best-practices/) для использования. -### Cryptomator +### Picocrypt (Файлы) !!! recommendation - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ align=right } - **Cryptomator** позволяет легко загружать файлы в облако в виде зашифрованной файловой системы. [Посетить cryptomator.org](https://cryptomator.org){ .md-button .md-button--primary } [Privacy Policy](https://cryptomator.org/privacy){ .md-button } downloads + ![Логотип Picocrypt](assets/img/encryption-software/picocrypt.svg){ align=right } - - [:fontawesome-brands-windows: Windows](https://cryptomator.org/downloads) - - [:fontawesome-brands-apple: macOS](https://cryptomator.org/downloads) - - [:fontawesome-brands-linux: Linux](https://cryptomator.org/downloads) - - [:pg-flathub: Flatpak](https://flathub.org/apps/details/org.cryptomator.Cryptomator) - - [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) - - [:fontawesome-brands-android: F-Droid repo](https://cryptomator.org/android) - - [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) - - [:fontawesome-brands-github: Исходный код](https://github.com/cryptomator) + **Picocrypt** - это маленькая и простая программа, предоставляющая современное шифрование. Picocrypt использует безопасный шифр XChaCha20 и функцию формирования ключа Argon2id для обеспечения высокого уровня безопасности. Для функций шифрования он использует стандартные модули Go x/crypto. - [:octicons-repo-16: Repository](https://github.com/HACKERALERT/Picocrypt){ .md-button .md-button--primary } - [:octicons-code-16:](https://github.com/HACKERALERT/Picocrypt){ .card-link title="Source Code" } - [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title=Contribute } + [:octicons-repo-16: Репозиторий](https://github.com/HACKERALERT/Picocrypt){ .md-button .md-button--primary } + [:octicons-code-16:](https://github.com/HACKERALERT/Picocrypt){ .card-link title="Исходный код" } + [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title=Поддержать } - ??? downloads + ??? скачать - [:simple-windows11: Windows](https://github.com/HACKERALERT/Picocrypt/releases) - [:simple-apple: macOS](https://github.com/HACKERALERT/Picocrypt/releases) - [:simple-linux: Linux](https://github.com/HACKERALERT/Picocrypt/releases) -### Picocrypt +### VeraCrypt (Диск) !!! recommendation - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ align=right } + ![Логотип VeraCrypt](assets/img/encryption-software/veracrypt.svg#only-light){ align=right } + ![Логотип VeraCrypt](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ align=right } - **Picocrypt** - небольшая и простая программа для современного шифрования. Picocrypt использует безопасный шифр XChaCha20 и функцию формирования ключа Argon2id для обеспечения высокого уровня безопасности. + **VeraCrypt** - это свободно распространяемая утилита с исходным кодом, используемая для шифрования "на лету". Программа может создавать виртуальный зашифрованный диск в файле, зашифровать логический раздел или даже зашифровать все устройство с предзагрузочной аутентификацией. - Для функций шифрования он использует стандартные модули Go x/crypto. [Посетить github.com](https://github.com/HACKERALERT/Picocrypt){ .md-button .md-button--primary } + [:octicons-home-16: Домашняя страница](https://veracrypt.fr){ .md-button .md-button--primary } + [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Документация} + [:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Исходный код" } + [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Поддержать } + + ??? скачать + + - [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) + - [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) + - [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) -VeraCrypt is a fork of the discontinued TrueCrypt project. recommendation +VeraCrypt - это форк, прекратившего свое существование, проекта TrueCrypt. По словам разработчиков, были реализованы улучшения безопасности и решены проблемы, найденные в ходе первоначального аудита кода TrueCrypt. -When encrypting with VeraCrypt, you have the option to select from different [hash functions](https://en.wikipedia.org/wiki/VeraCrypt#Encryption_scheme). We suggest you **only** select [SHA-512](https://en.wikipedia.org/wiki/SHA-512) and stick to the [AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) block