diff --git a/i18n/ar/advanced/communication-network-types.md b/i18n/ar/advanced/communication-network-types.md index fc77fe4d..a478b279 100644 --- a/i18n/ar/advanced/communication-network-types.md +++ b/i18n/ar/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[ما نوصي به من برامج مراسلة فورية](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/ar/advanced/tor-overview.md b/i18n/ar/advanced/tor-overview.md index 00aec17c..82925019 100644 --- a/i18n/ar/advanced/tor-overview.md +++ b/i18n/ar/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. يلبِّس هذا أصل الاتصال، وليس بوسع أي خادم في سبيل الاتصال رؤيته من بدايته لمقصده، مما يعني أن حتى الخوادم المستخدمة للاتصال لا تنتهك مجهوليتك. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/ar/basics/vpn-overview.md b/i18n/ar/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/ar/basics/vpn-overview.md +++ b/i18n/ar/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/ar/basics/why-privacy-matters.md b/i18n/ar/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/ar/basics/why-privacy-matters.md +++ b/i18n/ar/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/ar/index.md b/i18n/ar/index.md index 1af2d94e..17afb0cb 100644 --- a/i18n/ar/index.md +++ b/i18n/ar/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen -### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. وهم يعملون منذ ٢٠١٤. ومقرُّهم في برلين في ألمانيا. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/ar/real-time-communication.md b/i18n/ar/real-time-communication.md index 5051a9bc..b92227e4 100644 --- a/i18n/ar/real-time-communication.md +++ b/i18n/ar/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/ar/tor.md b/i18n/ar/tor.md index db9451b8..be0b56aa 100644 --- a/i18n/ar/tor.md +++ b/i18n/ar/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. ويمكن للأفراد والمؤسسات مشاركة المعلومات عبرها باستخدام «خدمات .onion الخفية»، وذلك دون نهك خصوصيتهم. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة. -[نظرة عامة شاملة عن تور :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/bn-IN/advanced/communication-network-types.md b/i18n/bn-IN/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/bn-IN/advanced/communication-network-types.md +++ b/i18n/bn-IN/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/bn-IN/advanced/tor-overview.md b/i18n/bn-IN/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/bn-IN/advanced/tor-overview.md +++ b/i18n/bn-IN/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/bn-IN/basics/vpn-overview.md b/i18n/bn-IN/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/bn-IN/basics/vpn-overview.md +++ b/i18n/bn-IN/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/bn-IN/basics/why-privacy-matters.md b/i18n/bn-IN/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/bn-IN/basics/why-privacy-matters.md +++ b/i18n/bn-IN/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/bn-IN/index.md b/i18n/bn-IN/index.md index d3fe4a59..b181fecd 100644 --- a/i18n/bn-IN/index.md +++ b/i18n/bn-IN/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/bn-IN/real-time-communication.md b/i18n/bn-IN/real-time-communication.md index 5051a9bc..b92227e4 100644 --- a/i18n/bn-IN/real-time-communication.md +++ b/i18n/bn-IN/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/bn-IN/tor.md b/i18n/bn-IN/tor.md index 87b21835..c20d62ba 100644 --- a/i18n/bn-IN/tor.md +++ b/i18n/bn-IN/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/bn/advanced/communication-network-types.md b/i18n/bn/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/bn/advanced/communication-network-types.md +++ b/i18n/bn/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/bn/advanced/tor-overview.md b/i18n/bn/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/bn/advanced/tor-overview.md +++ b/i18n/bn/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/bn/basics/vpn-overview.md b/i18n/bn/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/bn/basics/vpn-overview.md +++ b/i18n/bn/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/bn/basics/why-privacy-matters.md b/i18n/bn/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/bn/basics/why-privacy-matters.md +++ b/i18n/bn/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/bn/index.md b/i18n/bn/index.md index d3fe4a59..b181fecd 100644 --- a/i18n/bn/index.md +++ b/i18n/bn/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/bn/real-time-communication.md b/i18n/bn/real-time-communication.md index 5051a9bc..b92227e4 100644 --- a/i18n/bn/real-time-communication.md +++ b/i18n/bn/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/bn/tor.md b/i18n/bn/tor.md index a0f7d70b..934bc133 100644 --- a/i18n/bn/tor.md +++ b/i18n/bn/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/cs/advanced/communication-network-types.md b/i18n/cs/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/cs/advanced/communication-network-types.md +++ b/i18n/cs/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/cs/advanced/tor-overview.md b/i18n/cs/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/cs/advanced/tor-overview.md +++ b/i18n/cs/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/cs/basics/vpn-overview.md b/i18n/cs/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/cs/basics/vpn-overview.md +++ b/i18n/cs/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/cs/basics/why-privacy-matters.md b/i18n/cs/basics/why-privacy-matters.md index 19bb95be..97a9a650 100644 --- a/i18n/cs/basics/why-privacy-matters.md +++ b/i18n/cs/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/cs/index.md b/i18n/cs/index.md index cc2373db..afc43fe8 100644 --- a/i18n/cs/index.md +++ b/i18n/cs/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/cs/real-time-communication.md b/i18n/cs/real-time-communication.md index 5051a9bc..b92227e4 100644 --- a/i18n/cs/real-time-communication.md +++ b/i18n/cs/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/cs/tor.md b/i18n/cs/tor.md index 87b21835..c20d62ba 100644 --- a/i18n/cs/tor.md +++ b/i18n/cs/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/de/advanced/communication-network-types.md b/i18n/de/advanced/communication-network-types.md index 43df6468..bda0cc4c 100644 --- a/i18n/de/advanced/communication-network-types.md +++ b/i18n/de/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Eine Übersicht über mehrere Netzwerkarchitekturen, die häufig vo Es gibt mehrere Netzwerkarchitekturen, die häufig verwendet werden, um Nachrichten zwischen Menschen zu übertragen. Diese Netzwerke können unterschiedliche Datenschutzgarantien bieten, weshalb es sich lohnt, bei der Entscheidung, welche App du verwenden möchtest, ihr [Bedrohungsmodell](../basics/threat-modeling.md) zu berücksichtigen. -[Empfohlene Instant Messenger](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Zentralisierte Netzwerke diff --git a/i18n/de/advanced/tor-overview.md b/i18n/de/advanced/tor-overview.md index 51a4d48f..c52f5edb 100644 --- a/i18n/de/advanced/tor-overview.md +++ b/i18n/de/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor ist ein kostenloses, dezentralisiertes Netzwerk, das entwickelt [**Tor**](../alternative-networks.md#tor) ist ein kostenloses, dezentralisiertes Netzwerk, das entwickelt wurde, um das Internet mit so viel Privatsphäre wie möglich zu nutzen. Bei richtiger Nutzung ermöglicht das Netzwerk privates und anonymes Surfen und Kommunikation. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor funktioniert, indem es deinen Internetverkehr über von Freiwilligen betriebenen Server leitet, anstatt eine direkte Verbindung zu der Website herzustellen, die du besuchen willst. Dadurch wird verschleiert, woher der Datenverkehr kommt, und kein Server im Verbindungspfad ist in der Lage, den vollständigen Pfad zu sehen, woher der Datenverkehr kommt und wohin er geht, was bedeutet, dass selbst die Server, die du für die Verbindung verwendest, deiner Anonymität nichts anhaben können. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/de/basics/vpn-overview.md b/i18n/de/basics/vpn-overview.md index 116ccca2..2b087cc0 100644 --- a/i18n/de/basics/vpn-overview.md +++ b/i18n/de/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/de/basics/why-privacy-matters.md b/i18n/de/basics/why-privacy-matters.md index 3c1916fd..b031f472 100644 --- a/i18n/de/basics/why-privacy-matters.md +++ b/i18n/de/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Die Privatsphäre geht letztendlich um menschliche Informationen, und das ist wi Viele Menschen verwechseln die Begriffe zur **Privatsphäre**, **Sicherheit** und **Anonymität**. Es gibt Leute, die verschiedene Produkte als "nicht privat" kritisieren, obwohl sie in Wirklichkeit meinen, dass sie beispielsweise keine Anonymität bieten. Auf dieser Website befassen wir uns mit allen drei Themen, aber es ist wichtig, dass du den Unterschied zwischen ihnen verstehst und weißt, wann es um welches der drei Themen geht. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privatsphäre** : @@ -56,6 +58,8 @@ Nimm zum Beispiel Einwilligungserklärungen für Cookies. Auf den verschiedenen Datenschutz ist etwas, das standardmäßig in die von uns genutzte [Software und die von uns genutzten Dienste](../tools.md) implementiert sein muss, denn man kann die meisten Anwendungen und Dienste nicht selbst auf Datenschutz trimmen. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Quellen - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) von Neil Richards diff --git a/i18n/de/index.md b/i18n/de/index.md index 2d223cc7..255dd877 100644 --- a/i18n/de/index.md +++ b/i18n/de/index.md @@ -71,7 +71,8 @@ Der Versuch, alle deine Daten ständig vor allen zu schützen, ist unpraktisch,
**Privacy Guides** hat eine engagierte [Community](https://discuss.privacyguides.net), die unabhängig verschiedene *Privacy-Tools* und -Dienste überprüft. Alle unsere Empfehlungen erfüllen eine Reihe strenger Kriterien, um sicherzustellen, dass sie den meisten Menschen den größten Nutzen bringen und das beste Gleichgewicht zwischen Privatsphäre, Sicherheit und Komfort bieten. Als Teil einer gemeinnützigen **öffentlichen Wohltätigkeitsorganisation** hat Privacy Guides strenge **journalistische Standards** und Richtlinien, um sicherzustellen, dass unsere Empfehlungen frei von Interessenkonflikten sind, und wir arbeiten nicht mit Anbietern oder Partnerprogrammen zusammen, die unsere Bewertungen und Empfehlungen beeinflussen könnten. -[:material-heart:{.pg-red} Unterstütze unsere Arbeit](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Werbefreie Empfehlungen** @@ -83,77 +84,6 @@ Der Versuch, alle deine Daten ständig vor allen zu schützen, ist unpraktisch,
-### Top 3 private E-Mail-Anbieter - -
- -- ![Proton Mail Logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail ist ein E-Mail-Dienst mit einem Schwerpunkt auf Datenschutz, Verschlüsselung, Sicherheit und Benutzerfreundlichkeit. Sie sind seit 2013 in Betrieb. Die Proton AG hat ihren Sitz in Genf, Schweiz. Der Proton Mail Free Tarif beinhaltet 500 MB Mailspeicher, den du kostenlos auf bis zu 1 GB erweitern kannst. - - [:octicons-arrow-right-24: Lese die vollständige Review](email.md#proton-mail) - -- ![Mailbox.org-Logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org ist ein E-Mail-Dienst, mit dem Ziel sicher und werbefrei zu sein und der mit 100% Ökostrum betrieben wird. Er wird seit 2014 betrieben. Mailbox.org hat seinen Sitz in Berlin, Deutschland. Konten beginnen mit 2 GB Speicherplatz, der nach Bedarf erweitert werden kann. - - [:octicons-arrow-right-24: Lese die vollständige Review](email.md#mailboxorg) - -- ![Tuta-Logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta-Logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (ehemals *Tutanota*) ist ein E-Mail-Dienst mit einem Fokus auf Sicherheit und Datenschutz durch Verschlüsselung. Tuta ist seit 2011 in Betrieb und hat seinen Sitz in Hannover, Deutschland. Kostenlose Konten beginnen mit 1 GB Speicherplatz. - - [:octicons-arrow-right-24: Lese die vollständige Review](email.md#tuta) - -
- -
-
-### Beste VPN-Anbieter - -
- -- ![Proton VPN Logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN Logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad Logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Sichere Cloud-Speicherdienste - -
- -- ![Proton Drive Logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit Logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos Logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Beste Web-Browser - -
- -- ![Mullvad Browser Logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox Logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave Logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: Weitere empfohlene **Datenschutz-Tools**](tools.md){ class="md-button md-button--primary" } -[Beste mobile Browser](mobile-browsers.md ""){.md-button} [Top-Browser-Erweiterungen](browser-extensions.md ""){.md-button} [DNS-Server](dns.md ""){.md-button} [E-Mail-Aliasing-Dienste](email-aliasing.md ""){.md-button} [Foto-Organisationstools](photo-management.md ""){.md-button} [PC-Betriebssysteme](desktop.md ""){.md-button} - --- ## Über Privacy Guides @@ -166,7 +96,7 @@ Gegründet im Jahr 2021 aufgrund der Schwierigkeit, unvoreingenommene Rezensente Bekannt aus **WIRED**, **Tweakers.net**, **The New York Times** und vielen anderen Publikationen als zuverlässige Quelle für Datenschutz- und Sicherheitswissen. -[:material-information: Mehr über uns](about.md){ class="md-button md-button--primary" } [:material-email: Abonniere unseren Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ Im modernen Zeitalter der digitalen Datenausbeutung ist deine Privatsphäre noch Viele Menschen verwechseln die Begriffe Privatsphäre, Sicherheit und Anonymität. Es gibt Leute, die verschiedene Produkte als „nicht privat“ kritisieren, obwohl sie in Wirklichkeit meinen, dass sie beispielsweise keine Anonymität bieten. Auf dieser Website befassen wir uns mit allen drei Themen, aber es ist wichtig, dass du den Unterschied zwischen ihnen verstehst und weißt, wann es um welches der drei Themen geht. -[Privatsphäre vs. Sicherheit vs. Anonymität](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/de/real-time-communication.md b/i18n/de/real-time-communication.md index 3a332d16..5464b8db 100644 --- a/i18n/de/real-time-communication.md +++ b/i18n/de/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Massenüberwachung](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -Dies sind unsere Empfehlungen für verschlüsselte **Echtzeitkommunikation**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Arten von Kommunikationsnetzen :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Verschlüsselte Messenger diff --git a/i18n/de/tor.md b/i18n/de/tor.md index 68ffde4b..9f787279 100644 --- a/i18n/de/tor.md +++ b/i18n/de/tor.md @@ -31,7 +31,7 @@ schema: Das **Tor** Netzwerk besteht aus von Freiwilligen betriebenen Servern, die es kostenlos ermöglichen, die eigene Privatsphäre und Sicherheit im Internet zu verbessern. Einzelpersonen und Organisationen können auch Informationen über das Tor-Netzwerk mit ".onion versteckten Diensten" austauschen, ohne ihre Privatsphäre zu gefährden. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung. -[Detaillierte Tor-Übersicht :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tipp

