diff --git a/i18n/ar/advanced/communication-network-types.md b/i18n/ar/advanced/communication-network-types.md index fc77fe4d..a478b279 100644 --- a/i18n/ar/advanced/communication-network-types.md +++ b/i18n/ar/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[ما نوصي به من برامج مراسلة فورية](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/ar/advanced/tor-overview.md b/i18n/ar/advanced/tor-overview.md index 00aec17c..82925019 100644 --- a/i18n/ar/advanced/tor-overview.md +++ b/i18n/ar/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. يلبِّس هذا أصل الاتصال، وليس بوسع أي خادم في سبيل الاتصال رؤيته من بدايته لمقصده، مما يعني أن حتى الخوادم المستخدمة للاتصال لا تنتهك مجهوليتك. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/ar/basics/vpn-overview.md b/i18n/ar/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/ar/basics/vpn-overview.md +++ b/i18n/ar/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/ar/basics/why-privacy-matters.md b/i18n/ar/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/ar/basics/why-privacy-matters.md +++ b/i18n/ar/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/ar/index.md b/i18n/ar/index.md index 1af2d94e..17afb0cb 100644 --- a/i18n/ar/index.md +++ b/i18n/ar/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
Tip
diff --git a/i18n/bn-IN/advanced/communication-network-types.md b/i18n/bn-IN/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/bn-IN/advanced/communication-network-types.md +++ b/i18n/bn-IN/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/bn-IN/advanced/tor-overview.md b/i18n/bn-IN/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/bn-IN/advanced/tor-overview.md +++ b/i18n/bn-IN/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/bn-IN/basics/vpn-overview.md b/i18n/bn-IN/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/bn-IN/basics/vpn-overview.md +++ b/i18n/bn-IN/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/bn-IN/basics/why-privacy-matters.md b/i18n/bn-IN/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/bn-IN/basics/why-privacy-matters.md +++ b/i18n/bn-IN/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/bn-IN/index.md b/i18n/bn-IN/index.md index d3fe4a59..b181fecd 100644 --- a/i18n/bn-IN/index.md +++ b/i18n/bn-IN/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/bn/advanced/communication-network-types.md b/i18n/bn/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/bn/advanced/communication-network-types.md +++ b/i18n/bn/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/bn/advanced/tor-overview.md b/i18n/bn/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/bn/advanced/tor-overview.md +++ b/i18n/bn/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/bn/basics/vpn-overview.md b/i18n/bn/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/bn/basics/vpn-overview.md +++ b/i18n/bn/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/bn/basics/why-privacy-matters.md b/i18n/bn/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/bn/basics/why-privacy-matters.md +++ b/i18n/bn/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/bn/index.md b/i18n/bn/index.md index d3fe4a59..b181fecd 100644 --- a/i18n/bn/index.md +++ b/i18n/bn/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/cs/advanced/communication-network-types.md b/i18n/cs/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/cs/advanced/communication-network-types.md +++ b/i18n/cs/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/cs/advanced/tor-overview.md b/i18n/cs/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/cs/advanced/tor-overview.md +++ b/i18n/cs/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/cs/basics/vpn-overview.md b/i18n/cs/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/cs/basics/vpn-overview.md +++ b/i18n/cs/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/cs/basics/why-privacy-matters.md b/i18n/cs/basics/why-privacy-matters.md index 19bb95be..97a9a650 100644 --- a/i18n/cs/basics/why-privacy-matters.md +++ b/i18n/cs/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/cs/index.md b/i18n/cs/index.md index cc2373db..afc43fe8 100644 --- a/i18n/cs/index.md +++ b/i18n/cs/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/de/advanced/communication-network-types.md b/i18n/de/advanced/communication-network-types.md index 43df6468..bda0cc4c 100644 --- a/i18n/de/advanced/communication-network-types.md +++ b/i18n/de/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Eine Übersicht über mehrere Netzwerkarchitekturen, die häufig vo Es gibt mehrere Netzwerkarchitekturen, die häufig verwendet werden, um Nachrichten zwischen Menschen zu übertragen. Diese Netzwerke können unterschiedliche Datenschutzgarantien bieten, weshalb es sich lohnt, bei der Entscheidung, welche App du verwenden möchtest, ihr [Bedrohungsmodell](../basics/threat-modeling.md) zu berücksichtigen. -[Empfohlene Instant Messenger](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Zentralisierte Netzwerke diff --git a/i18n/de/advanced/tor-overview.md b/i18n/de/advanced/tor-overview.md index 51a4d48f..c52f5edb 100644 --- a/i18n/de/advanced/tor-overview.md +++ b/i18n/de/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor ist ein kostenloses, dezentralisiertes Netzwerk, das entwickelt [**Tor**](../alternative-networks.md#tor) ist ein kostenloses, dezentralisiertes Netzwerk, das entwickelt wurde, um das Internet mit so viel Privatsphäre wie möglich zu nutzen. Bei richtiger Nutzung ermöglicht das Netzwerk privates und anonymes Surfen und Kommunikation. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor funktioniert, indem es deinen Internetverkehr über von Freiwilligen betriebenen Server leitet, anstatt eine direkte Verbindung zu der Website herzustellen, die du besuchen willst. Dadurch wird verschleiert, woher der Datenverkehr kommt, und kein Server im Verbindungspfad ist in der Lage, den vollständigen Pfad zu sehen, woher der Datenverkehr kommt und wohin er geht, was bedeutet, dass selbst die Server, die du für die Verbindung verwendest, deiner Anonymität nichts anhaben können. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/de/basics/vpn-overview.md b/i18n/de/basics/vpn-overview.md index 116ccca2..2b087cc0 100644 --- a/i18n/de/basics/vpn-overview.md +++ b/i18n/de/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/de/basics/why-privacy-matters.md b/i18n/de/basics/why-privacy-matters.md index 3c1916fd..b031f472 100644 --- a/i18n/de/basics/why-privacy-matters.md +++ b/i18n/de/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Die Privatsphäre geht letztendlich um menschliche Informationen, und das ist wi Viele Menschen verwechseln die Begriffe zur **Privatsphäre**, **Sicherheit** und **Anonymität**. Es gibt Leute, die verschiedene Produkte als "nicht privat" kritisieren, obwohl sie in Wirklichkeit meinen, dass sie beispielsweise keine Anonymität bieten. Auf dieser Website befassen wir uns mit allen drei Themen, aber es ist wichtig, dass du den Unterschied zwischen ihnen verstehst und weißt, wann es um welches der drei Themen geht. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privatsphäre** : @@ -56,6 +58,8 @@ Nimm zum Beispiel Einwilligungserklärungen für Cookies. Auf den verschiedenen Datenschutz ist etwas, das standardmäßig in die von uns genutzte [Software und die von uns genutzten Dienste](../tools.md) implementiert sein muss, denn man kann die meisten Anwendungen und Dienste nicht selbst auf Datenschutz trimmen. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Quellen - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) von Neil Richards diff --git a/i18n/de/index.md b/i18n/de/index.md index 2d223cc7..255dd877 100644 --- a/i18n/de/index.md +++ b/i18n/de/index.md @@ -71,7 +71,8 @@ Der Versuch, alle deine Daten ständig vor allen zu schützen, ist unpraktisch,Tipp
diff --git a/i18n/el/advanced/communication-network-types.md b/i18n/el/advanced/communication-network-types.md index 0e559e21..a478b279 100644 --- a/i18n/el/advanced/communication-network-types.md +++ b/i18n/el/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Προτεινόμενες εφαρμογές άμεσων μηνυμάτων](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/el/advanced/tor-overview.md b/i18n/el/advanced/tor-overview.md index 3da40545..af7387f3 100644 --- a/i18n/el/advanced/tor-overview.md +++ b/i18n/el/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Επειδή η διαδικτυακή κυκλοφορία του Tor είναι δύσκολο να μπλοκαριστεί και να ανιχνευθεί, το Tor είναι ένα αποτελεσματικό εργαλείο παράκαμψης της λογοκρισίας. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/el/basics/vpn-overview.md b/i18n/el/basics/vpn-overview.md index 37297abf..c2288443 100644 --- a/i18n/el/basics/vpn-overview.md +++ b/i18n/el/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/el/basics/why-privacy-matters.md b/i18n/el/basics/why-privacy-matters.md index ad7fa46b..0a88a6f2 100644 --- a/i18n/el/basics/why-privacy-matters.md +++ b/i18n/el/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: Στη σύγχρονη εποχή της εκμετάλλευση Πολλά άτομα συγχέουν τις έννοιες της **ιδιωτικότητας** (privacy), της **ασφάλειας** (security), και της **ανωνυμίας** (anonymity). Συγκεκριμένα στα Ελληνικά τώρα, η αγγλική λέξη "privacy" έχει συχνά μεταφραστεί ως απόρρητο, αν και το απόρρητο είναι ευρύτερη έννοια. Θα λέγαμε πως περικλείει τόσο την ιδιωτικότητα, όσο την ασφάλεια και την ανωνυμία. Ετυμολογικά σημαίνει "αυτό που δεν λέγεται ή ορίζεται." Αγγλικές λέξεις που της αντιστοιχούν πέραν του "privacy" είναι: "confidentiality", "secret", "unspeakable", "undefinable." Για την αποφυγή σύγχησης, συνεπώς, μεταφράζουμε το "privacy" ως ιδιωτικότητα σε όλες τις περιπτώσεις εκτός από αυτές όπου νοείται ευρήτερα. Αν θέλεις να αναπτύξεις σωστή κρίση για τα συστήματα που χρησιμοποιείς καθημερινά, είναι σημαντικότατο να αντιληφθείς πως και πότε το απόρρητο διαχωρίζεται σε ιδιωτικότητα, ασφάλεια, και ανωνυμία· και πότε η καθεμία από αυτές παίζει ρόλο. Θα ακούσεις, για παράδειγμα, άτομα να κριτικάρουν διάφορα προϊόντα ως «μη-ιδιωτικά» ενώ στην πραγματικότητα εννοούν πως αυτά δεν προσφέρουν ανωνυμία. Στον παρών ιστότοπο καλύπτουμε και τα τρία θέματα, μα είναι κρίσιμο, όπως προαναφέραμε, να θυμάσαι την εννοιολογική τους διαφορά όσο διαβάζεις τις συμβουλές μας. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Ιδιωτικότητα** : @@ -56,6 +58,8 @@ description: Στη σύγχρονη εποχή της εκμετάλλευση Η ιδιωτικότητα (και το απόρρητο γενικότερα) οφείλει να βρίσκεται ενσωματωμένο στο [ λογισμικό και τις υπηρεσίες](../tools.md) που χρησιμοποιούμε εκ προεπιλογής, δεν μπορείς από μόνο σου να παραποιήσεις τις περισσότερες εφαρμογές ώστε να είναι ιδιωτικές. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Πηγές - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) από Neil Richards diff --git a/i18n/el/index.md b/i18n/el/index.md index ab87082c..8a87cab2 100644 --- a/i18n/el/index.md +++ b/i18n/el/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenΣυμβουλή
diff --git a/i18n/eo/advanced/communication-network-types.md b/i18n/eo/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/eo/advanced/communication-network-types.md +++ b/i18n/eo/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/eo/advanced/tor-overview.md b/i18n/eo/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/eo/advanced/tor-overview.md +++ b/i18n/eo/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/eo/basics/vpn-overview.md b/i18n/eo/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/eo/basics/vpn-overview.md +++ b/i18n/eo/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/eo/basics/why-privacy-matters.md b/i18n/eo/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/eo/basics/why-privacy-matters.md +++ b/i18n/eo/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/eo/index.md b/i18n/eo/index.md index d3fe4a59..b181fecd 100644 --- a/i18n/eo/index.md +++ b/i18n/eo/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/es/about/jobs.md b/i18n/es/about/jobs.md index 1cc78f3d..192c5359 100644 --- a/i18n/es/about/jobs.md +++ b/i18n/es/about/jobs.md @@ -3,7 +3,7 @@ title: Puestos de Trabajo description: Privacy Guides cuenta con un pequeño equipo remoto de investigadores y defensores de la privacidad. Cualquier puesto vacante que podremos tener en el futuro será publicado aquí. --- -Privacy Guides cuenta con un pequeño equipo remoto de investigadores y defensores de la privacidad quienes están trabajando para avanzar nuestra misión de proteger la libertad de expresión y promover tecnología respetuosa con la privacidad. Como organización sin ánimo de lucro, nos expandimos muy lentamente para garantizar la sostenibilidad del proyecto a largo plazo. Todos los miembros de nuestro equipo figuran [aquí](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Por favor, considera [donar](https://donate.magicgrants.org/privacyguides) para apoyar nuestra causa. +Privacy Guides cuenta con un pequeño equipo remoto de investigadores y defensores de la privacidad quienes están trabajando para avanzar nuestra misión de proteger la libertad de expresión y promover tecnología respetuosa con la privacidad. Como organización sin ánimo de lucro, nos expandimos muy lentamente para garantizar la sostenibilidad del proyecto a largo plazo. Todos los miembros de nuestro equipo figuran aquí. Por favor, considera donar para apoyar nuestra causa. Ocasionalmente buscamos buenos redactores periodísticos, revisores de productos y expertos en privacidad para que nos ayuden, y los puestos vacantes se publicarán a continuación. diff --git a/i18n/es/advanced/communication-network-types.md b/i18n/es/advanced/communication-network-types.md index d871d9d1..8f493a72 100644 --- a/i18n/es/advanced/communication-network-types.md +++ b/i18n/es/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Una visión general de varias arquitecturas de red comúnmente util Existen varias arquitecturas de red utilizadas habitualmente para transmitir mensajes entre personas. Estas redes pueden ofrecer diferentes garantías de privacidad, por lo que conviene tener en cuenta tu [modelo de amenaza](../basics/threat-modeling.md) a la hora de decidir qué aplicación utilizar. -[Servicios de Mensajería Instantánea Recomendados](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Redes centralizadas diff --git a/i18n/es/advanced/tor-overview.md b/i18n/es/advanced/tor-overview.md index 70f25411..87689968 100644 --- a/i18n/es/advanced/tor-overview.md +++ b/i18n/es/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor es una red descentralizada y gratuita diseñada para utilizar I [**Tor**](../alternative-networks.md#tor) es una red gratuita y descentralizada diseñada para usar el Internet con la mayor privacidad posible. Si se utiliza correctamente, la red permite la navegación y las comunicaciones privadas y anónimas. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor funciona enrutando tu tráfico de Internet a través de servidores operados por voluntarios, en vez de realizar conexiones directas al sitio que estás tratando de visitar. Esto ofusca de dónde viene el tráfico, y ningún servidor en la ruta de conexión es capaz de ver la ruta completa de dónde viene y a dónde va el tráfico, lo que significa que incluso los servidores a los que te estás conectando no pueden romper tu anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Página Principal } diff --git a/i18n/es/ai-chat.md b/i18n/es/ai-chat.md index 949a7131..87f8f0e5 100644 --- a/i18n/es/ai-chat.md +++ b/i18n/es/ai-chat.md @@ -161,7 +161,7 @@ Para comprobar la autenticidad y seguridad del modelo, busca: - Comentarios de la comunidad y estadísticas de uso - Un distintivo "Seguro" junto a la ficha del modelo (solo Hugging Face) - Checksums coincidentes[^1] - - En Hugging Face, puedes encontrar el hash haciendo clic en un archivo de modelo y buscando el botón **Copy SHA256** debajo de él. Debes comparar esta checksum con la del fichero modelo que has descargado. + - En Hugging Face, puedes encontrar el hash haciendo clic en un archivo de modelo y buscando el botón **Copy SHA256** debajo de él. Debes comparar esta checksum con la del fichero modelo que has descargado. A downloaded model is generally safe if it satisfies all the above checks. diff --git a/i18n/es/android/index.md b/i18n/es/android/index.md index 4f2fa256..d112822e 100644 --- a/i18n/es/android/index.md +++ b/i18n/es/android/index.md @@ -38,7 +38,7 @@ También hay muchas alternativas privadas a las aplicaciones que vienen preinsta Cuando compras un teléfono Android, el sistema operativo por defecto viene con aplicaciones y funcionalidades que no forman parte de Android Open Source Project. Muchas de estas aplicaciones -incluso aplicaciones como el marcador que proporcionan una funcionalidad básica del sistema- requieren integraciones invasivas con Google Play Services, que a su vez pide privilegios para acceder a tus archivos, almacenamiento de contactos, registros de llamadas, mensajes SMS, ubicación, cámara, micrófono y muchas otras cosas en tu dispositivo para que esas aplicaciones básicas del sistema y muchas otras aplicaciones funcionen en primer lugar. Frameworks como Google Play Services aumentan la superficie de ataque de tu dispositivo y son la fuente de varios problemas de privacidad con Android. -Este problema se puede resolver utilizando una distribución alternativa de Android, comúnmente conocida como _ROM personalizada_, que no venga con una integración tan invasiva. Desafortunadamente, varias distribuciones modificadas de Android suelen violar el modelo de seguridad de Android al no soportar características críticas de seguridad como el AVB, protección de reversión, actualizaciones del firmware, etc. Algunas distribuciones también incluyen compilaciones [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) que exponen la raíz a través de [ADB](https://developer.android.com/studio/command-line/adb) y requieren políticas SELinux [más permisivas](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug\&type=code) para acomodar las características de depuración, lo que resulta en una mayor superficie de ataque y un modelo de seguridad debilitado. +Este problema se puede resolver utilizando una distribución alternativa de Android, comúnmente conocida como _ROM personalizada_, que no venga con una integración tan invasiva. Desafortunadamente, varias distribuciones modificadas de Android suelen violar el modelo de seguridad de Android al no soportar características críticas de seguridad como el AVB, protección de reversión, actualizaciones del firmware, etc. Algunas distribuciones también incluyen compilaciones [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) que exponen la raíz a través de [ADB](https://developer.android.com/studio/command-line/adb) y requieren políticas SELinux más permisivas para acomodar las características de depuración, lo que resulta en una mayor superficie de ataque y un modelo de seguridad debilitado. Idealmente, cuando escojas una distribución de Android, deberías asegurarte de que mantenga el modelo de seguridad de Android. Como mínimo, la distribución debería tener compilaciones de producción, compatibilidad con AVB, protección contra reversiones, actualizaciones puntuales del firmware y del sistema operativo, y SELinux en [modo de imposición](https://source.android.com/security/selinux/concepts#enforcement_levels). Todas nuestras distribuciones de Android recomendadas cumplen estos criterios: diff --git a/i18n/es/basics/vpn-overview.md b/i18n/es/basics/vpn-overview.md index 9bd7b83b..f31e49a2 100644 --- a/i18n/es/basics/vpn-overview.md +++ b/i18n/es/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Las Redes Privadas Virtuales desplazan el riesgo de tu ISP a un ter Las Redes Privadas Virtuales son una forma de ampliar el extremo de tu red para que salga por otro lugar en el mundo. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normalmente, un ISP puede ver el flujo de tráfico de Internet que entra y sale de Tu dispositivo de terminación de red (es decir, el módem). Los protocolos de cifrado como HTTPS se utilizan habitualmente en Internet, por lo que es posible que no puedan ver exactamente lo que publicas o lees, pero pueden hacerse una idea de los [dominios que solicitas](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). El uso de una VPN oculta incluso esta información a tu ISP, al trasladar la confianza que depositas en tu red a un servidor situado en otro lugar del mundo. Como resultado, el ISP solo ve que estás conectado a una VPN y nada sobre la actividad que estás pasando a través de ella. diff --git a/i18n/es/basics/why-privacy-matters.md b/i18n/es/basics/why-privacy-matters.md index afadc7c5..b5687272 100644 --- a/i18n/es/basics/why-privacy-matters.md +++ b/i18n/es/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ En última instancia, la privacidad tiene que ver con la información humana, y Mucha gente confunde los conceptos de **privacidad**, **seguridad**, y **anonimato**. Por ejemplo, verás a gente criticar varios productos por "no ser privados" cuando en realidad quieren decir que no proporcionan anonimato. En este sitio web tratamos estos tres temas, pero es importante que entiendas la diferencia entre ellos y cuándo entra en juego cada uno. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacidad** : @@ -56,6 +58,8 @@ Por ejemplo, los formularios de consentimiento de cookies. Es posible que los en La privacidad es algo que tenemos que tener incorporado en [el software y los servicios](../tools.md) que utilizamos por defecto, no puedes hacer que la mayoría de las aplicaciones sean privadas por tu cuenta. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Fuentes - [Por Qué Importa La Privacidad](https://amazon.com/dp/0190939044) (2021) por Neil Richards diff --git a/i18n/es/device-integrity.md b/i18n/es/device-integrity.md index da017640..0be561d4 100644 --- a/i18n/es/device-integrity.md +++ b/i18n/es/device-integrity.md @@ -101,7 +101,7 @@ Si utilizas iOS y estás en situación de alto riesgo, tenemos tres sugerencias 2. Activa los registros de _sysdiagnose_ a menudo y respáldalos externamente. Estos registros pueden proporcionar datos muy valiosos a futuros investigadores forenses en caso necesario. - El proceso para hacerlo varía según el modelo, pero puedes activarlo en los teléfonos más nuevos manteniendo pulsados _Apagar_ + _Subir volumen_ + _Bajar volumen_ hasta que sientas una breve vibración. Transcurridos unos minutos, el registro _sysdiagnose_ con fecha y hora aparecerá en **Configuración** > **Privacidad y seguridad** > **Análisis y Mejoras** > **Datos de Análisis**. + El proceso para hacerlo varía según el modelo, pero puedes activarlo en los teléfonos más nuevos manteniendo pulsados _Apagar_ + _Subir volumen_ + _Bajar volumen_ hasta que sientas una breve vibración. Transcurridos unos minutos, el registro _sysdiagnose_ con fecha y hora aparecerá en **Configuración** > **Privacidad y seguridad** > **Análisis y Mejoras** > **Datos de Análisis**. 3. Activa eñ [Modo de Bloqueo](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode). diff --git a/i18n/es/index.md b/i18n/es/index.md index b54c42a9..f28588e2 100644 --- a/i18n/es/index.md +++ b/i18n/es/index.md @@ -72,7 +72,8 @@ La seguridad no consiste solo en las *herramientas de privacidad* que utilices oConsejo
diff --git a/i18n/fa/advanced/communication-network-types.md b/i18n/fa/advanced/communication-network-types.md index cff5424d..a478b279 100644 --- a/i18n/fa/advanced/communication-network-types.md +++ b/i18n/fa/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[پیامرسانهای توصیه شده](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/fa/advanced/tor-overview.md b/i18n/fa/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/fa/advanced/tor-overview.md +++ b/i18n/fa/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/fa/basics/vpn-overview.md b/i18n/fa/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/fa/basics/vpn-overview.md +++ b/i18n/fa/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/fa/basics/why-privacy-matters.md b/i18n/fa/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/fa/basics/why-privacy-matters.md +++ b/i18n/fa/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/fa/index.md b/i18n/fa/index.md index 3419f8d0..db1a7c2e 100644 --- a/i18n/fa/index.md +++ b/i18n/fa/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/fr/advanced/communication-network-types.md b/i18n/fr/advanced/communication-network-types.md index ab099106..8f839882 100644 --- a/i18n/fr/advanced/communication-network-types.md +++ b/i18n/fr/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Une présentation de plusieurs architectures réseau couramment uti Il existe plusieurs architectures réseau couramment utilisées pour relayer des messages entre des personnes. Ces réseaux peuvent offrir des garanties différentes en matière de protection de la vie privée. C'est pourquoi il est utile de tenir compte de votre [modèle de menace](../basics/threat-modeling.md) lorsque vous décidez quelle application à utiliser. -[Messageries instantanées recommandées](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Réseaux Centralisés diff --git a/i18n/fr/advanced/tor-overview.md b/i18n/fr/advanced/tor-overview.md index a572b511..c652df48 100644 --- a/i18n/fr/advanced/tor-overview.md +++ b/i18n/fr/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor est un réseau décentralisé, gratuit, conçu pour utiliser In [**Tor**](../alternative-networks.md#tor) est un réseau décentralisé, gratuit, conçu pour utiliser Internet avec le plus de confidentialité possible. S'il est utilisé correctement, le réseau permet une navigation et des communications privées et anonymes. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor fonctionne en acheminant votre trafic Internet via des serveurs gérés par des volontaires, au lieu d'établir une connexion directe avec le site que vous essayez de visiter. Cela permet de masquer la provenance du trafic, et aucun serveur sur le chemin de la connexion n'est en mesure de voir le chemin complet de la provenance et de la destination du trafic, ce qui signifie que même les serveurs que vous utilisez pour vous connecter ne peuvent pas briser votre anonymat. [:octicons-home-16:](https://torproject.org){ .card-link title="Page d'accueil" } diff --git a/i18n/fr/basics/vpn-overview.md b/i18n/fr/basics/vpn-overview.md index 27161990..7f5dfd95 100644 --- a/i18n/fr/basics/vpn-overview.md +++ b/i18n/fr/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Les réseaux privés virtuels déplacent le risque de votre FAI à Les Réseaux Privés Virtuels sont un moyen d'étendre l'extrémité de votre réseau avec une sortie située ailleurs dans le monde. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normalement, un FAI peut voir le flux de trafic internet qui entre et sort de votre dispositif de terminaison de réseau (c'est-à-dire votre box/modem). Les protocoles de chiffrement tels que HTTPS sont couramment utilisés sur internet, ils se peut donc qu'ils ne soient pas en mesure de voir exactement ce que vous publiez ou lisez, mais ils peuvent avoir une idée [des domaines que vous visitez](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). L'utilisation d'un VPN permet de dissimuler ces informations à votre FAI, en transférant la confiance que vous accordez à votre réseau vers un serveur situé ailleurs dans le monde. Par conséquent, le FAI ne voit que le fait que vous êtes connecté à un VPN et rien sur l'activité que vous lui transmettez. diff --git a/i18n/fr/basics/why-privacy-matters.md b/i18n/fr/basics/why-privacy-matters.md index 2780e2f1..ee8de615 100644 --- a/i18n/fr/basics/why-privacy-matters.md +++ b/i18n/fr/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ La protection de la vie privée concerne en fin de compte des informations humai De nombreuses personnes confondent les concepts de **vie privée**, **sécurité**, et **anonymat**. Vous verrez des gens critiquer divers produits en disant qu'ils ne sont pas privés, alors qu'ils veulent dire qu'ils ne garantissent pas l'anonymat, par exemple. Sur ce site web, nous abordons ces trois sujets, mais il est important que vous compreniez la différence entre eux et quand chacun d'entre eux entre en jeu. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Confidentialité** : @@ -56,6 +58,8 @@ Prenons l'exemple des formulaires de consentement des cookies. Vous les rencontr La protection de la vie privée doit être intégrée par défaut dans les [logiciels et services](../tools.md) que nous utilisons, car il est impossible de forcer de vous-même la plupart des applications à respecter votre vie privée. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/fr/index.md b/i18n/fr/index.md index 3dafd336..ca02c104 100644 --- a/i18n/fr/index.md +++ b/i18n/fr/index.md @@ -71,7 +71,8 @@ Essayer de protéger toutes vos données contre tout le monde, tout le temps, esTip