cipher. +При шифровании с помощью VeraCrypt ты можешь выбрать различные [хэш-функции](https://en.wikipedia.org/wiki/VeraCrypt#Encryption_scheme). Мы настоятельно рекомендуем выбрать **только** [SHA-512](https://en.wikipedia.org/wiki/SHA-512) и блочное шифрование по алгоритму [AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard). -Truecrypt has been [audited a number of times](https://en.wikipedia.org/wiki/TrueCrypt#Security_audits), and VeraCrypt has also been [audited separately](https://en.wikipedia.org/wiki/VeraCrypt#VeraCrypt_audit). +Аудит Truecrypt проводился [несколько раз](https://en.wikipedia.org/wiki/TrueCrypt#Security_audits). Veracrypt [проходил](https://en.wikipedia.org/wiki/VeraCrypt#VeraCrypt_audit) аудит уже отдельно. -## Функции ОС для полного шифрования диска +## Шифрование всего диска Современные ОС включают в себя [шифрование диска](https://en.wikipedia.org/wiki/Disk_encryption) и используют [безопасный криптопроцессор](https://en.wikipedia.org/wiki/Secure_cryptoprocessor). @@ -84,17 +94,17 @@ Truecrypt has been [audited a number of times](https://en.wikipedia.org/wiki/Tru !!! recommendation - ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } + ![Логотип BitLocker](assets/img/encryption-software/bitlocker.png){ align=right } - **BitLocker** - решение для полного шифрования логического тома в Microsoft Windows. Основная причина, по которой мы рекомендуем его, заключается в [использовании доверенного платформенного модуля](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). [ElcomSoft](https://ru.wikipedia.org/wiki/ElcomSoft), криминалистическая компания, написала об этом в [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). + **BitLocker** - решение для полного шифрования диска в Microsoft Windows. Основная причина, по которой мы рекомендуем его, заключается в [использовании доверенного платформенного модуля (TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). [ElcomSoft](https://ru.wikipedia.org/wiki/ElcomSoft), криминалистическая компания, написала об этом в [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). - [Посетить microsoft.com](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .md-button .md-button--primary } + [:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Документация} -BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker [поддерживается только](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) в Pro, Enterprise и Education версиях Windows. Эту функцию можно включить и в Home версии при соответствии условиям. -??? example "Enabling BitLocker on Windows Home" +??? пример «Включение BitLocker на Windows Home» - To enable BitLocker on "Home" editions of Windows, you must have partitions formatted with a [GUID Partition Table](https://en.wikipedia.org/wiki/GUID_Partition_Table) and have a dedicated TPM (v1.2, 2.0+) module. + Чтобы включить BitLocker в "Домашних" редакциях Windows, необходимо, чтобы разделы были отформатированы с помощью [GUID Partition Table](https://en.wikipedia.org/wiki/GUID_Partition_Table) и имели выделенный модуль TPM (v1.2, 2.0+). 1. Open a command prompt and check your drive's partition table format with the following command. You should see "**GPT**" listed under "Partition Style": diff --git a/i18n/ru/news-aggregators.md b/i18n/ru/news-aggregators.md index 45d0bf30..b71a2e30 100644 --- a/i18n/ru/news-aggregators.md +++ b/i18n/ru/news-aggregators.md @@ -107,7 +107,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/sv/android.md b/i18n/sv/android.md index db3046d6..f3a3e9de 100644 --- a/i18n/sv/android.md +++ b/i18n/sv/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/sv/cryptocurrency.md b/i18n/sv/cryptocurrency.md index 7e699172..dd268334 100644 --- a/i18n/sv/cryptocurrency.md +++ b/i18n/sv/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/sv/news-aggregators.md b/i18n/sv/news-aggregators.md index cbac0101..226ef33d 100644 --- a/i18n/sv/news-aggregators.md +++ b/i18n/sv/news-aggregators.md @@ -101,12 +101,12 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** är en gratis och öppen källkodsläsare för macOS och iOS med fokus på en inhemsk design och funktionalitet. It supports the typical feed formats alongside built-in support for Reddit