diff --git a/i18n/el/advanced/communication-network-types.md b/i18n/el/advanced/communication-network-types.md index 0e559e21..a478b279 100644 --- a/i18n/el/advanced/communication-network-types.md +++ b/i18n/el/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Προτεινόμενες εφαρμογές άμεσων μηνυμάτων](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/el/advanced/tor-overview.md b/i18n/el/advanced/tor-overview.md index 3da40545..af7387f3 100644 --- a/i18n/el/advanced/tor-overview.md +++ b/i18n/el/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Επειδή η διαδικτυακή κυκλοφορία του Tor είναι δύσκολο να μπλοκαριστεί και να ανιχνευθεί, το Tor είναι ένα αποτελεσματικό εργαλείο παράκαμψης της λογοκρισίας. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/el/basics/vpn-overview.md b/i18n/el/basics/vpn-overview.md index 37297abf..c2288443 100644 --- a/i18n/el/basics/vpn-overview.md +++ b/i18n/el/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/el/basics/why-privacy-matters.md b/i18n/el/basics/why-privacy-matters.md index ad7fa46b..0a88a6f2 100644 --- a/i18n/el/basics/why-privacy-matters.md +++ b/i18n/el/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: Στη σύγχρονη εποχή της εκμετάλλευση Πολλά άτομα συγχέουν τις έννοιες της **ιδιωτικότητας** (privacy), της **ασφάλειας** (security), και της **ανωνυμίας** (anonymity). Συγκεκριμένα στα Ελληνικά τώρα, η αγγλική λέξη "privacy" έχει συχνά μεταφραστεί ως απόρρητο, αν και το απόρρητο είναι ευρύτερη έννοια. Θα λέγαμε πως περικλείει τόσο την ιδιωτικότητα, όσο την ασφάλεια και την ανωνυμία. Ετυμολογικά σημαίνει "αυτό που δεν λέγεται ή ορίζεται." Αγγλικές λέξεις που της αντιστοιχούν πέραν του "privacy" είναι: "confidentiality", "secret", "unspeakable", "undefinable." Για την αποφυγή σύγχησης, συνεπώς, μεταφράζουμε το "privacy" ως ιδιωτικότητα σε όλες τις περιπτώσεις εκτός από αυτές όπου νοείται ευρήτερα. Αν θέλεις να αναπτύξεις σωστή κρίση για τα συστήματα που χρησιμοποιείς καθημερινά, είναι σημαντικότατο να αντιληφθείς πως και πότε το απόρρητο διαχωρίζεται σε ιδιωτικότητα, ασφάλεια, και ανωνυμία· και πότε η καθεμία από αυτές παίζει ρόλο. Θα ακούσεις, για παράδειγμα, άτομα να κριτικάρουν διάφορα προϊόντα ως «μη-ιδιωτικά» ενώ στην πραγματικότητα εννοούν πως αυτά δεν προσφέρουν ανωνυμία. Στον παρών ιστότοπο καλύπτουμε και τα τρία θέματα, μα είναι κρίσιμο, όπως προαναφέραμε, να θυμάσαι την εννοιολογική τους διαφορά όσο διαβάζεις τις συμβουλές μας. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Ιδιωτικότητα** : @@ -56,6 +58,8 @@ description: Στη σύγχρονη εποχή της εκμετάλλευση Η ιδιωτικότητα (και το απόρρητο γενικότερα) οφείλει να βρίσκεται ενσωματωμένο στο [ λογισμικό και τις υπηρεσίες](../tools.md) που χρησιμοποιούμε εκ προεπιλογής, δεν μπορείς από μόνο σου να παραποιήσεις τις περισσότερες εφαρμογές ώστε να είναι ιδιωτικές. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Πηγές - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) από Neil Richards diff --git a/i18n/el/index.md b/i18n/el/index.md index ab87082c..8a87cab2 100644 --- a/i18n/el/index.md +++ b/i18n/el/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Θα ακούσεις, για παράδειγμα, άτομα να κριτικάρουν διάφορα προϊόντα ως «μη-ιδιωτικά» ενώ στην πραγματικότητα εννοούν πως αυτά δεν προσφέρουν ανωνυμία. Στον παρών ιστότοπο καλύπτουμε και τα τρία θέματα, μα είναι κρίσιμο, όπως προαναφέραμε, να θυμάσαι την εννοιολογική τους διαφορά όσο διαβάζεις τις συμβουλές μας. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/el/real-time-communication.md b/i18n/el/real-time-communication.md index 5051a9bc..b92227e4 100644 --- a/i18n/el/real-time-communication.md +++ b/i18n/el/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/el/tor.md b/i18n/el/tor.md index 8df14276..b01bbdea 100644 --- a/i18n/el/tor.md +++ b/i18n/el/tor.md @@ -31,7 +31,7 @@ schema: **Το Tor** είναι μια ομάδα διακομιστών που λειτουργούν εθελοντικά και σας επιτρέπουν να συνδεθείτε δωρεάν και να βελτιώσετε την ιδιωτικότητα και την ασφάλειά σας στο Διαδίκτυο. Τα άτομα και οι οργανισμοί μπορούν επίσης να μοιράζονται πληροφορίες μέσω του δικτύου Tor με τις κρυφές υπηρεσίες ".onion" χωρίς να θέτουν σε κίνδυνο την ιδιωτικότητά τους. Επειδή η διαδικτυακή κυκλοφορία του Tor είναι δύσκολο να μπλοκαριστεί και να ανιχνευθεί, το Tor είναι ένα αποτελεσματικό εργαλείο παράκαμψης της λογοκρισίας. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Συμβουλή

diff --git a/i18n/eo/advanced/communication-network-types.md b/i18n/eo/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/eo/advanced/communication-network-types.md +++ b/i18n/eo/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/eo/advanced/tor-overview.md b/i18n/eo/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/eo/advanced/tor-overview.md +++ b/i18n/eo/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/eo/basics/vpn-overview.md b/i18n/eo/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/eo/basics/vpn-overview.md +++ b/i18n/eo/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/eo/basics/why-privacy-matters.md b/i18n/eo/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/eo/basics/why-privacy-matters.md +++ b/i18n/eo/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/eo/index.md b/i18n/eo/index.md index d3fe4a59..b181fecd 100644 --- a/i18n/eo/index.md +++ b/i18n/eo/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/eo/real-time-communication.md b/i18n/eo/real-time-communication.md index 538feb99..0d5e1554 100644 --- a/i18n/eo/real-time-communication.md +++ b/i18n/eo/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Amasgvatado](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/eo/tor.md b/i18n/eo/tor.md index e8195352..284c71c3 100644 --- a/i18n/eo/tor.md +++ b/i18n/eo/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/es/about/jobs.md b/i18n/es/about/jobs.md index 1cc78f3d..192c5359 100644 --- a/i18n/es/about/jobs.md +++ b/i18n/es/about/jobs.md @@ -3,7 +3,7 @@ title: Puestos de Trabajo description: Privacy Guides cuenta con un pequeño equipo remoto de investigadores y defensores de la privacidad. Cualquier puesto vacante que podremos tener en el futuro será publicado aquí. --- -Privacy Guides cuenta con un pequeño equipo remoto de investigadores y defensores de la privacidad quienes están trabajando para avanzar nuestra misión de proteger la libertad de expresión y promover tecnología respetuosa con la privacidad. Como organización sin ánimo de lucro, nos expandimos muy lentamente para garantizar la sostenibilidad del proyecto a largo plazo. Todos los miembros de nuestro equipo figuran [aquí](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Por favor, considera [donar](https://donate.magicgrants.org/privacyguides) para apoyar nuestra causa. +Privacy Guides cuenta con un pequeño equipo remoto de investigadores y defensores de la privacidad quienes están trabajando para avanzar nuestra misión de proteger la libertad de expresión y promover tecnología respetuosa con la privacidad. Como organización sin ánimo de lucro, nos expandimos muy lentamente para garantizar la sostenibilidad del proyecto a largo plazo. Todos los miembros de nuestro equipo figuran aquí. Por favor, considera donar para apoyar nuestra causa. Ocasionalmente buscamos buenos redactores periodísticos, revisores de productos y expertos en privacidad para que nos ayuden, y los puestos vacantes se publicarán a continuación. diff --git a/i18n/es/advanced/communication-network-types.md b/i18n/es/advanced/communication-network-types.md index d871d9d1..8f493a72 100644 --- a/i18n/es/advanced/communication-network-types.md +++ b/i18n/es/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Una visión general de varias arquitecturas de red comúnmente util Existen varias arquitecturas de red utilizadas habitualmente para transmitir mensajes entre personas. Estas redes pueden ofrecer diferentes garantías de privacidad, por lo que conviene tener en cuenta tu [modelo de amenaza](../basics/threat-modeling.md) a la hora de decidir qué aplicación utilizar. -[Servicios de Mensajería Instantánea Recomendados](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Redes centralizadas diff --git a/i18n/es/advanced/tor-overview.md b/i18n/es/advanced/tor-overview.md index 70f25411..87689968 100644 --- a/i18n/es/advanced/tor-overview.md +++ b/i18n/es/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor es una red descentralizada y gratuita diseñada para utilizar I [**Tor**](../alternative-networks.md#tor) es una red gratuita y descentralizada diseñada para usar el Internet con la mayor privacidad posible. Si se utiliza correctamente, la red permite la navegación y las comunicaciones privadas y anónimas. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor funciona enrutando tu tráfico de Internet a través de servidores operados por voluntarios, en vez de realizar conexiones directas al sitio que estás tratando de visitar. Esto ofusca de dónde viene el tráfico, y ningún servidor en la ruta de conexión es capaz de ver la ruta completa de dónde viene y a dónde va el tráfico, lo que significa que incluso los servidores a los que te estás conectando no pueden romper tu anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Página Principal } diff --git a/i18n/es/ai-chat.md b/i18n/es/ai-chat.md index 949a7131..87f8f0e5 100644 --- a/i18n/es/ai-chat.md +++ b/i18n/es/ai-chat.md @@ -161,7 +161,7 @@ Para comprobar la autenticidad y seguridad del modelo, busca: - Comentarios de la comunidad y estadísticas de uso - Un distintivo "Seguro" junto a la ficha del modelo (solo Hugging Face) - Checksums coincidentes[^1] - - En Hugging Face, puedes encontrar el hash haciendo clic en un archivo de modelo y buscando el botón **Copy SHA256** debajo de él. Debes comparar esta checksum con la del fichero modelo que has descargado. + - En Hugging Face, puedes encontrar el hash haciendo clic en un archivo de modelo y buscando el botón **Copy SHA256** debajo de él. Debes comparar esta checksum con la del fichero modelo que has descargado. A downloaded model is generally safe if it satisfies all the above checks. diff --git a/i18n/es/android/index.md b/i18n/es/android/index.md index 4f2fa256..d112822e 100644 --- a/i18n/es/android/index.md +++ b/i18n/es/android/index.md @@ -38,7 +38,7 @@ También hay muchas alternativas privadas a las aplicaciones que vienen preinsta Cuando compras un teléfono Android, el sistema operativo por defecto viene con aplicaciones y funcionalidades que no forman parte de Android Open Source Project. Muchas de estas aplicaciones -incluso aplicaciones como el marcador que proporcionan una funcionalidad básica del sistema- requieren integraciones invasivas con Google Play Services, que a su vez pide privilegios para acceder a tus archivos, almacenamiento de contactos, registros de llamadas, mensajes SMS, ubicación, cámara, micrófono y muchas otras cosas en tu dispositivo para que esas aplicaciones básicas del sistema y muchas otras aplicaciones funcionen en primer lugar. Frameworks como Google Play Services aumentan la superficie de ataque de tu dispositivo y son la fuente de varios problemas de privacidad con Android. -Este problema se puede resolver utilizando una distribución alternativa de Android, comúnmente conocida como _ROM personalizada_, que no venga con una integración tan invasiva. Desafortunadamente, varias distribuciones modificadas de Android suelen violar el modelo de seguridad de Android al no soportar características críticas de seguridad como el AVB, protección de reversión, actualizaciones del firmware, etc. Algunas distribuciones también incluyen compilaciones [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) que exponen la raíz a través de [ADB](https://developer.android.com/studio/command-line/adb) y requieren políticas SELinux [más permisivas](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug\&type=code) para acomodar las características de depuración, lo que resulta en una mayor superficie de ataque y un modelo de seguridad debilitado. +Este problema se puede resolver utilizando una distribución alternativa de Android, comúnmente conocida como _ROM personalizada_, que no venga con una integración tan invasiva. Desafortunadamente, varias distribuciones modificadas de Android suelen violar el modelo de seguridad de Android al no soportar características críticas de seguridad como el AVB, protección de reversión, actualizaciones del firmware, etc. Algunas distribuciones también incluyen compilaciones [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) que exponen la raíz a través de [ADB](https://developer.android.com/studio/command-line/adb) y requieren políticas SELinux más permisivas para acomodar las características de depuración, lo que resulta en una mayor superficie de ataque y un modelo de seguridad debilitado. Idealmente, cuando escojas una distribución de Android, deberías asegurarte de que mantenga el modelo de seguridad de Android. Como mínimo, la distribución debería tener compilaciones de producción, compatibilidad con AVB, protección contra reversiones, actualizaciones puntuales del firmware y del sistema operativo, y SELinux en [modo de imposición](https://source.android.com/security/selinux/concepts#enforcement_levels). Todas nuestras distribuciones de Android recomendadas cumplen estos criterios: diff --git a/i18n/es/basics/vpn-overview.md b/i18n/es/basics/vpn-overview.md index 9bd7b83b..f31e49a2 100644 --- a/i18n/es/basics/vpn-overview.md +++ b/i18n/es/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Las Redes Privadas Virtuales desplazan el riesgo de tu ISP a un ter Las Redes Privadas Virtuales son una forma de ampliar el extremo de tu red para que salga por otro lugar en el mundo. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normalmente, un ISP puede ver el flujo de tráfico de Internet que entra y sale de Tu dispositivo de terminación de red (es decir, el módem). Los protocolos de cifrado como HTTPS se utilizan habitualmente en Internet, por lo que es posible que no puedan ver exactamente lo que publicas o lees, pero pueden hacerse una idea de los [dominios que solicitas](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). El uso de una VPN oculta incluso esta información a tu ISP, al trasladar la confianza que depositas en tu red a un servidor situado en otro lugar del mundo. Como resultado, el ISP solo ve que estás conectado a una VPN y nada sobre la actividad que estás pasando a través de ella. diff --git a/i18n/es/basics/why-privacy-matters.md b/i18n/es/basics/why-privacy-matters.md index afadc7c5..b5687272 100644 --- a/i18n/es/basics/why-privacy-matters.md +++ b/i18n/es/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ En última instancia, la privacidad tiene que ver con la información humana, y Mucha gente confunde los conceptos de **privacidad**, **seguridad**, y **anonimato**. Por ejemplo, verás a gente criticar varios productos por "no ser privados" cuando en realidad quieren decir que no proporcionan anonimato. En este sitio web tratamos estos tres temas, pero es importante que entiendas la diferencia entre ellos y cuándo entra en juego cada uno. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacidad** : @@ -56,6 +58,8 @@ Por ejemplo, los formularios de consentimiento de cookies. Es posible que los en La privacidad es algo que tenemos que tener incorporado en [el software y los servicios](../tools.md) que utilizamos por defecto, no puedes hacer que la mayoría de las aplicaciones sean privadas por tu cuenta. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Fuentes - [Por Qué Importa La Privacidad](https://amazon.com/dp/0190939044) (2021) por Neil Richards diff --git a/i18n/es/device-integrity.md b/i18n/es/device-integrity.md index da017640..0be561d4 100644 --- a/i18n/es/device-integrity.md +++ b/i18n/es/device-integrity.md @@ -101,7 +101,7 @@ Si utilizas iOS y estás en situación de alto riesgo, tenemos tres sugerencias 2. Activa los registros de _sysdiagnose_ a menudo y respáldalos externamente. Estos registros pueden proporcionar datos muy valiosos a futuros investigadores forenses en caso necesario. - El proceso para hacerlo varía según el modelo, pero puedes activarlo en los teléfonos más nuevos manteniendo pulsados _Apagar_ + _Subir volumen_ + _Bajar volumen_ hasta que sientas una breve vibración. Transcurridos unos minutos, el registro _sysdiagnose_ con fecha y hora aparecerá en **Configuración** > **Privacidad y seguridad** > **Análisis y Mejoras** > **Datos de Análisis**. + El proceso para hacerlo varía según el modelo, pero puedes activarlo en los teléfonos más nuevos manteniendo pulsados _Apagar_ + _Subir volumen_ + _Bajar volumen_ hasta que sientas una breve vibración. Transcurridos unos minutos, el registro _sysdiagnose_ con fecha y hora aparecerá en **Configuración** > **Privacidad y seguridad** > **Análisis y Mejoras** > **Datos de Análisis**. 3. Activa eñ [Modo de Bloqueo](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode). diff --git a/i18n/es/index.md b/i18n/es/index.md index b54c42a9..f28588e2 100644 --- a/i18n/es/index.md +++ b/i18n/es/index.md @@ -72,7 +72,8 @@ La seguridad no consiste solo en las *herramientas de privacidad* que utilices o
**Privacy Guides** tiene una [comunidad](https://discuss.privacyguides.net) dedicada que revisa de forma independiente varias *herramientas de privacidad* y servicios. Cada una de nuestras recomendaciones cumple un estricto conjunto de criterios para garantizar que aporten el máximo valor a la mayoría de las personas y ofrezcan el mejor equilibrio entre privacidad, seguridad y comodidad. Como parte de una **organización benéfica pública** sin ánimo de lucro, Privacy Guides aplica estrictas **normas periodísticas** y políticas para garantizar que nuestras recomendaciones estén libres de conflictos de intereses, y no nos asociamos con proveedores o programas de afiliación que puedan influir en nuestras reseñas y recomendaciones. -[:material-heart:{.pg-red} Apoya Nuestro Trabajo](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Recomendaciones Sin Publicidad** @@ -84,77 +85,6 @@ La seguridad no consiste solo en las *herramientas de privacidad* que utilices o
-### Los 3 Mejores Proveedores Privados de Correo Electrónico - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail es un servicio de correo electrónico centrado en la privacidad, el cifrado, la seguridad y la facilidad de uso. Ha estado en operación desde 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org es un servicio de correo electrónico seguro, sin publicidad y alimentado de forma privada con energía 100% ecológica. Ha estado en operación desde 2014. Mailbox.org tiene su sede en Berlín, Alemania. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (antes *Tutanota*) es un servicio de correo electrónico centrado en la seguridad y la privacidad mediante el uso de cifrado. Tuta lleva funcionando desde 2011 y tiene su sede en Hannover, Alemania. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Leer Reseña Completa](email.md#tuta) - -
- -
-
-### Mejores Servicios VPN - -
- -- ![logo de Proton VPN](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![logo de IVPN](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![logo de Mullvad](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Servicios Seguros de Almacenamiento en la Nube - -
- -- ![logo de Proton Drive](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![logo de Tresorit](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![logo de Peergos](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Mejores Navegadores Web - -
- -- ![logo de Mullvad Browser](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![logo de Firefox](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![logo de Brave](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: Más Recomendaciones de **Herramientas de Privacidad**](tools.md){ class="md-button md-button--primary" } -[Mejores Navegadores Móviles](mobile-browsers.md ""){.md-button} [Mejores Extensiones de Navegador](browser-extensions.md ""){.md-button} [Servidores DNS](dns.md ""){.md-button} [Servicios de Alias de Correo Electrónico](email-aliasing.md ""){.md-button} [Herramientas de Organización de Fotos](photo-management.md ""){.md-button} [Sistemas Operativos de PC](desktop.md ""){.md-button} - --- ## Sobre Privacy Guides @@ -167,7 +97,7 @@ Creado en 2021 ante la dificultad de encontrar revisiones imparciales en el mund Privacy Guides aparece en **WIRED**, **Tweakers.net**, **The New York Times** y otras publicaciones como una fuente confiable de conocimientos sobre privacidad y seguridad. -[:material-information: Conoce más sobre quiénes somos](about.md){ class="md-button md-button--primary" } [:material-email: Únete a nuestro boletín](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -185,6 +115,6 @@ En la era moderna de explotación de información digital, tu privacidad nunca h Muchas personas confunden los conceptos de privacidad, seguridad y anonimato. Por ejemplo, verás a gente criticar varios productos por "no ser privados" cuando en realidad quieren decir que no proporcionan anonimato. En este sitio web tratamos estos tres temas, pero es importante que entiendas la diferencia entre ellos y cuándo entra en juego cada uno. -[Privacidad vs Seguridad vs Anonimato](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/es/mobile-browsers.md b/i18n/es/mobile-browsers.md index e112c914..93d272df 100644 --- a/i18n/es/mobile-browsers.md +++ b/i18n/es/mobile-browsers.md @@ -97,7 +97,7 @@ Tor Browser es la única manera de navegar por Internet de forma verdaderamente #### Valores generales predeterminados de los escudos de Brave -Brave incluye algunas medidas antihuellas en su función [Escudos](https://support.brave.com/hc/articles/360022973471-What-is-Shields). Te sugerimos configurar estas opciones [globalmente](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) en todas las páginas que visites. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Las opciones de los escudos pueden reducirse según las necesidades de cada sitio, pero por defecto recomendamos configurar lo siguiente: @@ -202,7 +202,7 @@ Estas opciones se encuentran en :material-menu:/:fontawesome-solid-ellipsis: → #### Brave Sync -[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) permite que tus datos de navegación (historial, favoritos, etc.) sean accesibles en todos tus dispositivos sin necesidad de tener una cuenta y los protege con E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## Cromite (Android) @@ -243,7 +243,7 @@ Estas opciones se encuentran en :material-menu: → :gear: **Configuración** - [x] Selecciona **Usar siempre conexiones seguras** -Esto evita que te conectes involuntariamente a un sitio web en texto plano HTTP. HTTP es muy poco común hoy en día, por lo que esto debería tener poco o ningún impacto en tu navegación diaria. +This prevents you from unintentionally connecting to a website in plain-text HTTP. HTTP es muy poco común hoy en día, por lo que esto debería tener poco o ningún impacto en tu navegación diaria. #### Adblock Plus settings @@ -304,7 +304,7 @@ Esto evita que Siri utilice el contenido de Safari para las sugerencias de Siri. - [ ] Desactiva **Sugerencias del Motor de Búsqueda** -Este ajuste envía todo lo que escribas en la barra de direcciones al motor de búsqueda configurado en Safari. Desactivar las sugerencias de búsqueda te permite controlar con mayor precisión los datos que envías al proveedor de tu motor de búsqueda. +Este ajuste envía todo lo que escribas en la barra de direcciones al motor de búsqueda configurado en Safari. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider. #### Perfiles diff --git a/i18n/es/office-suites.md b/i18n/es/office-suites.md index 86567e09..40b91d32 100644 --- a/i18n/es/office-suites.md +++ b/i18n/es/office-suites.md @@ -48,9 +48,9 @@ Elige una **suite de ofimática** que no requiera iniciar sesión para acceder a **OnlyOffice** es una suite ofimática gratuita, basada en la nube y de código abierto, con amplias funcionalidades, incluyendo la integración con Nextcloud. [:octicons-home-16: Página principal](https://onlyoffice.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Política de privacidad" } -[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Código fuente" } +:octicons-eye-16:{ .card-link title="Política de privacidad" } +:octicons-info-16:{ .card-link title=Documentación} +:octicons-code-16:{ .card-link title="Código fuente" }
Downloads "Descargas" diff --git a/i18n/es/os/windows/group-policies.md b/i18n/es/os/windows/group-policies.md index dcbb71d2..adab145e 100644 --- a/i18n/es/os/windows/group-policies.md +++ b/i18n/es/os/windows/group-policies.md @@ -20,8 +20,8 @@ Para cambiar cualquier directiva de grupo, haz doble clic en ella y selecciona H #### Device Guard - Activar la Seguridad Basada en la Virtualización: \*_Habilitada_ - - Nivel de Seguridad de la Plataforma: **Arranque Seguro y Protección de DMA** - - Configuración de Inicio Seguro: **Habilitada** + - Nivel de Seguridad de la Plataforma: **Arranque Seguro y Protección de DMA** + - Configuración de Inicio Seguro: **Habilitada** #### Administración de Comunicaciones de Internet @@ -52,14 +52,14 @@ Reproducción Automática y Ejecución Automática son funciones que permiten a - Desactivar Reproducción Automática: **Habilitada** - Deshabilitar Reproducción Automática para Dispositivos que no son de Volumen: **Habilitada** - Establece el Comportamiento Predeterminado para Ejecución Automática: **Habilitada** - - Comportamiento Predeterminado de Ejecución Automática: **No Ejecutar Ningún Comando de Ejecución Automática** + - Comportamiento Predeterminado de Ejecución Automática: **No Ejecutar Ningún Comando de Ejecución Automática** #### Cifrado de Unidad BitLocker Es posible que desees volver a cifrar la unidad del sistema operativo después de cambiar estos ajustes. - Elija Método de Cifrado e Intensidad de Cifrado de Unidad (Windows Vista, Windows Server 2008, Windows 7): **Habilitada** - - Seleccione el método de cifrado: **AES-256** + - Seleccione el método de cifrado: **AES-256** Establecer la intensidad de cifrado para la política de Windows 7 todavía aplica esa intensidad a las nuevas versiones de Windows. @@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b #### Recopilación de Datos y Versiones Preliminares - Permitir Datos de Diagnóstico: **Habilitada** - - Opciones: **Enviar Datos de Diagnóstico Necesarios** (Edición Pro); o - - Opciones: **Datos de Diagnóstico Desactivados** (Edición Enterprise o Education) + - Opciones: **Enviar Datos de Diagnóstico Necesarios** (Edición Pro); o + - Opciones: **Datos de Diagnóstico Desactivados** (Edición Enterprise o Education) - Limitar Recopilación de Registros de Diagnóstico: **Habilitada** - Limitarn Recopilación de Volcados: **Habilitada** - Limitar los Datos de Diagnóstico Opcionales para el Análisis de Escritorio: **Habilitada** - - Opciones: **Desactivar la Colección de Análisis de Escritorio** + - Opciones: **Desactivar la Colección de Análisis de Escritorio** - No Volver a Mostrar Notificaciones de Comentarios: **Habilitada** #### Explorador de Archivos @@ -118,7 +118,7 @@ Este último ajuste desactiva OneDrive en tu sistema; asegúrate de cambiarlo a - Permitir el Uso de Cortana: **Deshabilitada** - No buscar en Internet o Mostrar Resultados de Internet en Search: **Habilitada** - Definir Qué Información se Comparte en Search: **Habilitada** - - Tipo de información: **Información anónima** + - Tipo de información: **Información anónima** #### Sincronizar la Configuración @@ -132,4 +132,4 @@ Este último ajuste desactiva OneDrive en tu sistema; asegúrate de cambiarlo a - No Enviar Datos Adicionales: **Habilitada** - Consentimiento > Configurar Consentimiento Predeterminado: **Habilitada** - - Nivel de consentimiento: **Preguntar siempre antes de enviar datos** + - Nivel de consentimiento: **Preguntar siempre antes de enviar datos** diff --git a/i18n/es/real-time-communication.md b/i18n/es/real-time-communication.md index 938ebea9..ce6a48ee 100644 --- a/i18n/es/real-time-communication.md +++ b/i18n/es/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Vigilancia masiva](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Capitalismo de Vigilancia](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -Estas son nuestras recomendaciones para la comunicación cifrada **en tiempo real**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Tipos de Redes de Comunicación :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Servicios de Mensajería Cifrados diff --git a/i18n/es/tor.md b/i18n/es/tor.md index 51f9f1ef..97029650 100644 --- a/i18n/es/tor.md +++ b/i18n/es/tor.md @@ -31,7 +31,7 @@ schema: **Tor** es un grupo de servidores operados por voluntarios que te permiten conectarte gratuitamente, además de mejorar tu privacidad y seguridad en Internet. Individuos y organizaciones también pueden compartir información a través de la red Tor con los "servicios ocultos .onion" sin comprometer su privacidad. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura. -[Descripción detallada de Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Consejo