diff --git a/i18n/he/advanced/communication-network-types.md b/i18n/he/advanced/communication-network-types.md index 8c117eb1..39e0855f 100644 --- a/i18n/he/advanced/communication-network-types.md +++ b/i18n/he/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: סקירה כללית של מספר ארכיטקטורות רשת ישנן מספר ארכיטקטורות רשת הנפוצות להעברת הודעות בין אנשים. רשתות אלו יכולות לספק הבטחות פרטיות שונות, וזו הסיבה שכדאי לקחת בחשבון את [מודל האיום](../basics/threat-modeling.md) שלך בעת ההחלטה באיזו אפליקציה להשתמש. -[מסנג'רים (הודעות מיידיות) מומלצות](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## רשתות מרכזיות diff --git a/i18n/he/advanced/tor-overview.md b/i18n/he/advanced/tor-overview.md index 2e6eced9..aa93fbee 100644 --- a/i18n/he/advanced/tor-overview.md +++ b/i18n/he/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor היא רשת מבוזרת בחינם לשימוש המיועד [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. בשימוש נכון, הרשת מאפשרת גלישה ותקשורת פרטית ואנונימית. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. זה מטשטש מהיכן מגיעה התעבורה, ואף שרת בנתיב החיבור לא מסוגל לראות את הנתיב המלא של המקום ממנו מגיעה התנועה והולכת, כלומר אפילו השרתים שבהם אתה משתמש כדי להתחבר לא יכולים לשבור את האנונימיות שלך. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/he/basics/vpn-overview.md b/i18n/he/basics/vpn-overview.md index db25bcf3..3325f1ca 100644 --- a/i18n/he/basics/vpn-overview.md +++ b/i18n/he/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p רשתות וירטואליות פרטיות הן דרך להרחיב את הקצה של הרשת שלך ליציאה למקום אחר בעולם. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + בדרך כלל, ספק שירותי אינטרנט יכול לראות את זרימת תעבורת האינטרנט הנכנסת ויוצאת ממכשיר סיום הרשת שלך (כלומר מודם). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/he/basics/why-privacy-matters.md b/i18n/he/basics/why-privacy-matters.md index 2929092c..855f9d10 100644 --- a/i18n/he/basics/why-privacy-matters.md +++ b/i18n/he/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: בעידן המודרני של ניצול נתונים דיגיטל אנשים רבים מבלבלים את המושגים של פרטיות, אבטחה ואנונימיות. אנשים רבים מבלבלים את המושגים של **פרטיות**, **אבטחה** ו**אנונימיות**. אתה תראה אנשים מבקרים מוצרים שונים כ"לא פרטיים" כאשר הם באמת מתכוונים שזה לא מספק אנונימיות, למשל. באתר זה אנו מכסים את כל שלושת הנושאים הללו, אך חשוב שתבינו את ההבדל ביניהם, ומתי כל אחד מהם נכנס לפעולה. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **פרטיות** : @@ -56,6 +58,8 @@ description: בעידן המודרני של ניצול נתונים דיגיטל פרטיות היא משהו שאנחנו צריכים להכניס ל[תוכנות ובשירותים](../tools.md) שבהם אנו משתמשים כברירת מחדל, אתה לא יכול לכופף את רוב האפליקציות להיות פרטיות בעצמך. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## מקורות - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/he/index.md b/i18n/he/index.md index edae62c4..ad976179 100644 --- a/i18n/he/index.md +++ b/i18n/he/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/hi/advanced/communication-network-types.md b/i18n/hi/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/hi/advanced/communication-network-types.md +++ b/i18n/hi/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/hi/advanced/tor-overview.md b/i18n/hi/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/hi/advanced/tor-overview.md +++ b/i18n/hi/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/hi/basics/vpn-overview.md b/i18n/hi/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/hi/basics/vpn-overview.md +++ b/i18n/hi/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/hi/basics/why-privacy-matters.md b/i18n/hi/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/hi/basics/why-privacy-matters.md +++ b/i18n/hi/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/hi/index.md b/i18n/hi/index.md index d3fe4a59..b181fecd 100644 --- a/i18n/hi/index.md +++ b/i18n/hi/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/hu/advanced/communication-network-types.md b/i18n/hu/advanced/communication-network-types.md index 7a5c4dca..24890579 100644 --- a/i18n/hu/advanced/communication-network-types.md +++ b/i18n/hu/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Azonnali üzenetküldő alkalmazások által gyakran használt kül Személyek közötti üzenetek továbbítására többféle hálózati architektúra használható. Ezek a hálózatok különböző magánéleti garanciákat nyújthatnak, ezért érdemes figyelembe venned a [védelmk modelledet](../basics/threat-modeling.md), amikor eldöntöd, hogy melyik alkalmazást fogod használni. -[Ajánlott Azonnali Üzenetküldők](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Központosított Hálózatok diff --git a/i18n/hu/advanced/tor-overview.md b/i18n/hu/advanced/tor-overview.md index f40a8b0c..cc52588b 100644 --- a/i18n/hu/advanced/tor-overview.md +++ b/i18n/hu/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Ez elrejti, hogy honnan érkezik a forgalom, és a kapcsolat útvonalában egyetlen szerver sem látja a teljes útvonalat, ahonnan a forgalom érkezik és ahová tart, ami azt jelenti, hogy még az általad csatlakozásra használt szerverek sem tudják megtörni az anonimitásodat. [:octicons-home-16:](https://torproject.org){ .card-link title=Honlap} diff --git a/i18n/hu/basics/vpn-overview.md b/i18n/hu/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/hu/basics/vpn-overview.md +++ b/i18n/hu/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/hu/basics/why-privacy-matters.md b/i18n/hu/basics/why-privacy-matters.md index f396b4c3..ff41d36b 100644 --- a/i18n/hu/basics/why-privacy-matters.md +++ b/i18n/hu/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ A magánélet végső soron az emberi információkról szól, és ez azért fon Sokan összekeverik az **adatvédelem**, az **adatbiztonság** és az **anonimitás** fogalmát. Láthatod, hogy emberek kritizálnak különböző termékeket, mint "nem privát", amikor valójában úgy értik, hogy nem biztosít anonimitást például. Ezen a weboldalon mindhárom témakörrel foglalkozunk, de fontos, hogy megértsd a köztük lévő különbséget, és hogy mikor melyik kerül a képbe. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Adatvédelem** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/hu/index.md b/i18n/hu/index.md index 5accd4e6..8e774482 100644 --- a/i18n/hu/index.md +++ b/i18n/hu/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTanács
diff --git a/i18n/id/advanced/communication-network-types.md b/i18n/id/advanced/communication-network-types.md index 3370a8f0..30458555 100644 --- a/i18n/id/advanced/communication-network-types.md +++ b/i18n/id/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Ikhtisar tentang beberapa arsitektur jaringan yang biasa digunakan Ada beberapa arsitektur jaringan yang biasa digunakan untuk menyampaikan pesan antar orang. Jaringan ini dapat memberikan jaminan privasi yang berbeda, itulah sebabnya mengapa perlu mempertimbangkan [model ancaman](../basics/threat-modeling.md) Anda ketika memutuskan aplikasi mana yang akan digunakan. -[Perpesanan Instan yang Direkomendasikan](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Jaringan Terpusat diff --git a/i18n/id/advanced/tor-overview.md b/i18n/id/advanced/tor-overview.md index 1c89c3d8..737dc779 100644 --- a/i18n/id/advanced/tor-overview.md +++ b/i18n/id/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor adalah jaringan terdesentralisasi yang gratis untuk digunakan, [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Jika digunakan dengan benar, jaringan ini memungkinkan penjelajahan dan komunikasi secara privat dan anonim. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Hal ini mengaburkan dari mana lalu lintas berasal, dan tidak ada server di jalur koneksi yang dapat melihat jalur penuh dari mana lalu lintas berasal dan pergi, yang berarti bahkan server yang Anda gunakan untuk terhubung tidak dapat merusak anonimitas Anda. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/id/basics/vpn-overview.md b/i18n/id/basics/vpn-overview.md index 38801978..b5c6d194 100644 --- a/i18n/id/basics/vpn-overview.md +++ b/i18n/id/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Jaringan Pribadi Virtual (VPN) mengalihkan risiko dari ISP Anda ke Jaringan Pribadi Virtual adalah cara untuk memperluas ujung jaringan Anda untuk keluar ke tempat lain di dunia. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/id/basics/why-privacy-matters.md b/i18n/id/basics/why-privacy-matters.md index e25a11ac..fc32e0e8 100644 --- a/i18n/id/basics/why-privacy-matters.md +++ b/i18n/id/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privasi pada dasarnya adalah tentang informasi manusia, dan ini penting karena k Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privasi** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sumber - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/id/index.md b/i18n/id/index.md index 83fa44fd..47985dbd 100644 --- a/i18n/id/index.md +++ b/i18n/id/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/it/advanced/communication-network-types.md b/i18n/it/advanced/communication-network-types.md index fd593f2e..6383e368 100644 --- a/i18n/it/advanced/communication-network-types.md +++ b/i18n/it/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Una panoramica delle diverse architetture di rete, comunemente util Esistono svariate architetture di rete, utilizzate comunemente per trasmettere messaggi tra persone. Queste reti possono fornire diverse garanzie per la privacy, per cui vale la pena considerare il tuo [modello di minaccia](../basics/threat-modeling.md), decidendo quale app utilizzare. -[Messaggistica istantanea consigliata](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Reti Centralizzate diff --git a/i18n/it/advanced/tor-overview.md b/i18n/it/advanced/tor-overview.md index cb12be71..f3d007c3 100644 --- a/i18n/it/advanced/tor-overview.md +++ b/i18n/it/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor è una rete decentralizzata e libera, progettata per utilizzare [**Tor**](../alternative-networks.md#tor) è una rete decentralizzata e gratuita progettata per utilizzare Internet con la massima privacy possibile. Se utilizzata adeguatamente, la rete consente navigazione e comunicazioni private e anonime. Poiché il traffico di Tor è difficile da bloccare e tracciare, è un efficace strumento di elusione della censura. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor funziona instradando il traffico tramite questi server gestiti da volontari, invece di effettuare una connessione diretta al sito che stai provando a visitare. In questo modo si offusca la provenienza del traffico e nessun server nel percorso di connessione è in grado di vedere il percorso completo del traffico proveniente e diretto, il che significa che nemmeno i server utilizzati per connettersi possono violare l'anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/it/basics/vpn-overview.md b/i18n/it/basics/vpn-overview.md index 35240861..95848a0d 100644 --- a/i18n/it/basics/vpn-overview.md +++ b/i18n/it/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Le reti private virtuali spostano il rischio dal vostro ISP a una t Le Reti Private Virtuali sono un metodo d'estensione del termine della tua rete, affinché il traffico esca da qualche altra parte nel mondo. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normalmente, un ISP può visualizzare il flusso di traffico Internet in entrate e in uscita dal dispositivo di terminazione della tua rete (cioè, il modem). I protocolli crittografici come HTTPS sono comunemente utilizzati su Internet, quindi, potrebbero non riuscire a vedere esattamente ciò che stai pubblicando o leggendo, ma potrebbero farsi un'idea dei [domini che richiedi](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). L'utilizzo di una VPN nasconde persino queste informazioni dal tuo ISP, spostando la fiducia che poni nella tua rete, a un server da qualche altra parte nel mondo. Di conseguenza, l'ISP può soltanto vedere che sei conness* a una VPN e nulla sull'attività che vi stai svolgendo. diff --git a/i18n/it/basics/why-privacy-matters.md b/i18n/it/basics/why-privacy-matters.md index 7e556532..56694e2a 100644 --- a/i18n/it/basics/why-privacy-matters.md +++ b/i18n/it/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ In fin dei conti la privacy riguarda le informazioni umane, ed è importante per In molti confondono i concetti di **privacy**, **sicurezza** e **anonimato**. Vedrai persone criticare vari prodotti come "non privati", quando in realtà intendono che non forniscono, ad esempio, anonimato. Su questo sito web, copriamo tutti e tre gli argomenti, ma è importante che tu ne comprenda le differenze, nonché quando ognuno di essi entra in gioco. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Ad esempio, considera i moduli di consenso per i cookie. Potresti incontrarli do La privacy dev'essere integrata nei [software e servizi](../tools.md) che utilizziamo di default, non puoi rendere private gran parte delle app, da solo. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Fonti - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) di Neil Richards diff --git a/i18n/it/index.md b/i18n/it/index.md index e1a97140..762ad730 100644 --- a/i18n/it/index.md +++ b/i18n/it/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenSuggerimento
diff --git a/i18n/ja/advanced/communication-network-types.md b/i18n/ja/advanced/communication-network-types.md index 87083638..0c0b62b9 100644 --- a/i18n/ja/advanced/communication-network-types.md +++ b/i18n/ja/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[おすすめのインスタントメッセンジャー](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 中央集権型ネットワーク diff --git a/i18n/ja/advanced/tor-overview.md b/i18n/ja/advanced/tor-overview.md index 10447fc4..65d33f49 100644 --- a/i18n/ja/advanced/tor-overview.md +++ b/i18n/ja/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Torは、可能な限りプライバシーを守ってインター [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. 適切に使用すれば、プライベートで匿名のブラウジングや通信を行うことができます。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/ja/basics/vpn-overview.md b/i18n/ja/basics/vpn-overview.md index 23a2ea9c..983e4ead 100644 --- a/i18n/ja/basics/vpn-overview.md +++ b/i18n/ja/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/ja/basics/why-privacy-matters.md b/i18n/ja/basics/why-privacy-matters.md index c8a317f9..78cb1f71 100644 --- a/i18n/ja/basics/why-privacy-matters.md +++ b/i18n/ja/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: デジタルデータが搾取される現代において、あな 多くの人は、**プライバシー**、**セキュリティ**、**匿名性**の概念を混同しています。 例えば、ある製品が匿名性を提供していないという意味で「プライベートではない」と批判する人々がいます。 このウェブサイトでは、これら3つのトピックすべてを取り上げます。まず、それぞれの違いを理解しましょう。 +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **プライバシー** : @@ -56,6 +58,8 @@ A common definition of privacy is that it is the ability to *control* who has ac Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## ソース - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/ja/index.md b/i18n/ja/index.md index 1b9da21d..3c4ce362 100644 --- a/i18n/ja/index.md +++ b/i18n/ja/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/ko/advanced/communication-network-types.md b/i18n/ko/advanced/communication-network-types.md index 7aada37c..7c06b97b 100644 --- a/i18n/ko/advanced/communication-network-types.md +++ b/i18n/ko/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: 메신저 애플리케이션에서 보편적으로 사용되는 몇 사람들 간에 메시지를 전달할 때 일반적으로 쓰이는 네트워크의 구조는 여러 유형이 있습니다. 네트워크 유형마다 프라이버시 면에서 각각 다른 장단점이 존재하므로, 어떤 유형의 애플리케이션을 사용할지는 여러분의 [위협 모델](../basics/threat-modeling.md)을 고려하여 결정하는 것이 좋습니다. -[권장 메신저](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 중앙 집중형 네트워크 diff --git a/i18n/ko/advanced/tor-overview.md b/i18n/ko/advanced/tor-overview.md index 0324aa5f..6923729e 100644 --- a/i18n/ko/advanced/tor-overview.md +++ b/i18n/ko/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor는 무료로 이용 가능한 탈중앙화 네트워크입니 [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Tor 네트워크를 올바르게 사용하면 비공개 및 익명 웹 탐색과 커뮤니케이션이 가능합니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. 이러한 방식을 통해 트래픽의 출처를 알 수 없게 만들고, 연결 경로상의 서버 또한 트래픽의 전체 경로는 볼 수 없으므로, 연결에 사용한 서버조차도 여러분의 익명성을 깨트릴 수 없습니다. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/ko/basics/vpn-overview.md b/i18n/ko/basics/vpn-overview.md index 6f429665..6bb4a921 100644 --- a/i18n/ko/basics/vpn-overview.md +++ b/i18n/ko/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/ko/basics/why-privacy-matters.md b/i18n/ko/basics/why-privacy-matters.md index 4558d8a7..cdcbc73c 100644 --- a/i18n/ko/basics/why-privacy-matters.md +++ b/i18n/ko/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we 많은 사람들은 **프라이버시**, **보안**, **익명성**의 개념을 혼동하곤 합니다. 어떤 서비스가 익명성을 제공하지 않는다는 이유로 '프라이버시 친화적이지 않다'며 비판하는 사람도 많습니다. 본 웹사이트에서는 이 세 가지 개념을 모두 주제로 다루고 있지만, 각 개념의 차이를 정확히 알고 언제 어떤 것이 필요한지를 이해해야 합니다. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **프라이버시** : @@ -56,6 +58,8 @@ All of these concepts overlap, but it is possible to have any combination of the 프라이버시는 우리가 사용하는 [소프트웨어 및 서비스](../tools.md)에 기본적으로 내장되어 있어야 하는 것입니다. 사용자 개개인의 힘만으로는 직접 수많은 앱을 프라이버시 친화적이도록 수정하는 것은 불가능합니다. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## 출처 - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/ko/index.md b/i18n/ko/index.md index 98a0795b..c25575b7 100644 --- a/i18n/ko/index.md +++ b/i18n/ko/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/ku-IQ/advanced/communication-network-types.md b/i18n/ku-IQ/advanced/communication-network-types.md index 624a18fd..a478b279 100644 --- a/i18n/ku-IQ/advanced/communication-network-types.md +++ b/i18n/ku-IQ/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[نامەبەرە دەستبەجێیە پێشنیارکراوەکان](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/ku-IQ/advanced/tor-overview.md b/i18n/ku-IQ/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/ku-IQ/advanced/tor-overview.md +++ b/i18n/ku-IQ/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/ku-IQ/basics/vpn-overview.md b/i18n/ku-IQ/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/ku-IQ/basics/vpn-overview.md +++ b/i18n/ku-IQ/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/ku-IQ/basics/why-privacy-matters.md b/i18n/ku-IQ/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/ku-IQ/basics/why-privacy-matters.md +++ b/i18n/ku-IQ/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/ku-IQ/index.md b/i18n/ku-IQ/index.md index 4e6aabf6..b181fecd 100644 --- a/i18n/ku-IQ/index.md +++ b/i18n/ku-IQ/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/nl/advanced/communication-network-types.md b/i18n/nl/advanced/communication-network-types.md index 25739858..444c9ff9 100644 --- a/i18n/nl/advanced/communication-network-types.md +++ b/i18n/nl/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Een overzicht van verschillende netwerkarchitecturen die vaak door Er zijn verschillende netwerkarchitecturen die gewoonlijk worden gebruikt om berichten tussen mensen door te geven. Deze netwerken kunnen verschillende privacygaranties bieden, en daarom is het de moeite waard jouw [bedreigingsmodel](../basics/threat-modeling.md) in overweging te nemen bij de beslissing welke app je gaat gebruiken. -[Aanbevolen Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Gecentraliseerde netwerken diff --git a/i18n/nl/advanced/tor-overview.md b/i18n/nl/advanced/tor-overview.md index b8563490..35ed352f 100644 --- a/i18n/nl/advanced/tor-overview.md +++ b/i18n/nl/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is een gratis te gebruiken, gedecentraliseerd netwerk dat is on [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Bij correct gebruik maakt het netwerk privé en anoniem browsen en communicatie mogelijk. Omdat Tor-verkeer moeilijk te blokkeren en te traceren is, is Tor een effectief middel om censuur te omzeilen. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Dit versluiert waar het verkeer vandaan komt, en geen enkele server in het verbindingspad kan het volledige pad zien van waar het verkeer vandaan komt en naartoe gaat, wat betekent dat zelfs de servers die je gebruikt om verbinding te maken jouw anonimiteit niet kunnen doorbreken. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/nl/basics/vpn-overview.md b/i18n/nl/basics/vpn-overview.md index e4f7cb09..4686738d 100644 --- a/i18n/nl/basics/vpn-overview.md +++ b/i18n/nl/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks verschuiven het risico van je ISP naar een Virtual Private Networks zijn een manier om het einde van je netwerk uit te breiden naar een uitgang ergens anders in de wereld. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normaal gesproken kan een ISP de stroom internetverkeer zien die je netwerkapparaat (d.w.z. modem) binnenkomt en verlaat. Versleutelingsprotocollen zoals HTTPS worden vaak gebruikt op het internet, dus ze kunnen misschien niet precies zien wat je post of leest, maar ze kunnen wel een idee krijgen van de [domeinen die je opvraagt](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Het gebruik van een VPN verbergt zelfs deze informatie voor je ISP, door het vertrouwen dat je in je netwerk stelt te verplaatsen naar een server ergens anders in de wereld. Hierdoor ziet de ISP alleen dat je verbonden bent met een VPN en niets over de activiteit die je er doorheen stuurt. diff --git a/i18n/nl/basics/why-privacy-matters.md b/i18n/nl/basics/why-privacy-matters.md index 6278a2c5..ea5a2818 100644 --- a/i18n/nl/basics/why-privacy-matters.md +++ b/i18n/nl/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ De privacy gaat uiteindelijk over menselijke informatie, en dat is belangrijk om Veel mensen halen de begrippen **privacy**, **veiligheid**, en **anonimiteit** door elkaar. Je ziet mensen verschillende producten bekritiseren als "niet privé", terwijl ze eigenlijk bedoelen dat het bijvoorbeeld geen anonimiteit biedt. Op deze website behandelen we alle drie onderwerpen, maar het is belangrijk dat je het verschil begrijpt en wanneer het om verschillende zaken gaat. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Neem bijvoorbeeld de cookie popups. Je kunt deze tientallen keren per dag tegenk Privacy is iets wat we standaard in [software en diensten](../tools.md) moeten ingebakken hebben je kan de meeste apps niet zelfstandig privé maken. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Bronnen - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) door Neil Richards diff --git a/i18n/nl/index.md b/i18n/nl/index.md index a502c248..eee7e8ca 100644 --- a/i18n/nl/index.md +++ b/i18n/nl/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/pl/advanced/communication-network-types.md b/i18n/pl/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/pl/advanced/communication-network-types.md +++ b/i18n/pl/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/pl/advanced/tor-overview.md b/i18n/pl/advanced/tor-overview.md index ef994fde..53c36926 100644 --- a/i18n/pl/advanced/tor-overview.md +++ b/i18n/pl/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/pl/basics/vpn-overview.md b/i18n/pl/basics/vpn-overview.md index 09cba9f1..2909c349 100644 --- a/i18n/pl/basics/vpn-overview.md +++ b/i18n/pl/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/pl/basics/why-privacy-matters.md b/i18n/pl/basics/why-privacy-matters.md index 5c7dffac..94d46910 100644 --- a/i18n/pl/basics/why-privacy-matters.md +++ b/i18n/pl/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Źródła - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/pl/index.md b/i18n/pl/index.md index 29806af2..64481d32 100644 --- a/i18n/pl/index.md +++ b/i18n/pl/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/pt-BR/advanced/communication-network-types.md b/i18n/pt-BR/advanced/communication-network-types.md index b5a571ad..9e496904 100644 --- a/i18n/pt-BR/advanced/communication-network-types.md +++ b/i18n/pt-BR/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Uma visão geral de várias estruturas de rede normalmente usadas p Existem várias arquiteturas de rede comumente usadas para retransmitir mensagens entre pessoas. Essas redes podem fornecer diferentes garantias de privacidade, e é por isso que vale a pena considerar seu [modelo de ameaça](../basics/threat-modeling.md) ao decidir qual aplicativo usar. -[Mensageiros Instantâneos Recomendados](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Redes Centralizadas diff --git a/i18n/pt-BR/advanced/tor-overview.md b/i18n/pt-BR/advanced/tor-overview.md index 52cfed5d..c03a869a 100644 --- a/i18n/pt-BR/advanced/tor-overview.md +++ b/i18n/pt-BR/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor é uma rede descentralizada de uso gratuito, projetada para usa [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Se usada corretamente, a rede permite navegação e comunicações privadas e anônimas. Como o tráfego do Tor é difícil de bloquear e rastrear, o Tor é uma ferramenta eficaz para contornar a censura. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Isto esconde de onde vem o tráfego, e nenhum servidor no caminho de conexão consegue ver toda a trajetória de onde o tráfego vem e para onde vai, isto significa que mesmo os servidores que você está usando para conectar não podem quebrar seu anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/pt-BR/basics/vpn-overview.md b/i18n/pt-BR/basics/vpn-overview.md index 2444ec8e..3f946719 100644 --- a/i18n/pt-BR/basics/vpn-overview.md +++ b/i18n/pt-BR/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: As Redes Privadas Virtuais transferem o risco do seu ISP para um te Redes Privadas Virtuais são uma maneira de estender o fim da sua rede para sair de outro lugar do mundo. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normalmente um provedor de serviços de internet (ISP) pode ver o fluxo de tráfego da Internet que entra e sai do seu dispositivo de rede (por exemplo, o modem). Protocolos de criptografia, como o HTTPS, são comumente usados na Internet, portanto, talvez eles não consigam ver exatamente o que você está postando ou lendo, mas podem ter uma ideia dos [domínios que você solicita](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Usar uma VPN esconde mesmo essa informação do seu ISP, mudando a confiança depositada em sua rede para um servidor em outro lugar do mundo. Como resultado, o ISP só vê que você está conectado a uma VPN e nada sobre a atividade que está passando por ela. diff --git a/i18n/pt-BR/basics/why-privacy-matters.md b/i18n/pt-BR/basics/why-privacy-matters.md index 9af9a89e..7a45795c 100644 --- a/i18n/pt-BR/basics/why-privacy-matters.md +++ b/i18n/pt-BR/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacidade é, no final das contas, sobre informações humanas, e isso é impo Muitas pessoas confundem os conceitos de **privacidade**, **segurança**, e **anonimato**. Você verá pessoas criticando vários produtos como "não privados" quando, na verdade, elas querem dizer que eles não fornecem anonimato, por exemplo. Neste site, examinamos todos esses três tópicos, mas é importante que você entenda a diferença entre eles e quando cada um entra em ação. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacidade** : @@ -56,6 +58,8 @@ Veja os formulários de consentimento de cookies, por exemplo. Você pode encont Privacidade é algo que precisa estar incluído por padrão nos [aplicativos e serviços](../tools.md) que usamos, porque você não pode fazer com que a maioria dos aplicativos seja privada por sua própria conta. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Fontes - [Porque é que a privacidade é importante](https://amazon.com/dp/0190939044) (2021) de Neil Richards diff --git a/i18n/pt-BR/index.md b/i18n/pt-BR/index.md index 2b7fb0bd..13c37c4f 100644 --- a/i18n/pt-BR/index.md +++ b/i18n/pt-BR/index.md @@ -71,7 +71,8 @@ Tentar proteger todos os seus dados de todo mundo o tempo todo é impraticável,Dica