feeds. - [:octicons-home-16: Startsida](https://cryptomator.org){ .md-button .md-button--primary } + [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } - [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Dokumentation} - [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Källkod" } - [](/){ .card-link title=Contribute??? nedladdningar + ??? nedladdningar - [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) - [:simple-apple: macOS](https://netnewswire.com) diff --git a/i18n/tr/android.md b/i18n/tr/android.md index e537bb81..7ecd6427 100644 --- a/i18n/tr/android.md +++ b/i18n/tr/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/tr/cryptocurrency.md b/i18n/tr/cryptocurrency.md index 6cbffceb..1b727c6b 100644 --- a/i18n/tr/cryptocurrency.md +++ b/i18n/tr/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/tr/news-aggregators.md b/i18n/tr/news-aggregators.md index cddb4666..2ee329df 100644 --- a/i18n/tr/news-aggregators.md +++ b/i18n/tr/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/uk/android.md b/i18n/uk/android.md index 9f19e3a4..1a54b12f 100644 --- a/i18n/uk/android.md +++ b/i18n/uk/android.md @@ -136,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/uk/cryptocurrency.md b/i18n/uk/cryptocurrency.md index 817961a9..85ca98f2 100644 --- a/i18n/uk/cryptocurrency.md +++ b/i18n/uk/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/uk/news-aggregators.md b/i18n/uk/news-aggregators.md index 661b2d2e..76ce7305 100644 --- a/i18n/uk/news-aggregators.md +++ b/i18n/uk/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/vi/android.md b/i18n/vi/android.md index 239e97c4..21363247 100644 --- a/i18n/vi/android.md +++ b/i18n/vi/android.md @@ -132,7 +132,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/vi/cryptocurrency.md b/i18n/vi/cryptocurrency.md index 6f9dad5f..6d243160 100644 --- a/i18n/vi/cryptocurrency.md +++ b/i18n/vi/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/vi/news-aggregators.md b/i18n/vi/news-aggregators.md index cc0e9531..fde6d151 100644 --- a/i18n/vi/news-aggregators.md +++ b/i18n/vi/news-aggregators.md @@ -98,7 +98,10 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. - [Homepage](https://miniflux.app){ .md-button .md-button--primary } + [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } ??? downloads diff --git a/i18n/zh-Hant/android.md b/i18n/zh-Hant/android.md index e7eab0ba..a5d2cebd 100644 --- a/i18n/zh-Hant/android.md +++ b/i18n/zh-Hant/android.md @@ -136,7 +136,7 @@ Google Pixel 手機是目前唯一符合 GrapheneOS [硬體安全要求](https:/ [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } - [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS 有自動內核弱點 ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [補丁](https://gitlab.com/divested-mobile/cve_checker)、更少的商業專用 blobs 與自定的 [hosts](https://divested.dev/index.php?page=dnsbl) 檔案。 其加固的 WebView, [Mulch](https://gitlab.com/divested-mobile/mulch),能使 [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) 用在所有架構和 [網路狀態分區](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning),且接收額外更新。 DivestOS 還包括來自GrapheneOS 內核補丁,並通過 [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758),開啟所有可用的內核安全功能。 3.4 版之後更新的內核都包括全頁[淨化](https://lwn.net/Articles/334747/) ,所有 ~22 Clang 編譯的內核都啟用了 [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471)。 diff --git a/i18n/zh-Hant/cryptocurrency.md b/i18n/zh-Hant/cryptocurrency.md index b1a85d88..4358fb47 100644 --- a/i18n/zh-Hant/cryptocurrency.md +++ b/i18n/zh-Hant/cryptocurrency.md @@ -38,7 +38,7 @@ cover: cryptocurrency.png 為了獲得最大的隱私(即便使用非保管錢包),您應該運行自己的 Monero 節點。 使用別人的節點會暴露一些信息,例如您從中連接到它的IP位址,同步錢包的時間戳記以及您從錢包發送的交易(儘管沒有關於這些交易的其他細節)。 或者,您可以通過Tor或i2p連接到其他人的Monero節點。 -2021年8月, CipherTrace [宣布爲政府機構提供](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) 增強的 Monero 追蹤功能。 公開貼文顯示,美國財政部金融犯罪執法網絡 [在2022年底授權](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace 的 “Monero 模塊”。 +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. 公開貼文顯示,美國財政部金融犯罪執法網絡 [在2022年底授權](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace 的 “Monero 模塊”。 Monero 交易圖隱私受到其相對較小的環形簽名的限制,特別是抵抗針對性的攻擊。 Monero's 隱私功能也曾被某些資安研究人員 [質疑](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) ,過去已發現一些弱點與補丁,因此如 CipherTrace 的宣稱並非不可能。 雖然 Monero 大規模監控工具不太可能像比特幣和其他工具一樣存在,但可以肯定的是,追蹤工具有助於進行針對性的調查。 