diff --git a/i18n/fa/advanced/communication-network-types.md b/i18n/fa/advanced/communication-network-types.md index cff5424d..a478b279 100644 --- a/i18n/fa/advanced/communication-network-types.md +++ b/i18n/fa/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[پیام‌رسان‌های توصیه شده](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/fa/advanced/tor-overview.md b/i18n/fa/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/fa/advanced/tor-overview.md +++ b/i18n/fa/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/fa/basics/vpn-overview.md b/i18n/fa/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/fa/basics/vpn-overview.md +++ b/i18n/fa/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/fa/basics/why-privacy-matters.md b/i18n/fa/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/fa/basics/why-privacy-matters.md +++ b/i18n/fa/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/fa/index.md b/i18n/fa/index.md index 3419f8d0..db1a7c2e 100644 --- a/i18n/fa/index.md +++ b/i18n/fa/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. آنها از سال 2014 شروع به کار کرده‌اند. Mailbox.org در برلین آلمان مستقر است. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/fa/real-time-communication.md b/i18n/fa/real-time-communication.md index 5051a9bc..b92227e4 100644 --- a/i18n/fa/real-time-communication.md +++ b/i18n/fa/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/fa/tor.md b/i18n/fa/tor.md index 87b21835..c20d62ba 100644 --- a/i18n/fa/tor.md +++ b/i18n/fa/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/fr/advanced/communication-network-types.md b/i18n/fr/advanced/communication-network-types.md index ab099106..8f839882 100644 --- a/i18n/fr/advanced/communication-network-types.md +++ b/i18n/fr/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Une présentation de plusieurs architectures réseau couramment uti Il existe plusieurs architectures réseau couramment utilisées pour relayer des messages entre des personnes. Ces réseaux peuvent offrir des garanties différentes en matière de protection de la vie privée. C'est pourquoi il est utile de tenir compte de votre [modèle de menace](../basics/threat-modeling.md) lorsque vous décidez quelle application à utiliser. -[Messageries instantanées recommandées](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Réseaux Centralisés diff --git a/i18n/fr/advanced/tor-overview.md b/i18n/fr/advanced/tor-overview.md index a572b511..c652df48 100644 --- a/i18n/fr/advanced/tor-overview.md +++ b/i18n/fr/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor est un réseau décentralisé, gratuit, conçu pour utiliser In [**Tor**](../alternative-networks.md#tor) est un réseau décentralisé, gratuit, conçu pour utiliser Internet avec le plus de confidentialité possible. S'il est utilisé correctement, le réseau permet une navigation et des communications privées et anonymes. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor fonctionne en acheminant votre trafic Internet via des serveurs gérés par des volontaires, au lieu d'établir une connexion directe avec le site que vous essayez de visiter. Cela permet de masquer la provenance du trafic, et aucun serveur sur le chemin de la connexion n'est en mesure de voir le chemin complet de la provenance et de la destination du trafic, ce qui signifie que même les serveurs que vous utilisez pour vous connecter ne peuvent pas briser votre anonymat. [:octicons-home-16:](https://torproject.org){ .card-link title="Page d'accueil" } diff --git a/i18n/fr/basics/vpn-overview.md b/i18n/fr/basics/vpn-overview.md index 27161990..7f5dfd95 100644 --- a/i18n/fr/basics/vpn-overview.md +++ b/i18n/fr/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Les réseaux privés virtuels déplacent le risque de votre FAI à Les Réseaux Privés Virtuels sont un moyen d'étendre l'extrémité de votre réseau avec une sortie située ailleurs dans le monde. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normalement, un FAI peut voir le flux de trafic internet qui entre et sort de votre dispositif de terminaison de réseau (c'est-à-dire votre box/modem). Les protocoles de chiffrement tels que HTTPS sont couramment utilisés sur internet, ils se peut donc qu'ils ne soient pas en mesure de voir exactement ce que vous publiez ou lisez, mais ils peuvent avoir une idée [des domaines que vous visitez](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). L'utilisation d'un VPN permet de dissimuler ces informations à votre FAI, en transférant la confiance que vous accordez à votre réseau vers un serveur situé ailleurs dans le monde. Par conséquent, le FAI ne voit que le fait que vous êtes connecté à un VPN et rien sur l'activité que vous lui transmettez. diff --git a/i18n/fr/basics/why-privacy-matters.md b/i18n/fr/basics/why-privacy-matters.md index 2780e2f1..ee8de615 100644 --- a/i18n/fr/basics/why-privacy-matters.md +++ b/i18n/fr/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ La protection de la vie privée concerne en fin de compte des informations humai De nombreuses personnes confondent les concepts de **vie privée**, **sécurité**, et **anonymat**. Vous verrez des gens critiquer divers produits en disant qu'ils ne sont pas privés, alors qu'ils veulent dire qu'ils ne garantissent pas l'anonymat, par exemple. Sur ce site web, nous abordons ces trois sujets, mais il est important que vous compreniez la différence entre eux et quand chacun d'entre eux entre en jeu. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Confidentialité** : @@ -56,6 +58,8 @@ Prenons l'exemple des formulaires de consentement des cookies. Vous les rencontr La protection de la vie privée doit être intégrée par défaut dans les [logiciels et services](../tools.md) que nous utilisons, car il est impossible de forcer de vous-même la plupart des applications à respecter votre vie privée. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/fr/index.md b/i18n/fr/index.md index 3dafd336..ca02c104 100644 --- a/i18n/fr/index.md +++ b/i18n/fr/index.md @@ -71,7 +71,8 @@ Essayer de protéger toutes vos données contre tout le monde, tout le temps, es
**Privacy Guides** dispose d'une [communauté] dédiée (https://discuss.privacyguides.net) qui évalue de manière indépendante divers *outils et services de protection de la vie privée. Chacune de nos recommandations répond à un ensemble de critères stricts afin de s'assurer qu'elles apportent la plus grande valeur au plus grand nombre et qu'elles offrent le meilleur équilibre entre vie privée, sécurité et commodité. En tant que membre d'une **organisation caritative publique** à but non lucratif, Privacy Guides applique des **normes journalistiques** et des politiques strictes pour garantir que nos recommandations sont exemptes de conflits d'intérêts. Nous ne nous associons pas à des fournisseurs ou à des programmes d'affiliation susceptibles d'influencer nos évaluations et nos recommandations. -[:material-heart:{.pg-red} Soutenir notre travail](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Recommandations sans publicité** @@ -83,77 +84,6 @@ Essayer de protéger toutes vos données contre tout le monde, tout le temps, es
-### Top 3 des fournisseurs d'emails privés - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail est un service d'e-mail qui met l'accent sur la confidentialité, le chiffrement, la sécurité et la facilité d'utilisation. Ils sont en activité depuis 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Lire l'article complet](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org est un service de messagerie électronique sécurisé, sans publicité et alimenté par une énergie 100% écologique. Il est en activité depuis 2014. Mailbox.org est basé à Berlin, en Allemagne. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta(anciennement *Tutanota*) est un service de mesagerie électronique mettant l'accent sur la sécurité et la protéction de la vie privée via l'utilisation du cryptage. Tuta est en activité depuis 2011 et est basée à Hanovre, en Allemagne. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Lire l'article complet](email.md#tuta) - -
- -
-
-### Les meilleurs fournisseurs de VPN - -
- -- ![Logo de Proton VPN](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![Logo d'IVPN](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Logo de Mullvad](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Services de stockage sécurisé dans le Cloud - -
- -- ![Logo de Proton Drive](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Logo de Tresorit](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Logo de Peergos](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Meilleures navigateurs Web - -
- -- ![Logo de Mullvad Browser](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Logo de Firefox](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Logo de Brave](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: Plus de recoomandations d' **Outils pour la protéction de la vie privée**](tools.md){ class="md-button md-button--primary" } -[Meilleurs Navigateurs Mobiles](mobile-browsers.md ""){.md-button} [Meilleurs Extensions pour Navigateurs](browser-extensions.md ""){.md-button} [Serveurs DNS](dns.md ""){.md-button} [Fournsseurs d'Alias pour Messagerie électrionque](email-aliasing.md ""){.md-button} [Logiciels d'Organsations de Photos](photo-management.md ""){.md-button} [Système d'Exploitation pour Ordinateurs](desktop.md ""){.md-button} - --- ## À propos de Privacy Guides @@ -166,7 +96,7 @@ Créé en 2021 en raison de la difficulté à trouver des évaluateurs impartiau Il a été cité dans **WIRED**, **Tweakers.net**, **The New York Times** et de nombreuses autres publications comme une source fiable de connaissances en matière de protection de la vie privée et de sécurité. -[:material-information: En savoir plus sur nous](about.md){ class="md-button md-button--primary" } [:material-email: S'abonner à notre Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ Nous recommandons une grande variété d'**outils de confidentialité** (a.k.a. De nombreuses personnes confondent les notions de vie privée, de sécurité et d'anonymat. Vous verrez des gens critiquer divers produits en disant qu'ils ne sont pas privés, alors qu'ils veulent dire qu'ils ne garantissent pas l'anonymat, par exemple. Sur ce site web, nous abordons ces trois sujets, mais il est important que vous compreniez la différence entre eux et quand chacun d'entre eux entre en jeu. -[Vie privée vs Sécurité vs Anonymat](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/fr/real-time-communication.md b/i18n/fr/real-time-communication.md index 2f3a9a1b..c6b5dff7 100644 --- a/i18n/fr/real-time-communication.md +++ b/i18n/fr/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Surveillance de masse](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Capitalisme de surveillance](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types de réseaux de communication :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Messageries instantanées chiffrées diff --git a/i18n/fr/tor.md b/i18n/fr/tor.md index 3335e8c7..85f40fc6 100644 --- a/i18n/fr/tor.md +++ b/i18n/fr/tor.md @@ -31,7 +31,7 @@ schema: **Tor** est un groupe de serveurs gérés par des bénévoles qui vous permet de vous connecter gratuitement et d'améliorer votre confidentialité et votre sécurité sur Internet. Les particuliers et les organisations peuvent également partager des informations sur le réseau Tor avec des "services cachés .onion" sans compromettre leur vie privée. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure. -[Introduction détaillée de Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/he/advanced/communication-network-types.md b/i18n/he/advanced/communication-network-types.md index 8c117eb1..39e0855f 100644 --- a/i18n/he/advanced/communication-network-types.md +++ b/i18n/he/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: סקירה כללית של מספר ארכיטקטורות רשת ישנן מספר ארכיטקטורות רשת הנפוצות להעברת הודעות בין אנשים. רשתות אלו יכולות לספק הבטחות פרטיות שונות, וזו הסיבה שכדאי לקחת בחשבון את [מודל האיום](../basics/threat-modeling.md) שלך בעת ההחלטה באיזו אפליקציה להשתמש. -[מסנג'רים (הודעות מיידיות) מומלצות](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## רשתות מרכזיות diff --git a/i18n/he/advanced/tor-overview.md b/i18n/he/advanced/tor-overview.md index 2e6eced9..aa93fbee 100644 --- a/i18n/he/advanced/tor-overview.md +++ b/i18n/he/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor היא רשת מבוזרת בחינם לשימוש המיועד [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. בשימוש נכון, הרשת מאפשרת גלישה ותקשורת פרטית ואנונימית. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. זה מטשטש מהיכן מגיעה התעבורה, ואף שרת בנתיב החיבור לא מסוגל לראות את הנתיב המלא של המקום ממנו מגיעה התנועה והולכת, כלומר אפילו השרתים שבהם אתה משתמש כדי להתחבר לא יכולים לשבור את האנונימיות שלך. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/he/basics/vpn-overview.md b/i18n/he/basics/vpn-overview.md index db25bcf3..3325f1ca 100644 --- a/i18n/he/basics/vpn-overview.md +++ b/i18n/he/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p רשתות וירטואליות פרטיות הן דרך להרחיב את הקצה של הרשת שלך ליציאה למקום אחר בעולם. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + בדרך כלל, ספק שירותי אינטרנט יכול לראות את זרימת תעבורת האינטרנט הנכנסת ויוצאת ממכשיר סיום הרשת שלך (כלומר מודם). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/he/basics/why-privacy-matters.md b/i18n/he/basics/why-privacy-matters.md index 2929092c..855f9d10 100644 --- a/i18n/he/basics/why-privacy-matters.md +++ b/i18n/he/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: בעידן המודרני של ניצול נתונים דיגיטל אנשים רבים מבלבלים את המושגים של פרטיות, אבטחה ואנונימיות. אנשים רבים מבלבלים את המושגים של **פרטיות**, **אבטחה** ו**אנונימיות**. אתה תראה אנשים מבקרים מוצרים שונים כ"לא פרטיים" כאשר הם באמת מתכוונים שזה לא מספק אנונימיות, למשל. באתר זה אנו מכסים את כל שלושת הנושאים הללו, אך חשוב שתבינו את ההבדל ביניהם, ומתי כל אחד מהם נכנס לפעולה. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **פרטיות** : @@ -56,6 +58,8 @@ description: בעידן המודרני של ניצול נתונים דיגיטל פרטיות היא משהו שאנחנו צריכים להכניס ל[תוכנות ובשירותים](../tools.md) שבהם אנו משתמשים כברירת מחדל, אתה לא יכול לכופף את רוב האפליקציות להיות פרטיות בעצמך. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## מקורות - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/he/index.md b/i18n/he/index.md index edae62c4..ad976179 100644 --- a/i18n/he/index.md +++ b/i18n/he/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. הם פועלים מאז 2014. Mailbox.org ממוקם בברלין, גרמניה. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## אודות Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. אתה תראה אנשים מבקרים מוצרים שונים כ"לא פרטיים" כאשר הם באמת מתכוונים שזה לא מספק אנונימיות, למשל. באתר זה אנו מכסים את כל שלושת הנושאים הללו, אך חשוב שתבינו את ההבדל ביניהם, ומתי כל אחד מהם נכנס לפעולה. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/he/real-time-communication.md b/i18n/he/real-time-communication.md index 11477169..ab68d639 100644 --- a/i18n/he/real-time-communication.md +++ b/i18n/he/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: מעקב המוני](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: קפיטליזם מעקב](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[סוגי רשתות תקשורת :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## מסנג'רים מוצפנים diff --git a/i18n/he/tor.md b/i18n/he/tor.md index 18363b8d..0f0ebb16 100644 --- a/i18n/he/tor.md +++ b/i18n/he/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. אנשים וארגונים יכולים גם לשתף מידע על גבי רשת Tor עם ".onion hidden services" מבלי לפגוע בפרטיותם. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה. -[סקירת Tor מפורטת :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/hi/advanced/communication-network-types.md b/i18n/hi/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/hi/advanced/communication-network-types.md +++ b/i18n/hi/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/hi/advanced/tor-overview.md b/i18n/hi/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/hi/advanced/tor-overview.md +++ b/i18n/hi/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/hi/basics/vpn-overview.md b/i18n/hi/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/hi/basics/vpn-overview.md +++ b/i18n/hi/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/hi/basics/why-privacy-matters.md b/i18n/hi/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/hi/basics/why-privacy-matters.md +++ b/i18n/hi/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/hi/index.md b/i18n/hi/index.md index d3fe4a59..b181fecd 100644 --- a/i18n/hi/index.md +++ b/i18n/hi/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/hi/real-time-communication.md b/i18n/hi/real-time-communication.md index 5051a9bc..b92227e4 100644 --- a/i18n/hi/real-time-communication.md +++ b/i18n/hi/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/hi/tor.md b/i18n/hi/tor.md index 87b21835..c20d62ba 100644 --- a/i18n/hi/tor.md +++ b/i18n/hi/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/hu/advanced/communication-network-types.md b/i18n/hu/advanced/communication-network-types.md index 7a5c4dca..24890579 100644 --- a/i18n/hu/advanced/communication-network-types.md +++ b/i18n/hu/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Azonnali üzenetküldő alkalmazások által gyakran használt kül Személyek közötti üzenetek továbbítására többféle hálózati architektúra használható. Ezek a hálózatok különböző magánéleti garanciákat nyújthatnak, ezért érdemes figyelembe venned a [védelmk modelledet](../basics/threat-modeling.md), amikor eldöntöd, hogy melyik alkalmazást fogod használni. -[Ajánlott Azonnali Üzenetküldők](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Központosított Hálózatok diff --git a/i18n/hu/advanced/tor-overview.md b/i18n/hu/advanced/tor-overview.md index f40a8b0c..cc52588b 100644 --- a/i18n/hu/advanced/tor-overview.md +++ b/i18n/hu/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Ez elrejti, hogy honnan érkezik a forgalom, és a kapcsolat útvonalában egyetlen szerver sem látja a teljes útvonalat, ahonnan a forgalom érkezik és ahová tart, ami azt jelenti, hogy még az általad csatlakozásra használt szerverek sem tudják megtörni az anonimitásodat. [:octicons-home-16:](https://torproject.org){ .card-link title=Honlap} diff --git a/i18n/hu/basics/vpn-overview.md b/i18n/hu/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/hu/basics/vpn-overview.md +++ b/i18n/hu/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/hu/basics/why-privacy-matters.md b/i18n/hu/basics/why-privacy-matters.md index f396b4c3..ff41d36b 100644 --- a/i18n/hu/basics/why-privacy-matters.md +++ b/i18n/hu/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ A magánélet végső soron az emberi információkról szól, és ez azért fon Sokan összekeverik az **adatvédelem**, az **adatbiztonság** és az **anonimitás** fogalmát. Láthatod, hogy emberek kritizálnak különböző termékeket, mint "nem privát", amikor valójában úgy értik, hogy nem biztosít anonimitást például. Ezen a weboldalon mindhárom témakörrel foglalkozunk, de fontos, hogy megértsd a köztük lévő különbséget, és hogy mikor melyik kerül a képbe. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Adatvédelem** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/hu/index.md b/i18n/hu/index.md index 5accd4e6..8e774482 100644 --- a/i18n/hu/index.md +++ b/i18n/hu/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. 2014 óta működnek. A Mailbox.org székhelye Berlinben, Németországban található. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Láthatod, hogy emberek kritizálnak különböző termékeket, mint "nem privát", amikor valójában úgy értik, hogy nem biztosít anonimitást például. Ezen a weboldalon mindhárom témakörrel foglalkozunk, de fontos, hogy megértsd a köztük lévő különbséget, és hogy mikor melyik kerül a képbe. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/hu/real-time-communication.md b/i18n/hu/real-time-communication.md index 0ce05a25..cef6f761 100644 --- a/i18n/hu/real-time-communication.md +++ b/i18n/hu/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/hu/tor.md b/i18n/hu/tor.md index e5578463..19f1aeb8 100644 --- a/i18n/hu/tor.md +++ b/i18n/hu/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. A magánszemélyek és szervezetek a Tor-hálózaton keresztül a ".onion rejtett szolgáltatásokkal" is megoszthatnak információkat anélkül, hogy veszélyeztetnék a magánéletüket. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére. -[Részletes Tor áttekintés :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tanács

diff --git a/i18n/id/advanced/communication-network-types.md b/i18n/id/advanced/communication-network-types.md index 3370a8f0..30458555 100644 --- a/i18n/id/advanced/communication-network-types.md +++ b/i18n/id/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Ikhtisar tentang beberapa arsitektur jaringan yang biasa digunakan Ada beberapa arsitektur jaringan yang biasa digunakan untuk menyampaikan pesan antar orang. Jaringan ini dapat memberikan jaminan privasi yang berbeda, itulah sebabnya mengapa perlu mempertimbangkan [model ancaman](../basics/threat-modeling.md) Anda ketika memutuskan aplikasi mana yang akan digunakan. -[Perpesanan Instan yang Direkomendasikan](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Jaringan Terpusat diff --git a/i18n/id/advanced/tor-overview.md b/i18n/id/advanced/tor-overview.md index 1c89c3d8..737dc779 100644 --- a/i18n/id/advanced/tor-overview.md +++ b/i18n/id/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor adalah jaringan terdesentralisasi yang gratis untuk digunakan, [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Jika digunakan dengan benar, jaringan ini memungkinkan penjelajahan dan komunikasi secara privat dan anonim. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Hal ini mengaburkan dari mana lalu lintas berasal, dan tidak ada server di jalur koneksi yang dapat melihat jalur penuh dari mana lalu lintas berasal dan pergi, yang berarti bahkan server yang Anda gunakan untuk terhubung tidak dapat merusak anonimitas Anda. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/id/basics/vpn-overview.md b/i18n/id/basics/vpn-overview.md index 38801978..b5c6d194 100644 --- a/i18n/id/basics/vpn-overview.md +++ b/i18n/id/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Jaringan Pribadi Virtual (VPN) mengalihkan risiko dari ISP Anda ke Jaringan Pribadi Virtual adalah cara untuk memperluas ujung jaringan Anda untuk keluar ke tempat lain di dunia. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/id/basics/why-privacy-matters.md b/i18n/id/basics/why-privacy-matters.md index e25a11ac..fc32e0e8 100644 --- a/i18n/id/basics/why-privacy-matters.md +++ b/i18n/id/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privasi pada dasarnya adalah tentang informasi manusia, dan ini penting karena k Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privasi** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sumber - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/id/index.md b/i18n/id/index.md index 83fa44fd..47985dbd 100644 --- a/i18n/id/index.md +++ b/i18n/id/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. Mereka telah beroperasi sejak 2014. Mailbox.org berbasis di Berlin, Jerman. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/id/real-time-communication.md b/i18n/id/real-time-communication.md index 40086aef..5e34414f 100644 --- a/i18n/id/real-time-communication.md +++ b/i18n/id/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Pengawasan Massal](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Kapitalisme Pengawasan](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/id/tor.md b/i18n/id/tor.md index 283be2cd..5fc00308 100644 --- a/i18n/id/tor.md +++ b/i18n/id/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individu dan organisasi juga dapat berbagi informasi melalui jaringan Tor dengan "layanan tersembunyi .onion" tanpa mengorbankan privasi mereka. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif. -[Ikhtisar Tor Terperinci :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/it/advanced/communication-network-types.md b/i18n/it/advanced/communication-network-types.md index fd593f2e..6383e368 100644 --- a/i18n/it/advanced/communication-network-types.md +++ b/i18n/it/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Una panoramica delle diverse architetture di rete, comunemente util Esistono svariate architetture di rete, utilizzate comunemente per trasmettere messaggi tra persone. Queste reti possono fornire diverse garanzie per la privacy, per cui vale la pena considerare il tuo [modello di minaccia](../basics/threat-modeling.md), decidendo quale app utilizzare. -[Messaggistica istantanea consigliata](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Reti Centralizzate diff --git a/i18n/it/advanced/tor-overview.md b/i18n/it/advanced/tor-overview.md index cb12be71..f3d007c3 100644 --- a/i18n/it/advanced/tor-overview.md +++ b/i18n/it/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor è una rete decentralizzata e libera, progettata per utilizzare [**Tor**](../alternative-networks.md#tor) è una rete decentralizzata e gratuita progettata per utilizzare Internet con la massima privacy possibile. Se utilizzata adeguatamente, la rete consente navigazione e comunicazioni private e anonime. Poiché il traffico di Tor è difficile da bloccare e tracciare, è un efficace strumento di elusione della censura. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor funziona instradando il traffico tramite questi server gestiti da volontari, invece di effettuare una connessione diretta al sito che stai provando a visitare. In questo modo si offusca la provenienza del traffico e nessun server nel percorso di connessione è in grado di vedere il percorso completo del traffico proveniente e diretto, il che significa che nemmeno i server utilizzati per connettersi possono violare l'anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/it/basics/vpn-overview.md b/i18n/it/basics/vpn-overview.md index 35240861..95848a0d 100644 --- a/i18n/it/basics/vpn-overview.md +++ b/i18n/it/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Le reti private virtuali spostano il rischio dal vostro ISP a una t Le Reti Private Virtuali sono un metodo d'estensione del termine della tua rete, affinché il traffico esca da qualche altra parte nel mondo. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normalmente, un ISP può visualizzare il flusso di traffico Internet in entrate e in uscita dal dispositivo di terminazione della tua rete (cioè, il modem). I protocolli crittografici come HTTPS sono comunemente utilizzati su Internet, quindi, potrebbero non riuscire a vedere esattamente ciò che stai pubblicando o leggendo, ma potrebbero farsi un'idea dei [domini che richiedi](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). L'utilizzo di una VPN nasconde persino queste informazioni dal tuo ISP, spostando la fiducia che poni nella tua rete, a un server da qualche altra parte nel mondo. Di conseguenza, l'ISP può soltanto vedere che sei conness* a una VPN e nulla sull'attività che vi stai svolgendo. diff --git a/i18n/it/basics/why-privacy-matters.md b/i18n/it/basics/why-privacy-matters.md index 7e556532..56694e2a 100644 --- a/i18n/it/basics/why-privacy-matters.md +++ b/i18n/it/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ In fin dei conti la privacy riguarda le informazioni umane, ed è importante per In molti confondono i concetti di **privacy**, **sicurezza** e **anonimato**. Vedrai persone criticare vari prodotti come "non privati", quando in realtà intendono che non forniscono, ad esempio, anonimato. Su questo sito web, copriamo tutti e tre gli argomenti, ma è importante che tu ne comprenda le differenze, nonché quando ognuno di essi entra in gioco. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Ad esempio, considera i moduli di consenso per i cookie. Potresti incontrarli do La privacy dev'essere integrata nei [software e servizi](../tools.md) che utilizziamo di default, non puoi rendere private gran parte delle app, da solo. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Fonti - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) di Neil Richards diff --git a/i18n/it/index.md b/i18n/it/index.md index e1a97140..762ad730 100644 --- a/i18n/it/index.md +++ b/i18n/it/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. Sono operativi dal 2014. Mailbox.org ha sede a Berlino, in Germania. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Logo di Proton VPN](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![Logo di IVPN](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Logo di Mullvad](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Logo di Proton Drive](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Logo di Tresorit](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Logo di Peergos](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Logo di Mullvad Browser](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Logo di Firefox](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Logo di Brave](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Vedrai persone criticare vari prodotti come "non privati", quando in realtà intendono che non forniscono, ad esempio, anonimato. Su questo sito web, copriamo tutti e tre gli argomenti, ma è importante che tu ne comprenda le differenze, nonché quando ognuno di essi entra in gioco. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index 23cb8998..1aa2d73a 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Sorveglianza di massa](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Capitalismo di sorveglianza](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Tipi di reti di comunicazione :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Messaggistica Crittografata diff --git a/i18n/it/tor.md b/i18n/it/tor.md index 11d02c42..4a3931da 100644 --- a/i18n/it/tor.md +++ b/i18n/it/tor.md @@ -31,7 +31,7 @@ schema: **Tor** è un gruppo di server gestiti da volontari che consente di connettersi gratuitamente e di migliorare la propria privacy e sicurezza su Internet. Individui e organizzazioni possono inoltre condividere le informazioni tramite la rete Tor con i "servizi nascosti .onion", senza comprometterne la privacy. Poiché il traffico di Tor è difficile da bloccare e tracciare, è un efficace strumento di elusione della censura. -[Panoramica dettagliata di Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Suggerimento