diff --git a/i18n/pt/advanced/communication-network-types.md b/i18n/pt/advanced/communication-network-types.md index c48ccec2..54c81b18 100644 --- a/i18n/pt/advanced/communication-network-types.md +++ b/i18n/pt/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Uma visão geral sobre as várias arquiteturas de rede normalmente Existem várias arquiteturas de rede normalmente utilizadas para transmitir mensagens entre pessoas. Estas redes podem fornecer diferentes garantias de privacidade, pelo que vale a pena considerar o seu modelo de ameaça [](../basics/threat-modeling.md) ao decidir qual a aplicação a utilizar. -[Aplicações de mensagens instantâneas recomendadas](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Redes centralizadas diff --git a/i18n/pt/advanced/tor-overview.md b/i18n/pt/advanced/tor-overview.md index 73a47d43..8aafa863 100644 --- a/i18n/pt/advanced/tor-overview.md +++ b/i18n/pt/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor é uma rede descentralizada e de utilização gratuita, concebi [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Se utilizada corretamente, a rede permite a navegação e as comunicações privadas e anónimas. O facto do tráfego do Tor ser difícil de bloquear e rastrear, faz dele uma ferramenta eficaz para contornar a censura. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. A origem do tráfego fica assim ofuscada e nenhum servidor ao longo do caminho da ligação pode saber o caminho completo, o que significa que mesmo os servidores que utiliza para se ligar não conseguem quebrar o seu anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/pt/basics/vpn-overview.md b/i18n/pt/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/pt/basics/vpn-overview.md +++ b/i18n/pt/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/pt/basics/why-privacy-matters.md b/i18n/pt/basics/why-privacy-matters.md index d7bad969..5eeb1a94 100644 --- a/i18n/pt/basics/why-privacy-matters.md +++ b/i18n/pt/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Em última análise, a privacidade diz respeito à informação humana, e sabemo Muitas pessoas confundem os conceitos de **privacidade**, **segurança** e **anonimato**. Há pessoas que criticam vários produtos como "não oferecendo privacidade", quando na realidade apenas não oferecem anonimato, por exemplo. Neste site, abordamos os três temas, mas é importante que se compreenda a diferença entre eles, e quando cada um entra em jogo. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacidade** : @@ -56,6 +58,8 @@ Tome formulários para consentimento de cookies, por exemplo. Pode encontrar ess A privacidade é algo que precisamos ter feito no [software e serviços](../tools.md) que usamos por padrão, não pode dobrar a maioria dos aplicativos em modo privado por conta própria. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Fontes - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/pt/index.md b/i18n/pt/index.md index cace4ae1..32cc1caa 100644 --- a/i18n/pt/index.md +++ b/i18n/pt/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/ru/advanced/communication-network-types.md b/i18n/ru/advanced/communication-network-types.md index d8c235f6..837d62f9 100644 --- a/i18n/ru/advanced/communication-network-types.md +++ b/i18n/ru/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Обзор нескольких сетевых архитектур Существует несколько сетевых архитектур, обычно используемых для передачи сообщений между людьми. Эти сети могут предоставлять разные гарантии конфиденциальности, поэтому при принятии решения о том, какое приложение использовать, стоит учитывать вашу [модель угроз](../basics/threat-modeling.md). -[Рекомендуемые мессенджеры](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Централизованные сети diff --git a/i18n/ru/advanced/tor-overview.md b/i18n/ru/advanced/tor-overview.md index b367e9a0..cf11a6db 100644 --- a/i18n/ru/advanced/tor-overview.md +++ b/i18n/ru/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor - это бесплатная в использовании д [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. При правильном использовании сеть позволяет осуществлять частный и анонимный браузинг и общение. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Это скрывает, откуда идет трафик, и ни один сервер на пути соединения не может увидеть полный путь того, откуда и куда идет трафик, то есть даже серверы, которые ты используешь для подключения, не могут нарушить твою анонимность. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/ru/basics/vpn-overview.md b/i18n/ru/basics/vpn-overview.md index ef73b64e..3eb37027 100644 --- a/i18n/ru/basics/vpn-overview.md +++ b/i18n/ru/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/ru/basics/why-privacy-matters.md b/i18n/ru/basics/why-privacy-matters.md index 6f8213c1..574cc5e1 100644 --- a/i18n/ru/basics/why-privacy-matters.md +++ b/i18n/ru/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: Ваша приватность никогда не была сто Многие люди путают **приватность**, **безопасность** и **анонимность**. Вы можете видеть, как люди называют различные продукты "не приватными", когда на самом деле они имеют в виду, что эти продукты не обеспечивают анонимность. На этом сайте мы рассматриваем все эти три темы, но важно понимать разницу между ними, и когда каждая из них вступает в игру. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Приватность** : @@ -56,6 +58,8 @@ description: Ваша приватность никогда не была сто Приватность должна быть встроена по умолчанию в [программы и сервисы](../tools.md), которые мы используем, у вас нет возможности самостоятельно настроить большинство приложений на приватность. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Источники - [Почему приватность имеет значение](https://amazon.com/dp/0190939044) (Нил Ричардс, 2021) diff --git a/i18n/ru/index.md b/i18n/ru/index.md index 277b89d3..93ce5fc4 100644 --- a/i18n/ru/index.md +++ b/i18n/ru/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/sv/advanced/communication-network-types.md b/i18n/sv/advanced/communication-network-types.md index 05997b9a..a478b279 100644 --- a/i18n/sv/advanced/communication-network-types.md +++ b/i18n/sv/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Rekommenderade meddelandetjänster](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/sv/advanced/tor-overview.md b/i18n/sv/advanced/tor-overview.md index ae055163..d1c1bc0d 100644 --- a/i18n/sv/advanced/tor-overview.md +++ b/i18n/sv/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor är ett decentraliserat nätverk som är gratis att använda oc [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Om nätverket används på rätt sätt möjliggör det privat och anonym surfning och kommunikation. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/sv/basics/vpn-overview.md b/i18n/sv/basics/vpn-overview.md index a95b3c04..72f6e60e 100644 --- a/i18n/sv/basics/vpn-overview.md +++ b/i18n/sv/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/sv/basics/why-privacy-matters.md b/i18n/sv/basics/why-privacy-matters.md index 19d2ab6f..67ac4171 100644 --- a/i18n/sv/basics/why-privacy-matters.md +++ b/i18n/sv/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Källor - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/sv/index.md b/i18n/sv/index.md index 6fd7eb11..b00b5cf9 100644 --- a/i18n/sv/index.md +++ b/i18n/sv/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/tr/advanced/communication-network-types.md b/i18n/tr/advanced/communication-network-types.md index 230ae9d9..a478b279 100644 --- a/i18n/tr/advanced/communication-network-types.md +++ b/i18n/tr/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Önerilen Anlık Mesajlaşma Programları](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/tr/advanced/tor-overview.md b/i18n/tr/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/tr/advanced/tor-overview.md +++ b/i18n/tr/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/tr/basics/vpn-overview.md b/i18n/tr/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/tr/basics/vpn-overview.md +++ b/i18n/tr/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/tr/basics/why-privacy-matters.md b/i18n/tr/basics/why-privacy-matters.md index 568db848..2d4e53d3 100644 --- a/i18n/tr/basics/why-privacy-matters.md +++ b/i18n/tr/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Mahremiyet nihayetinde insan bilgisiyle ilgilidir ve bu önemlidir çünkü insa Birçok kişi **gizlilik**, **güvenlik**ve **anonimlik** kavramlarını birbiriyle karıştırmaktadır. Örneğin, insanların çeşitli ürünleri "gizli olmadığı" gerekçesi ile eleştirdiğini görürsünüz, oysaki demek istedikleri anonim sağlamadıklarıdır. Bu sitede üç konuyu da ele alıyoruz, ancak bunların arasındaki farkı ve her birinin ne zaman devreye girdiğini anlamanız önemlidir. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Gizililiğin yaygın tanımlarından birisi verilerinize kimin erişebileceğini Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Kaynaklar - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/tr/index.md b/i18n/tr/index.md index 007ac68b..e7eb5991 100644 --- a/i18n/tr/index.md +++ b/i18n/tr/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/uk/advanced/communication-network-types.md b/i18n/uk/advanced/communication-network-types.md index 27237fd1..a478b279 100644 --- a/i18n/uk/advanced/communication-network-types.md +++ b/i18n/uk/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Рекомендовані месенджери](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/uk/advanced/tor-overview.md b/i18n/uk/advanced/tor-overview.md index 0d4eba4b..e3595e5b 100644 --- a/i18n/uk/advanced/tor-overview.md +++ b/i18n/uk/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Оскільки трафік Tor важко заблокувати і відстежити, Tor є ефективним інструментом обходу цензури. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Це приховує, звідки надходить трафік, і жоден сервер у шляху з 'єднання не може побачити повний шлях, звідки надходить трафік, а це означає, що навіть сервери, які ви використовуєте для з' єднання, не можуть порушити вашу анонімність. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/uk/basics/vpn-overview.md b/i18n/uk/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/uk/basics/vpn-overview.md +++ b/i18n/uk/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/uk/basics/why-privacy-matters.md b/i18n/uk/basics/why-privacy-matters.md index a8447931..923aacf6 100644 --- a/i18n/uk/basics/why-privacy-matters.md +++ b/i18n/uk/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Джерела - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/uk/index.md b/i18n/uk/index.md index 64c3005a..c0a9a007 100644 --- a/i18n/uk/index.md +++ b/i18n/uk/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/vi/advanced/communication-network-types.md b/i18n/vi/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/vi/advanced/communication-network-types.md +++ b/i18n/vi/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/vi/advanced/tor-overview.md b/i18n/vi/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/vi/advanced/tor-overview.md +++ b/i18n/vi/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/vi/basics/vpn-overview.md b/i18n/vi/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/vi/basics/vpn-overview.md +++ b/i18n/vi/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/vi/basics/why-privacy-matters.md b/i18n/vi/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/vi/basics/why-privacy-matters.md +++ b/i18n/vi/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/vi/index.md b/i18n/vi/index.md index d3fe4a59..b181fecd 100644 --- a/i18n/vi/index.md +++ b/i18n/vi/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip
diff --git a/i18n/zh-Hant/about/jobs.md b/i18n/zh-Hant/about/jobs.md index e9deddf4..0e2575f2 100644 --- a/i18n/zh-Hant/about/jobs.md +++ b/i18n/zh-Hant/about/jobs.md @@ -3,7 +3,7 @@ title: 工作職缺 description: Privacy Guides 擁有一支由隱私權研究人員和權益維護者組成的小型遠端團隊。 我們將來可能有的任何職位空缺都會在此公布。 --- -Privacy Guides 擁有一支由隱私權研究人員和倡導者組成的小型遠端作業團隊,致力於促進我們保護自由表達和推廣尊重隱私權技術的使命。 身為非營利組織,我們的擴展速度非常緩慢,以確保本專案能長期持續發展。 All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause. +Privacy Guides 擁有一支由隱私權研究人員和倡導者組成的小型遠端作業團隊,致力於促進我們保護自由表達和推廣尊重隱私權技術的使命。 身為非營利組織,我們的擴展速度非常緩慢,以確保本專案能長期持續發展。 All of our team members are listed here. Please consider donating to support our cause. 我們偶爾會尋找有實力的新聞撰稿人、產品評論員和隱私權專家來幫助我們,任何空缺的職位都會張貼在下方。 diff --git a/i18n/zh-Hant/advanced/communication-network-types.md b/i18n/zh-Hant/advanced/communication-network-types.md index 7b0a9f2e..09365933 100644 --- a/i18n/zh-Hant/advanced/communication-network-types.md +++ b/i18n/zh-Hant/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: 簡介常見的即時通訊應用程式網路架構。 有幾種網路架構常運用於在人與人之間傳遞消息。 這些網路提供不同的隱私保證,這就是為什麼在決定使用哪個應用程式時,最好能考慮您的[威脅模型](../basics/threat-modeling.md) 。 -[推薦的即時通訊工具](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 集中式網路 diff --git a/i18n/zh-Hant/advanced/tor-overview.md b/i18n/zh-Hant/advanced/tor-overview.md index 54e8afb1..2ac633c0 100644 --- a/i18n/zh-Hant/advanced/tor-overview.md +++ b/i18n/zh-Hant/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor 是一個免費使用的去中心化網路,其讓用戶在使 [Tor ](../alternative-networks.md#tor)是一個免費使用的去中心化網路,其讓用戶在使用網際網路之際盡可能地保護自己的隱私。 如果使用得當,該網路可以實現私人和匿名瀏覽和通訊。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor 的工作原理是通過志願者運營的伺服器來引導您的網際網路路徑,而不是直接連接到您試圖訪問的網站。 這樣可以混淆流量來源,所連接的伺服器都無法看到流量來去的完整路徑,也意味著即使您連接的伺服器無法破壞您的匿名性。 [:octicons-home-16:](https://torproject.org){ .card-link title=首頁 } diff --git a/i18n/zh-Hant/ai-chat.md b/i18n/zh-Hant/ai-chat.md index 9ca5c258..d97f7276 100644 --- a/i18n/zh-Hant/ai-chat.md +++ b/i18n/zh-Hant/ai-chat.md @@ -161,7 +161,7 @@ Mozilla 只為某些 Llama 和 Mistral 模型提供 llamafile,而可用的第 - 社群評論和使用情況統計 - 模型檔案旁的「Safe」徽章(僅限 Hugging Face) - 核對 checksum(核對和)[^1] - - 在 Hugging Face 上,您可以按一下模型檔案,並在其下方尋找 **Copy SHA256** 按鈕,以找到雜湊值。 您應該將此 checksum 與您下載的模型檔案之 checksum 進行比對。 + - 在 Hugging Face 上,您可以按一下模型檔案,並在其下方尋找 **Copy SHA256** 按鈕,以找到雜湊值。 您應該將此 checksum 與您下載的模型檔案之 checksum 進行比對。 A downloaded model is generally safe if it satisfies all the above checks. diff --git a/i18n/zh-Hant/android/index.md b/i18n/zh-Hant/android/index.md index c52cec4b..575c8f77 100644 --- a/i18n/zh-Hant/android/index.md +++ b/i18n/zh-Hant/android/index.md @@ -38,7 +38,7 @@ schema: 購買 Android 手機時,該設備的預設作業系統通常綁入非 Android 開源專案的應用程式與服務,成為侵入性整合。 其中許多應用程式-- 甚至是提供基本系統功能的撥號器等應用程式-- 都需放到 Google Play 服務進行侵入式整合,且 Google Play 服務需要存取檔案、聯絡人儲存、通話記錄、簡訊、位置、攝影機、麥克風以及設備上的許多內容的權限,這樣基本系統程式和其他應用程式才能運行。 這些應用程式和服務增加了設備的攻擊面,成為 Android 各種隱私問題的來源。 -這個問題可以透過使用另一種 Android 發行版(通常稱為 _客製化 ROM_)來解決,這種套件不會有這種入侵性的整合。 不幸的是,許多自定義 Android 發行版常常違反 Android 安全模型,不支援重要的安全功能,如 AVB 、回滾保護、韌體更新等。 有些發行版提供 [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) 版本的構建,這種版本可透過 [ADB](https://developer.android.com/studio/command-line/adb) 暴露 root,並需要 [更寬鬆的](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug\&type=code) SELinux 政策以允許除錯功能,這會進一步增加攻擊面和削弱安全模型。 +這個問題可以透過使用另一種 Android 發行版(通常稱為 _客製化 ROM_)來解決,這種套件不會有這種入侵性的整合。 不幸的是,許多自定義 Android 發行版常常違反 Android 安全模型,不支援重要的安全功能,如 AVB 、回滾保護、韌體更新等。 有些發行版提供 [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) 版本的構建,這種版本可透過 [ADB](https://developer.android.com/studio/command-line/adb) 暴露 root,並需要 更寬鬆的 SELinux 政策以允許除錯功能,這會進一步增加攻擊面和削弱安全模型。 理想情況下,在選擇客製 Android 發行版時,應該確保它符合Android 安全模型。 至少,該發行版應該具有生產構建,支援 AVB ,回滾保護,及時韌體和作業系統更新,以及SELinux [強制模式](https://source.android.com/security/selinux/concepts#enforcement_levels) 。 我們推薦的所有 Android 發行版都符合這些標準: diff --git a/i18n/zh-Hant/basics/vpn-overview.md b/i18n/zh-Hant/basics/vpn-overview.md index 6880b03d..a5094ca9 100644 --- a/i18n/zh-Hant/basics/vpn-overview.md +++ b/i18n/zh-Hant/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: 虛擬私用網路將風險從您的ISP 轉移到您信任的第三 虛擬專用網路是將您的網路末端延伸到世界其它地方的一種方式。 +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + ISP 可以看到網路終端設備(例如數據機)的網際網路進出流量。 HTTPS 等加密協議通常應用在網際網路,因此雖無法確切地知道您發布或閱讀的內容,但還是可以了解您所請求訪問的 [網域名](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns)。 使用 VPN 將您對網路的信任轉移到世界上某處的伺服器,甚至可以向 ISP 隱藏這些資訊。 因此, ISP只會看到您已連接到VPN ,而不會看到您正在傳遞的活動。 diff --git a/i18n/zh-Hant/basics/why-privacy-matters.md b/i18n/zh-Hant/basics/why-privacy-matters.md index 9fceff0c..e83443ff 100644 --- a/i18n/zh-Hant/basics/why-privacy-matters.md +++ b/i18n/zh-Hant/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: 在此數位資料被狠狠利用的時代,隱私從未如此重 許多人常把 **隱私**、 **安全**和 **匿名** 這幾個概念搞混。 例如,人們批評各種產品“不私密”,而實際上他們是指這些產品不提供匿名功能。 本網站涵蓋了這三個主題,但重要的是須了解它們之間的區別,以及每個主題何時發揮作用。 +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **隱私** : @@ -56,6 +58,8 @@ description: 在此數位資料被狠狠利用的時代,隱私從未如此重 隱私需要融入到預設使用的[軟體和服務](../tools.md),您不能將大多數應用程式變成自己的隱私。 +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## 來源 - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/zh-Hant/device-integrity.md b/i18n/zh-Hant/device-integrity.md index 931fafaa..0a88f90e 100644 --- a/i18n/zh-Hant/device-integrity.md +++ b/i18n/zh-Hant/device-integrity.md @@ -102,7 +102,7 @@ MVT 對掃描 iOS 裝置「最」有用。 Android 儲存的診斷資訊非常 2. 經常觸發 _sysdiagnose_ 記錄日誌並在外部備份。 如果需要,這些日誌可為鑑識調查人員提供寶貴的資料。 - 執行操作過程因型號而異,但可以在較新的手機上按住_電源_ + _音量調高_ + _音量調低_直到感覺到短暫的振動來觸發。 幾分鐘後,帶有時間戳記的 _sysdiagnose_ 日誌將出現在 **設定** > **隱私和安全性** > **分析和改進** > **分析資料** 中。 + 執行操作過程因型號而異,但可以在較新的手機上按住_電源_ + _音量調高_ + _音量調低_直到感覺到短暫的振動來觸發。 幾分鐘後,帶有時間戳記的 _sysdiagnose_ 日誌將出現在 **設定** > **隱私和安全性** > **分析和改進** > **分析資料** 中。 3. 啟用[鎖定模式](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode)。 diff --git a/i18n/zh-Hant/index.md b/i18n/zh-Hant/index.md index b26fd6dd..fcad6b9c 100644 --- a/i18n/zh-Hant/index.md +++ b/i18n/zh-Hant/index.md @@ -71,7 +71,8 @@ schema:溫馨提示
diff --git a/i18n/zh/advanced/communication-network-types.md b/i18n/zh/advanced/communication-network-types.md index a28a8157..48f0c2cb 100644 --- a/i18n/zh/advanced/communication-network-types.md +++ b/i18n/zh/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: 即时信息应用程序常用的几种网络架构的概述。 有几种网络架构常用于人与人之间的信息传递。 这些网络可以提供不同的隐私保证,这就是为什么在决定使用哪种应用程序时,应该考虑你的 [威胁模型](../basics/threat-modeling.md)。 -[推荐的即时通讯工具](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 集中式网络 diff --git a/i18n/zh/advanced/tor-overview.md b/i18n/zh/advanced/tor-overview.md index d1072949..d8439290 100644 --- a/i18n/zh/advanced/tor-overview.md +++ b/i18n/zh/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor是一个免费使用的去中心化网络,专为尽量隐私 [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. 如果使用得当,该网络可以实现隐私且匿名地浏览和通信。 由于Tor流量难以阻止和跟踪,因此Tor是一种有效的审查规避工具。 +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. 这会混淆流量的来源,并且连接路径中的任何服务器都无法看到流量来自和流向的完整路径,这意味着即使您用于连接的服务器也无法打破您的匿名性。 [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/zh/basics/vpn-overview.md b/i18n/zh/basics/vpn-overview.md index 7942c23c..57ced1fc 100644 --- a/i18n/zh/basics/vpn-overview.md +++ b/i18n/zh/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/zh/basics/why-privacy-matters.md b/i18n/zh/basics/why-privacy-matters.md index 779a597c..57e53b6f 100644 --- a/i18n/zh/basics/why-privacy-matters.md +++ b/i18n/zh/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: 在数据被大量利用的现代,你的隐私从未这样重要 许多人会混淆 **隐私**、 **安全**和 **匿名** 的概念。 例如,你会看到有人批评各种产品 "不私密",但他们的意思其实是这些产品不提供匿名性。 在本网站上,我们这三个主题都会介绍,但重要的是,你要了解它们之间的区别,以及每一个主题何时发挥作用。 +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **隐私** : @@ -56,6 +58,8 @@ description: 在数据被大量利用的现代,你的隐私从未这样重要 隐私是我们使用的[软件和服务](../tools.md)中应该自带的东西,你无法强行让大多数你使用应用程序变得隐私。 +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## 资料来源 - [隐私为什么重要](https://amazon.com/dp/0190939044)(2021),Neil Richards著 diff --git a/i18n/zh/index.md b/i18n/zh/index.md index 80ed8e62..69d66092 100644 --- a/i18n/zh/index.md +++ b/i18n/zh/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expenTip