diff --git a/i18n/zh-Hant/news-aggregators.md b/i18n/zh-Hant/news-aggregators.md index 01a8c485..ab3fde96 100644 --- a/i18n/zh-Hant/news-aggregators.md +++ b/i18n/zh-Hant/news-aggregators.md @@ -102,7 +102,7 @@ cover: news-aggregators.png * * NetNewsWire * *是一款免費開源的訊息源閱讀器,適用於macOS 和 iOS ,專注於原生設計和功能集。 它支持典型的Feed 格式與內置支持 Reddit Feed。 [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/i18n/zh/android.md b/i18n/zh/android.md index 683a4746..5a676b51 100644 --- a/i18n/zh/android.md +++ b/i18n/zh/android.md @@ -131,11 +131,12 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw **DivestOS**是 [LineageOS](https://lineageos.org/)的一个软分叉。 DivestOS从LineageOS继承了许多[支持的设备](https://divestos.org/index.php?page=devices&base=LineageOS)。 它有签名的构建,使得在一些非Pixel设备上可以有[验证的启动](https://source.android.com/security/verifiedboot)。 - [:octicons-home-16: 主页](https://grapheneos.org/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="隐私政策" } - [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=文档} - [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="源代码" } - [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title="贡献" } + [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } + [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Onion Service" } + [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" } + [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation} + [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" } + [:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute } DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. diff --git a/i18n/zh/cryptocurrency.md b/i18n/zh/cryptocurrency.md index 545e5930..6a8e6a6b 100644 --- a/i18n/zh/cryptocurrency.md +++ b/i18n/zh/cryptocurrency.md @@ -38,7 +38,7 @@ For optimal privacy, make sure to use a noncustodial wallet where the view key s For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://finance.yahoo.com/news/ciphertrace-announces-enhanced-monero-tracing-160000275.html) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. diff --git a/i18n/zh/news-aggregators.md b/i18n/zh/news-aggregators.md index 07110016..b759abbf 100644 --- a/i18n/zh/news-aggregators.md +++ b/i18n/zh/news-aggregators.md @@ -102,7 +102,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } + [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" } diff --git a/includes/abbreviations.it.txt b/includes/abbreviations.it.txt index 807bcbb9..ed6ce1f2 100644 --- a/includes/abbreviations.it.txt +++ b/includes/abbreviations.it.txt @@ -8,7 +8,7 @@ *[CLI]: Interfaccia a linea di comando *[CSV]: Comma-Separated Values *[CVE]: Common Vulnerabilities and Exposures -*[digital legacy feature]: Digital Legacy si riferisce a funzioni che consentono di dare ad altre persone l'accesso ai propri dati quando si muore +*[funzione di eredità digitale]: Digital Legacy si riferisce a funzioni che consentono di dare ad altre persone l'accesso ai propri dati quando si muore *[DNSSEC]: Domain Name System Security Extensions *[DNS]: Domain Name System *[DoH]: DNS over HTTPS diff --git a/includes/abbreviations.ko.txt b/includes/abbreviations.ko.txt index 32f6a61c..6bd873a1 100644 --- a/includes/abbreviations.ko.txt +++ b/includes/abbreviations.ko.txt @@ -8,7 +8,7 @@ *[CLI]: 명령어 인터페이스 *[CSV]: Comma-Separated Values *[CVE]: 공통 보안 취약점 및 노출(Common Vulnerabilities and Exposures) -*[digital legacy feature]: 디지털 유산(Digital Legacy)은 사용자가 사망했을 때 사망자의 데이터에 접근 가능한 사람을 지정할 수 있는 기능을 말합니다. +*[디지털 유산 상속 기능]: 디지털 유산(Digital Legacy) 상속 기능은 사용자가 사망했을 때 사망자의 데이터에 접근 가능한 사람을 지정할 수 있는 기능을 말합니다. *[DNSSEC]: DNS Security Extensions *[DNS]: 도메인 네임 시스템 *[DoH]: DNS over HTTPS diff --git a/includes/abbreviations.nl.txt b/includes/abbreviations.nl.txt index 360be271..59cb704d 100644 --- a/includes/abbreviations.nl.txt +++ b/includes/abbreviations.nl.txt @@ -8,7 +8,7 @@ *[CLI]: Command Line Interface *[CSV]: Comma-Separated Values *[CVE]: Common Vulnerabilities and Exposures -*[digital legacy feature]: Digital Legacy verwijst naar functies waarmee je andere mensen toegang kunt geven tot jouw gegevens wanneer je overlijdt +*[digitale erfenis functie]: Digital Legacy verwijst naar functies waarmee je andere mensen toegang kunt geven tot jouw gegevens wanneer je overlijdt *[DNSSEC]: Domain Name System Security Extensions *[DNS]: Domain Name System *[DoH]: DNS over HTTPS