diff --git a/i18n/ja/advanced/communication-network-types.md b/i18n/ja/advanced/communication-network-types.md index 87083638..0c0b62b9 100644 --- a/i18n/ja/advanced/communication-network-types.md +++ b/i18n/ja/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[おすすめのインスタントメッセンジャー](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 中央集権型ネットワーク diff --git a/i18n/ja/advanced/tor-overview.md b/i18n/ja/advanced/tor-overview.md index 10447fc4..65d33f49 100644 --- a/i18n/ja/advanced/tor-overview.md +++ b/i18n/ja/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Torは、可能な限りプライバシーを守ってインター [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. 適切に使用すれば、プライベートで匿名のブラウジングや通信を行うことができます。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/ja/basics/vpn-overview.md b/i18n/ja/basics/vpn-overview.md index 23a2ea9c..983e4ead 100644 --- a/i18n/ja/basics/vpn-overview.md +++ b/i18n/ja/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/ja/basics/why-privacy-matters.md b/i18n/ja/basics/why-privacy-matters.md index c8a317f9..78cb1f71 100644 --- a/i18n/ja/basics/why-privacy-matters.md +++ b/i18n/ja/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: デジタルデータが搾取される現代において、あな 多くの人は、**プライバシー**、**セキュリティ**、**匿名性**の概念を混同しています。 例えば、ある製品が匿名性を提供していないという意味で「プライベートではない」と批判する人々がいます。 このウェブサイトでは、これら3つのトピックすべてを取り上げます。まず、それぞれの違いを理解しましょう。 +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **プライバシー** : @@ -56,6 +58,8 @@ A common definition of privacy is that it is the ability to *control* who has ac Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## ソース - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/ja/index.md b/i18n/ja/index.md index 1b9da21d..3c4ce362 100644 --- a/i18n/ja/index.md +++ b/i18n/ja/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. 2014年から運営をされています。 Mailbox.orgはドイツのベルリンに拠点を置いています。 Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. 例えば、ある製品が匿名性を提供していないという意味で「プライベートではない」と批判する人々がいます。 このウェブサイトでは、これら3つのトピックすべてを取り上げます。まず、それぞれの違いを理解しましょう。 -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/ja/real-time-communication.md b/i18n/ja/real-time-communication.md index c038a828..c030f640 100644 --- a/i18n/ja/real-time-communication.md +++ b/i18n/ja/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 暗号化されたメッセンジャー diff --git a/i18n/ja/tor.md b/i18n/ja/tor.md index 1c6fd0a5..b327dff1 100644 --- a/i18n/ja/tor.md +++ b/i18n/ja/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 個人や組織は、プライバシーを損なうことなく、Torネットワーク上で「.onion 秘匿サービス」による情報共有が可能です。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/ko/advanced/communication-network-types.md b/i18n/ko/advanced/communication-network-types.md index 7aada37c..7c06b97b 100644 --- a/i18n/ko/advanced/communication-network-types.md +++ b/i18n/ko/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: 메신저 애플리케이션에서 보편적으로 사용되는 몇 사람들 간에 메시지를 전달할 때 일반적으로 쓰이는 네트워크의 구조는 여러 유형이 있습니다. 네트워크 유형마다 프라이버시 면에서 각각 다른 장단점이 존재하므로, 어떤 유형의 애플리케이션을 사용할지는 여러분의 [위협 모델](../basics/threat-modeling.md)을 고려하여 결정하는 것이 좋습니다. -[권장 메신저](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 중앙 집중형 네트워크 diff --git a/i18n/ko/advanced/tor-overview.md b/i18n/ko/advanced/tor-overview.md index 0324aa5f..6923729e 100644 --- a/i18n/ko/advanced/tor-overview.md +++ b/i18n/ko/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor는 무료로 이용 가능한 탈중앙화 네트워크입니 [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Tor 네트워크를 올바르게 사용하면 비공개 및 익명 웹 탐색과 커뮤니케이션이 가능합니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. 이러한 방식을 통해 트래픽의 출처를 알 수 없게 만들고, 연결 경로상의 서버 또한 트래픽의 전체 경로는 볼 수 없으므로, 연결에 사용한 서버조차도 여러분의 익명성을 깨트릴 수 없습니다. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/ko/basics/vpn-overview.md b/i18n/ko/basics/vpn-overview.md index 6f429665..6bb4a921 100644 --- a/i18n/ko/basics/vpn-overview.md +++ b/i18n/ko/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/ko/basics/why-privacy-matters.md b/i18n/ko/basics/why-privacy-matters.md index 4558d8a7..cdcbc73c 100644 --- a/i18n/ko/basics/why-privacy-matters.md +++ b/i18n/ko/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we 많은 사람들은 **프라이버시**, **보안**, **익명성**의 개념을 혼동하곤 합니다. 어떤 서비스가 익명성을 제공하지 않는다는 이유로 '프라이버시 친화적이지 않다'며 비판하는 사람도 많습니다. 본 웹사이트에서는 이 세 가지 개념을 모두 주제로 다루고 있지만, 각 개념의 차이를 정확히 알고 언제 어떤 것이 필요한지를 이해해야 합니다. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **프라이버시** : @@ -56,6 +58,8 @@ All of these concepts overlap, but it is possible to have any combination of the 프라이버시는 우리가 사용하는 [소프트웨어 및 서비스](../tools.md)에 기본적으로 내장되어 있어야 하는 것입니다. 사용자 개개인의 힘만으로는 직접 수많은 앱을 프라이버시 친화적이도록 수정하는 것은 불가능합니다. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## 출처 - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/ko/index.md b/i18n/ko/index.md index 98a0795b..c25575b7 100644 --- a/i18n/ko/index.md +++ b/i18n/ko/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. 2014년부터 운영되었습니다. Mailbox.org 본사는 독일 베를린에 위치하고 있습니다. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. 어떤 서비스가 익명성을 제공하지 않는다는 이유로 '프라이버시 친화적이지 않다'며 비판하는 사람도 많습니다. 본 웹사이트에서는 이 세 가지 개념을 모두 주제로 다루고 있지만, 각 개념의 차이를 정확히 알고 언제 어떤 것이 필요한지를 이해해야 합니다. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/ko/real-time-communication.md b/i18n/ko/real-time-communication.md index b3291679..5345505b 100644 --- a/i18n/ko/real-time-communication.md +++ b/i18n/ko/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: 대중 감시(Mass Surveillance)](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: 감시 자본주의(Surveillance Capitalism)](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[통신 네트워크 유형 :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 암호화 메신저 diff --git a/i18n/ko/tor.md b/i18n/ko/tor.md index a453ebe0..82c00e46 100644 --- a/i18n/ko/tor.md +++ b/i18n/ko/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 개인 및 단체는 'Onion hidden 서비스'를 통해, 프라이버시를 침해받는 일 없이 Tor 네트워크에서 정보를 공유할 수 있습니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. -[자세한 Tor 개요 :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/ku-IQ/advanced/communication-network-types.md b/i18n/ku-IQ/advanced/communication-network-types.md index 624a18fd..a478b279 100644 --- a/i18n/ku-IQ/advanced/communication-network-types.md +++ b/i18n/ku-IQ/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[نامەبەرە دەستبەجێیە پێشنیارکراوەکان](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/ku-IQ/advanced/tor-overview.md b/i18n/ku-IQ/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/ku-IQ/advanced/tor-overview.md +++ b/i18n/ku-IQ/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/ku-IQ/basics/vpn-overview.md b/i18n/ku-IQ/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/ku-IQ/basics/vpn-overview.md +++ b/i18n/ku-IQ/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/ku-IQ/basics/why-privacy-matters.md b/i18n/ku-IQ/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/ku-IQ/basics/why-privacy-matters.md +++ b/i18n/ku-IQ/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/ku-IQ/index.md b/i18n/ku-IQ/index.md index 4e6aabf6..b181fecd 100644 --- a/i18n/ku-IQ/index.md +++ b/i18n/ku-IQ/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. ئەوان لە **2014**ـەوە لە کاردان. Mailbox.org دەکەوێتە بەرلین، لە ئەڵمانیا. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/ku-IQ/real-time-communication.md b/i18n/ku-IQ/real-time-communication.md index 5051a9bc..b92227e4 100644 --- a/i18n/ku-IQ/real-time-communication.md +++ b/i18n/ku-IQ/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/ku-IQ/tor.md b/i18n/ku-IQ/tor.md index 87b21835..c20d62ba 100644 --- a/i18n/ku-IQ/tor.md +++ b/i18n/ku-IQ/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/nl/advanced/communication-network-types.md b/i18n/nl/advanced/communication-network-types.md index 25739858..444c9ff9 100644 --- a/i18n/nl/advanced/communication-network-types.md +++ b/i18n/nl/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Een overzicht van verschillende netwerkarchitecturen die vaak door Er zijn verschillende netwerkarchitecturen die gewoonlijk worden gebruikt om berichten tussen mensen door te geven. Deze netwerken kunnen verschillende privacygaranties bieden, en daarom is het de moeite waard jouw [bedreigingsmodel](../basics/threat-modeling.md) in overweging te nemen bij de beslissing welke app je gaat gebruiken. -[Aanbevolen Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Gecentraliseerde netwerken diff --git a/i18n/nl/advanced/tor-overview.md b/i18n/nl/advanced/tor-overview.md index b8563490..35ed352f 100644 --- a/i18n/nl/advanced/tor-overview.md +++ b/i18n/nl/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is een gratis te gebruiken, gedecentraliseerd netwerk dat is on [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Bij correct gebruik maakt het netwerk privé en anoniem browsen en communicatie mogelijk. Omdat Tor-verkeer moeilijk te blokkeren en te traceren is, is Tor een effectief middel om censuur te omzeilen. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Dit versluiert waar het verkeer vandaan komt, en geen enkele server in het verbindingspad kan het volledige pad zien van waar het verkeer vandaan komt en naartoe gaat, wat betekent dat zelfs de servers die je gebruikt om verbinding te maken jouw anonimiteit niet kunnen doorbreken. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/nl/basics/vpn-overview.md b/i18n/nl/basics/vpn-overview.md index e4f7cb09..4686738d 100644 --- a/i18n/nl/basics/vpn-overview.md +++ b/i18n/nl/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks verschuiven het risico van je ISP naar een Virtual Private Networks zijn een manier om het einde van je netwerk uit te breiden naar een uitgang ergens anders in de wereld. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normaal gesproken kan een ISP de stroom internetverkeer zien die je netwerkapparaat (d.w.z. modem) binnenkomt en verlaat. Versleutelingsprotocollen zoals HTTPS worden vaak gebruikt op het internet, dus ze kunnen misschien niet precies zien wat je post of leest, maar ze kunnen wel een idee krijgen van de [domeinen die je opvraagt](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Het gebruik van een VPN verbergt zelfs deze informatie voor je ISP, door het vertrouwen dat je in je netwerk stelt te verplaatsen naar een server ergens anders in de wereld. Hierdoor ziet de ISP alleen dat je verbonden bent met een VPN en niets over de activiteit die je er doorheen stuurt. diff --git a/i18n/nl/basics/why-privacy-matters.md b/i18n/nl/basics/why-privacy-matters.md index 6278a2c5..ea5a2818 100644 --- a/i18n/nl/basics/why-privacy-matters.md +++ b/i18n/nl/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ De privacy gaat uiteindelijk over menselijke informatie, en dat is belangrijk om Veel mensen halen de begrippen **privacy**, **veiligheid**, en **anonimiteit** door elkaar. Je ziet mensen verschillende producten bekritiseren als "niet privé", terwijl ze eigenlijk bedoelen dat het bijvoorbeeld geen anonimiteit biedt. Op deze website behandelen we alle drie onderwerpen, maar het is belangrijk dat je het verschil begrijpt en wanneer het om verschillende zaken gaat. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Neem bijvoorbeeld de cookie popups. Je kunt deze tientallen keren per dag tegenk Privacy is iets wat we standaard in [software en diensten](../tools.md) moeten ingebakken hebben je kan de meeste apps niet zelfstandig privé maken. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Bronnen - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) door Neil Richards diff --git a/i18n/nl/index.md b/i18n/nl/index.md index a502c248..eee7e8ca 100644 --- a/i18n/nl/index.md +++ b/i18n/nl/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. Ze zijn sinds 2014 in bedrijf. Mailbox.org is gevestigd in Berlijn, Duitsland. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## Over Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Je ziet mensen verschillende producten bekritiseren als "niet privé", terwijl ze eigenlijk bedoelen dat het bijvoorbeeld geen anonimiteit biedt. Op deze website behandelen we alle drie onderwerpen, maar het is belangrijk dat je het verschil begrijpt en wanneer het om verschillende zaken gaat. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/nl/real-time-communication.md b/i18n/nl/real-time-communication.md index 7b2c7903..8e331c93 100644 --- a/i18n/nl/real-time-communication.md +++ b/i18n/nl/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Massabewaking](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance kapitalisme](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Soorten communicatienetwerken :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Versleutelde Messengers diff --git a/i18n/nl/tor.md b/i18n/nl/tor.md index c3be7e67..e974cf30 100644 --- a/i18n/nl/tor.md +++ b/i18n/nl/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuen en organisaties kunnen ook informatie delen via het Tor-netwerk met ".onion hidden services" zonder hun privacy in gevaar te brengen. Omdat Tor-verkeer moeilijk te blokkeren en te traceren is, is Tor een effectief middel om censuur te omzeilen. -[Gedetailleerd Tor-overzicht :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/pl/advanced/communication-network-types.md b/i18n/pl/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/pl/advanced/communication-network-types.md +++ b/i18n/pl/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/pl/advanced/tor-overview.md b/i18n/pl/advanced/tor-overview.md index ef994fde..53c36926 100644 --- a/i18n/pl/advanced/tor-overview.md +++ b/i18n/pl/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/pl/basics/vpn-overview.md b/i18n/pl/basics/vpn-overview.md index 09cba9f1..2909c349 100644 --- a/i18n/pl/basics/vpn-overview.md +++ b/i18n/pl/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/pl/basics/why-privacy-matters.md b/i18n/pl/basics/why-privacy-matters.md index 5c7dffac..94d46910 100644 --- a/i18n/pl/basics/why-privacy-matters.md +++ b/i18n/pl/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Źródła - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/pl/index.md b/i18n/pl/index.md index 29806af2..64481d32 100644 --- a/i18n/pl/index.md +++ b/i18n/pl/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/pl/real-time-communication.md b/i18n/pl/real-time-communication.md index 5051a9bc..b92227e4 100644 --- a/i18n/pl/real-time-communication.md +++ b/i18n/pl/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/pl/tor.md b/i18n/pl/tor.md index 87b21835..c20d62ba 100644 --- a/i18n/pl/tor.md +++ b/i18n/pl/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/pt-BR/advanced/communication-network-types.md b/i18n/pt-BR/advanced/communication-network-types.md index b5a571ad..9e496904 100644 --- a/i18n/pt-BR/advanced/communication-network-types.md +++ b/i18n/pt-BR/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Uma visão geral de várias estruturas de rede normalmente usadas p Existem várias arquiteturas de rede comumente usadas para retransmitir mensagens entre pessoas. Essas redes podem fornecer diferentes garantias de privacidade, e é por isso que vale a pena considerar seu [modelo de ameaça](../basics/threat-modeling.md) ao decidir qual aplicativo usar. -[Mensageiros Instantâneos Recomendados](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Redes Centralizadas diff --git a/i18n/pt-BR/advanced/tor-overview.md b/i18n/pt-BR/advanced/tor-overview.md index 52cfed5d..c03a869a 100644 --- a/i18n/pt-BR/advanced/tor-overview.md +++ b/i18n/pt-BR/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor é uma rede descentralizada de uso gratuito, projetada para usa [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Se usada corretamente, a rede permite navegação e comunicações privadas e anônimas. Como o tráfego do Tor é difícil de bloquear e rastrear, o Tor é uma ferramenta eficaz para contornar a censura. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Isto esconde de onde vem o tráfego, e nenhum servidor no caminho de conexão consegue ver toda a trajetória de onde o tráfego vem e para onde vai, isto significa que mesmo os servidores que você está usando para conectar não podem quebrar seu anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/pt-BR/basics/vpn-overview.md b/i18n/pt-BR/basics/vpn-overview.md index 2444ec8e..3f946719 100644 --- a/i18n/pt-BR/basics/vpn-overview.md +++ b/i18n/pt-BR/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: As Redes Privadas Virtuais transferem o risco do seu ISP para um te Redes Privadas Virtuais são uma maneira de estender o fim da sua rede para sair de outro lugar do mundo. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normalmente um provedor de serviços de internet (ISP) pode ver o fluxo de tráfego da Internet que entra e sai do seu dispositivo de rede (por exemplo, o modem). Protocolos de criptografia, como o HTTPS, são comumente usados na Internet, portanto, talvez eles não consigam ver exatamente o que você está postando ou lendo, mas podem ter uma ideia dos [domínios que você solicita](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Usar uma VPN esconde mesmo essa informação do seu ISP, mudando a confiança depositada em sua rede para um servidor em outro lugar do mundo. Como resultado, o ISP só vê que você está conectado a uma VPN e nada sobre a atividade que está passando por ela. diff --git a/i18n/pt-BR/basics/why-privacy-matters.md b/i18n/pt-BR/basics/why-privacy-matters.md index 9af9a89e..7a45795c 100644 --- a/i18n/pt-BR/basics/why-privacy-matters.md +++ b/i18n/pt-BR/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacidade é, no final das contas, sobre informações humanas, e isso é impo Muitas pessoas confundem os conceitos de **privacidade**, **segurança**, e **anonimato**. Você verá pessoas criticando vários produtos como "não privados" quando, na verdade, elas querem dizer que eles não fornecem anonimato, por exemplo. Neste site, examinamos todos esses três tópicos, mas é importante que você entenda a diferença entre eles e quando cada um entra em ação. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacidade** : @@ -56,6 +58,8 @@ Veja os formulários de consentimento de cookies, por exemplo. Você pode encont Privacidade é algo que precisa estar incluído por padrão nos [aplicativos e serviços](../tools.md) que usamos, porque você não pode fazer com que a maioria dos aplicativos seja privada por sua própria conta. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Fontes - [Porque é que a privacidade é importante](https://amazon.com/dp/0190939044) (2021) de Neil Richards diff --git a/i18n/pt-BR/index.md b/i18n/pt-BR/index.md index 2b7fb0bd..13c37c4f 100644 --- a/i18n/pt-BR/index.md +++ b/i18n/pt-BR/index.md @@ -71,7 +71,8 @@ Tentar proteger todos os seus dados de todo mundo o tempo todo é impraticável,
O **Privacy Guides** tem uma [comunidade](https://discuss.privacyguides.net) dedicada que analisa independentemente vários serviços e *ferramentas de privacidade*. Cada uma de nossas recomendações obedece a um rigoroso conjunto de critérios para garantir que elas ofereçam o maior valor para a maioria das pessoas e proporcionem o melhor equilíbrio entre privacidade, segurança e conveniência. Como parte de uma **instituição pública de caridade** sem fins lucrativos, o Privacy Guides tem rígidos **padrões jornalísticos** e políticas para garantir que nossas recomendações sejam isentas de conflitos de interesse, e não fazemos parcerias com provedores ou programas afiliados que possam influenciar nossas análises e recomendações. -[:material-heart:{.pg-red} Apoie Nossa Obra](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Recomendações sem anúncios** @@ -83,77 +84,6 @@ O **Privacy Guides** tem uma [comunidade](https://discuss.privacyguides.net) ded
-### Os 3 principais provedores de e-mail privado - -
- -- ![logo do Proton Mail](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail é um serviço de e-mail focado em privacidade, criptografia, segurança, e facilidade de uso. Eles estão em operação desde 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Leia a Análise Completa](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox. rg** - - --- - - Mailbox.org é um serviço de correio electrónico centrado em ser seguro, livre de anúncios e alimentado com energia 100% amiga do meio ambiente. Eles estão operando desde 2014. Mailbox.org é sediado em Berlim, Alemanha. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Leia a Análise Completa](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ . g .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle . wemoji loading=lazy } **Tuta** - - --- - - Tuta (anteriormente *Tutanota*) é um serviço de e-mail com foco na segurança e privacidade através do uso de criptografia. Tutá está em funcionamento desde 2011 e está sediado em Hanover, Alemanha. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Leia a Análise Completa](email.md#tuta) - -
- -
-
-### Melhores serviços de VPN - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Serviços de armazenamento seguro em nuvem - -
- -- ![Logo da Proton Drive](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Logo do Tresorit](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Logo do Peergos](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Melhores Navegadores da Web - -
- -- ![Logotipo do Mullvad Browser](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Logotipo do Firefox](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Logotipo do Brave](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: Mais **Ferramentas Recomendadas de Privacidade**](tools.md) {class="md-button md-button--primary" } -[Melhores navegadores móveis](mobile-browsers.md ""){.md-button} [Principais extensões de navegador](browser-extensions.md ""){.md-button} [Servidores DNS](dns.md ""){.md-button} [Serviços de Aliasing de E-mail](email-aliasing.md ""){.md-button} [Ferramentas de organização de fotos](photo-management.md ""){.md-button} [Sistemas operacionais de PC](desktop.md ""){.md-button} - --- ## Sobre o Privacy Guides @@ -166,7 +96,7 @@ Criado em 2021 devido à dificuldade de encontrar avaliadores imparciais no espa Considerado pela **WIRED**, **Tweakers.net**, **The New York Times**, e muitas outras publicações como uma fonte confiável de conhecimento sobre privacidade e segurança. -[:material-information: Mais sobre quem somos](about.md){ class="md-button md-button--primary" } [:material-email: Junte-se à nossa Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ Na era moderna da exploração de dados digitais, sua privacidade nunca foi tão Muitas pessoas confundem os conceitos de privacidade, segurança e anonimato. Você verá pessoas criticando vários produtos como "não privados" quando, na verdade, elas querem dizer que eles não fornecem anonimato, por exemplo. Neste site, examinamos todos esses três tópicos, mas é importante que você entenda a diferença entre eles e quando cada um entra em ação. -[Privacidade vs Segurança vs Anonimato](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/pt-BR/real-time-communication.md b/i18n/pt-BR/real-time-communication.md index c96aed9c..584ffb56 100644 --- a/i18n/pt-BR/real-time-communication.md +++ b/i18n/pt-BR/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/pt-BR/tools.md b/i18n/pt-BR/tools.md index 1e7b2149..13f227c9 100644 --- a/i18n/pt-BR/tools.md +++ b/i18n/pt-BR/tools.md @@ -180,7 +180,7 @@ If you're looking for added **security**, you should always ensure you're connec --- - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. Eles estão em operação desde 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. + Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. Eles estão em operação desde 2013. A Proton AG está sedeada em Genebra, na Suíça. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. [Read Full Review :material-arrow-right-drop-circle:](email.md#proton-mail) diff --git a/i18n/pt-BR/tor.md b/i18n/pt-BR/tor.md index fcbc8d77..dd634a27 100644 --- a/i18n/pt-BR/tor.md +++ b/i18n/pt-BR/tor.md @@ -31,7 +31,7 @@ schema: A rede **Tor** é um grupo de servidores operados por voluntários que permite que você se conecte gratuitamente para melhorar a sua privacidade e segurança na Internet. Os indivíduos e organizações também podem compartilhar informações através da rede Tor com "serviços ocultos .onion", sem comprometer sua privacidade. Como o tráfego do Tor é difícil de bloquear e rastrear, o Tor é uma ferramenta eficaz para contornar a censura. -[Detalhes do Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Dica

diff --git a/i18n/pt/advanced/communication-network-types.md b/i18n/pt/advanced/communication-network-types.md index c48ccec2..54c81b18 100644 --- a/i18n/pt/advanced/communication-network-types.md +++ b/i18n/pt/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Uma visão geral sobre as várias arquiteturas de rede normalmente Existem várias arquiteturas de rede normalmente utilizadas para transmitir mensagens entre pessoas. Estas redes podem fornecer diferentes garantias de privacidade, pelo que vale a pena considerar o seu modelo de ameaça [](../basics/threat-modeling.md) ao decidir qual a aplicação a utilizar. -[Aplicações de mensagens instantâneas recomendadas](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Redes centralizadas diff --git a/i18n/pt/advanced/tor-overview.md b/i18n/pt/advanced/tor-overview.md index 73a47d43..8aafa863 100644 --- a/i18n/pt/advanced/tor-overview.md +++ b/i18n/pt/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor é uma rede descentralizada e de utilização gratuita, concebi [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Se utilizada corretamente, a rede permite a navegação e as comunicações privadas e anónimas. O facto do tráfego do Tor ser difícil de bloquear e rastrear, faz dele uma ferramenta eficaz para contornar a censura. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. A origem do tráfego fica assim ofuscada e nenhum servidor ao longo do caminho da ligação pode saber o caminho completo, o que significa que mesmo os servidores que utiliza para se ligar não conseguem quebrar o seu anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/pt/basics/vpn-overview.md b/i18n/pt/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/pt/basics/vpn-overview.md +++ b/i18n/pt/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/pt/basics/why-privacy-matters.md b/i18n/pt/basics/why-privacy-matters.md index d7bad969..5eeb1a94 100644 --- a/i18n/pt/basics/why-privacy-matters.md +++ b/i18n/pt/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Em última análise, a privacidade diz respeito à informação humana, e sabemo Muitas pessoas confundem os conceitos de **privacidade**, **segurança** e **anonimato**. Há pessoas que criticam vários produtos como "não oferecendo privacidade", quando na realidade apenas não oferecem anonimato, por exemplo. Neste site, abordamos os três temas, mas é importante que se compreenda a diferença entre eles, e quando cada um entra em jogo. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacidade** : @@ -56,6 +58,8 @@ Tome formulários para consentimento de cookies, por exemplo. Pode encontrar ess A privacidade é algo que precisamos ter feito no [software e serviços](../tools.md) que usamos por padrão, não pode dobrar a maioria dos aplicativos em modo privado por conta própria. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Fontes - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/pt/index.md b/i18n/pt/index.md index cace4ae1..32cc1caa 100644 --- a/i18n/pt/index.md +++ b/i18n/pt/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. Estão em funcionamento desde 2014. A Mailbox.org está sediada em Berlim, na Alemanha. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Há pessoas que criticam vários produtos como "não oferecendo privacidade", quando na realidade apenas não oferecem anonimato, por exemplo. Neste site, abordamos os três temas, mas é importante que se compreenda a diferença entre eles, e quando cada um entra em jogo. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/pt/real-time-communication.md b/i18n/pt/real-time-communication.md index b68b7bba..dc39e167 100644 --- a/i18n/pt/real-time-communication.md +++ b/i18n/pt/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Vigilância em massa](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Capitalismo de vigilância](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Tipos de redes de comunicação :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Aplicações de mensagens encriptadas diff --git a/i18n/pt/tor.md b/i18n/pt/tor.md index c4df7d42..442ca228 100644 --- a/i18n/pt/tor.md +++ b/i18n/pt/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Os indivíduos e as organizações também podem partilhar informações através da rede Tor com os serviços ocultos ".onion", sem comprometer a sua privacidade. O facto do tráfego do Tor ser difícil de bloquear e rastrear, faz dele uma ferramenta eficaz para contornar a censura. -[Visão detalhada do Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/ru/advanced/communication-network-types.md b/i18n/ru/advanced/communication-network-types.md index d8c235f6..837d62f9 100644 --- a/i18n/ru/advanced/communication-network-types.md +++ b/i18n/ru/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Обзор нескольких сетевых архитектур Существует несколько сетевых архитектур, обычно используемых для передачи сообщений между людьми. Эти сети могут предоставлять разные гарантии конфиденциальности, поэтому при принятии решения о том, какое приложение использовать, стоит учитывать вашу [модель угроз](../basics/threat-modeling.md). -[Рекомендуемые мессенджеры](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Централизованные сети diff --git a/i18n/ru/advanced/tor-overview.md b/i18n/ru/advanced/tor-overview.md index b367e9a0..cf11a6db 100644 --- a/i18n/ru/advanced/tor-overview.md +++ b/i18n/ru/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor - это бесплатная в использовании д [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. При правильном использовании сеть позволяет осуществлять частный и анонимный браузинг и общение. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Это скрывает, откуда идет трафик, и ни один сервер на пути соединения не может увидеть полный путь того, откуда и куда идет трафик, то есть даже серверы, которые ты используешь для подключения, не могут нарушить твою анонимность. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/ru/basics/vpn-overview.md b/i18n/ru/basics/vpn-overview.md index ef73b64e..3eb37027 100644 --- a/i18n/ru/basics/vpn-overview.md +++ b/i18n/ru/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/ru/basics/why-privacy-matters.md b/i18n/ru/basics/why-privacy-matters.md index 6f8213c1..574cc5e1 100644 --- a/i18n/ru/basics/why-privacy-matters.md +++ b/i18n/ru/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: Ваша приватность никогда не была сто Многие люди путают **приватность**, **безопасность** и **анонимность**. Вы можете видеть, как люди называют различные продукты "не приватными", когда на самом деле они имеют в виду, что эти продукты не обеспечивают анонимность. На этом сайте мы рассматриваем все эти три темы, но важно понимать разницу между ними, и когда каждая из них вступает в игру. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Приватность** : @@ -56,6 +58,8 @@ description: Ваша приватность никогда не была сто Приватность должна быть встроена по умолчанию в [программы и сервисы](../tools.md), которые мы используем, у вас нет возможности самостоятельно настроить большинство приложений на приватность. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Источники - [Почему приватность имеет значение](https://amazon.com/dp/0190939044) (Нил Ричардс, 2021) diff --git a/i18n/ru/index.md b/i18n/ru/index.md index 277b89d3..93ce5fc4 100644 --- a/i18n/ru/index.md +++ b/i18n/ru/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. Они работают с 2014 года. Mailbox.org базируется в Берлине, Германия. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Вы можете видеть, как люди называют различные продукты "не приватными", когда на самом деле они имеют в виду, что эти продукты не обеспечивают анонимность. На этом сайте мы рассматриваем все эти три темы, но важно понимать разницу между ними, и когда каждая из них вступает в игру. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/ru/real-time-communication.md b/i18n/ru/real-time-communication.md index 6ec9f191..98bba719 100644 --- a/i18n/ru/real-time-communication.md +++ b/i18n/ru/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Массовое наблюдение](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Капитализм слежки](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Типы коммуникационных сетей :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Зашифрованные мессенджеры diff --git a/i18n/ru/tor.md b/i18n/ru/tor.md index 785b4e36..4ebaff61 100644 --- a/i18n/ru/tor.md +++ b/i18n/ru/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Частные лица и организации также могут делиться информацией через сеть Tor с помощью "скрытых сервисов .onion" без ущерба для своей конфиденциальности. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры. -[Подробный обзор Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/sv/advanced/communication-network-types.md b/i18n/sv/advanced/communication-network-types.md index 05997b9a..a478b279 100644 --- a/i18n/sv/advanced/communication-network-types.md +++ b/i18n/sv/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Rekommenderade meddelandetjänster](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/sv/advanced/tor-overview.md b/i18n/sv/advanced/tor-overview.md index ae055163..d1c1bc0d 100644 --- a/i18n/sv/advanced/tor-overview.md +++ b/i18n/sv/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor är ett decentraliserat nätverk som är gratis att använda oc [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Om nätverket används på rätt sätt möjliggör det privat och anonym surfning och kommunikation. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/sv/basics/vpn-overview.md b/i18n/sv/basics/vpn-overview.md index a95b3c04..72f6e60e 100644 --- a/i18n/sv/basics/vpn-overview.md +++ b/i18n/sv/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/sv/basics/why-privacy-matters.md b/i18n/sv/basics/why-privacy-matters.md index 19d2ab6f..67ac4171 100644 --- a/i18n/sv/basics/why-privacy-matters.md +++ b/i18n/sv/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Källor - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/sv/index.md b/i18n/sv/index.md index 6fd7eb11..b00b5cf9 100644 --- a/i18n/sv/index.md +++ b/i18n/sv/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta har varit verksamt sedan 2011 och har sitt säte i Hannover, Tyskland. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## Om Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/sv/real-time-communication.md b/i18n/sv/real-time-communication.md index 7ee6452b..94eb5bf6 100644 --- a/i18n/sv/real-time-communication.md +++ b/i18n/sv/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Massövervakning](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Övervakningskapitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/sv/tor.md b/i18n/sv/tor.md index a532926a..528a8bb6 100644 --- a/i18n/sv/tor.md +++ b/i18n/sv/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/tr/advanced/communication-network-types.md b/i18n/tr/advanced/communication-network-types.md index 230ae9d9..a478b279 100644 --- a/i18n/tr/advanced/communication-network-types.md +++ b/i18n/tr/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Önerilen Anlık Mesajlaşma Programları](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/tr/advanced/tor-overview.md b/i18n/tr/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/tr/advanced/tor-overview.md +++ b/i18n/tr/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/tr/basics/vpn-overview.md b/i18n/tr/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/tr/basics/vpn-overview.md +++ b/i18n/tr/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/tr/basics/why-privacy-matters.md b/i18n/tr/basics/why-privacy-matters.md index 568db848..2d4e53d3 100644 --- a/i18n/tr/basics/why-privacy-matters.md +++ b/i18n/tr/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Mahremiyet nihayetinde insan bilgisiyle ilgilidir ve bu önemlidir çünkü insa Birçok kişi **gizlilik**, **güvenlik**ve **anonimlik** kavramlarını birbiriyle karıştırmaktadır. Örneğin, insanların çeşitli ürünleri "gizli olmadığı" gerekçesi ile eleştirdiğini görürsünüz, oysaki demek istedikleri anonim sağlamadıklarıdır. Bu sitede üç konuyu da ele alıyoruz, ancak bunların arasındaki farkı ve her birinin ne zaman devreye girdiğini anlamanız önemlidir. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Gizililiğin yaygın tanımlarından birisi verilerinize kimin erişebileceğini Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Kaynaklar - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/tr/index.md b/i18n/tr/index.md index 007ac68b..e7eb5991 100644 --- a/i18n/tr/index.md +++ b/i18n/tr/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Örneğin, insanların çeşitli ürünleri "gizli olmadığı" gerekçesi ile eleştirdiğini görürsünüz, oysaki demek istedikleri anonim sağlamadıklarıdır. Bu sitede üç konuyu da ele alıyoruz, ancak bunların arasındaki farkı ve her birinin ne zaman devreye girdiğini anlamanız önemlidir. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/tr/real-time-communication.md b/i18n/tr/real-time-communication.md index 6e77799b..27eef031 100644 --- a/i18n/tr/real-time-communication.md +++ b/i18n/tr/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[İletişim Ağı Türleri :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Şifrelenmiş Mesajlaşma Uygulamaları diff --git a/i18n/tr/tor.md b/i18n/tr/tor.md index 2ba93388..e69b50a5 100644 --- a/i18n/tr/tor.md +++ b/i18n/tr/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/uk/advanced/communication-network-types.md b/i18n/uk/advanced/communication-network-types.md index 27237fd1..a478b279 100644 --- a/i18n/uk/advanced/communication-network-types.md +++ b/i18n/uk/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Рекомендовані месенджери](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/uk/advanced/tor-overview.md b/i18n/uk/advanced/tor-overview.md index 0d4eba4b..e3595e5b 100644 --- a/i18n/uk/advanced/tor-overview.md +++ b/i18n/uk/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Оскільки трафік Tor важко заблокувати і відстежити, Tor є ефективним інструментом обходу цензури. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Це приховує, звідки надходить трафік, і жоден сервер у шляху з 'єднання не може побачити повний шлях, звідки надходить трафік, а це означає, що навіть сервери, які ви використовуєте для з' єднання, не можуть порушити вашу анонімність. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/uk/basics/vpn-overview.md b/i18n/uk/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/uk/basics/vpn-overview.md +++ b/i18n/uk/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/uk/basics/why-privacy-matters.md b/i18n/uk/basics/why-privacy-matters.md index a8447931..923aacf6 100644 --- a/i18n/uk/basics/why-privacy-matters.md +++ b/i18n/uk/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Джерела - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/uk/index.md b/i18n/uk/index.md index 64c3005a..c0a9a007 100644 --- a/i18n/uk/index.md +++ b/i18n/uk/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. Вони працюють з 2014 року. Mailbox.org базується в Берліні, Німеччина. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/uk/real-time-communication.md b/i18n/uk/real-time-communication.md index 85478c04..37bcb277 100644 --- a/i18n/uk/real-time-communication.md +++ b/i18n/uk/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Масове спостереження](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Капіталізм нагляду](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/uk/tor.md b/i18n/uk/tor.md index d457ada1..5d450a19 100644 --- a/i18n/uk/tor.md +++ b/i18n/uk/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Приватні особи та організації також можуть обмінюватися інформацією через мережу Tor з "прихованими сервісами .onion" без шкоди для своєї конфіденційності. Оскільки трафік Tor важко заблокувати і відстежити, Tor є ефективним інструментом обходу цензури. -[Детальний огляд Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/vi/advanced/communication-network-types.md b/i18n/vi/advanced/communication-network-types.md index 129a5716..a478b279 100644 --- a/i18n/vi/advanced/communication-network-types.md +++ b/i18n/vi/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Centralized Networks diff --git a/i18n/vi/advanced/tor-overview.md b/i18n/vi/advanced/tor-overview.md index 4c0bd4a0..9bae6ff9 100644 --- a/i18n/vi/advanced/tor-overview.md +++ b/i18n/vi/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/vi/basics/vpn-overview.md b/i18n/vi/basics/vpn-overview.md index 0521efea..cead0307 100644 --- a/i18n/vi/basics/vpn-overview.md +++ b/i18n/vi/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/vi/basics/why-privacy-matters.md b/i18n/vi/basics/why-privacy-matters.md index b27943ef..dd20233c 100644 --- a/i18n/vi/basics/why-privacy-matters.md +++ b/i18n/vi/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **Privacy** : @@ -56,6 +58,8 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## Sources - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/vi/index.md b/i18n/vi/index.md index d3fe4a59..b181fecd 100644 --- a/i18n/vi/index.md +++ b/i18n/vi/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/vi/real-time-communication.md b/i18n/vi/real-time-communication.md index c8906f98..d8644be1 100644 --- a/i18n/vi/real-time-communication.md +++ b/i18n/vi/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## Encrypted Messengers diff --git a/i18n/vi/tor.md b/i18n/vi/tor.md index ffc444a6..c782e7b7 100644 --- a/i18n/vi/tor.md +++ b/i18n/vi/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip

diff --git a/i18n/zh-Hant/about/jobs.md b/i18n/zh-Hant/about/jobs.md index e9deddf4..0e2575f2 100644 --- a/i18n/zh-Hant/about/jobs.md +++ b/i18n/zh-Hant/about/jobs.md @@ -3,7 +3,7 @@ title: 工作職缺 description: Privacy Guides 擁有一支由隱私權研究人員和權益維護者組成的小型遠端團隊。 我們將來可能有的任何職位空缺都會在此公布。 --- -Privacy Guides 擁有一支由隱私權研究人員和倡導者組成的小型遠端作業團隊,致力於促進我們保護自由表達和推廣尊重隱私權技術的使命。 身為非營利組織,我們的擴展速度非常緩慢,以確保本專案能長期持續發展。 All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause. +Privacy Guides 擁有一支由隱私權研究人員和倡導者組成的小型遠端作業團隊,致力於促進我們保護自由表達和推廣尊重隱私權技術的使命。 身為非營利組織,我們的擴展速度非常緩慢,以確保本專案能長期持續發展。 All of our team members are listed here. Please consider donating to support our cause. 我們偶爾會尋找有實力的新聞撰稿人、產品評論員和隱私權專家來幫助我們,任何空缺的職位都會張貼在下方。 diff --git a/i18n/zh-Hant/advanced/communication-network-types.md b/i18n/zh-Hant/advanced/communication-network-types.md index 7b0a9f2e..09365933 100644 --- a/i18n/zh-Hant/advanced/communication-network-types.md +++ b/i18n/zh-Hant/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: 簡介常見的即時通訊應用程式網路架構。 有幾種網路架構常運用於在人與人之間傳遞消息。 這些網路提供不同的隱私保證,這就是為什麼在決定使用哪個應用程式時,最好能考慮您的[威脅模型](../basics/threat-modeling.md) 。 -[推薦的即時通訊工具](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 集中式網路 diff --git a/i18n/zh-Hant/advanced/tor-overview.md b/i18n/zh-Hant/advanced/tor-overview.md index 54e8afb1..2ac633c0 100644 --- a/i18n/zh-Hant/advanced/tor-overview.md +++ b/i18n/zh-Hant/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor 是一個免費使用的去中心化網路,其讓用戶在使 [Tor ](../alternative-networks.md#tor)是一個免費使用的去中心化網路,其讓用戶在使用網際網路之際盡可能地保護自己的隱私。 如果使用得當,該網路可以實現私人和匿名瀏覽和通訊。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor 的工作原理是通過志願者運營的伺服器來引導您的網際網路路徑,而不是直接連接到您試圖訪問的網站。 這樣可以混淆流量來源,所連接的伺服器都無法看到流量來去的完整路徑,也意味著即使您連接的伺服器無法破壞您的匿名性。 [:octicons-home-16:](https://torproject.org){ .card-link title=首頁 } diff --git a/i18n/zh-Hant/ai-chat.md b/i18n/zh-Hant/ai-chat.md index 9ca5c258..d97f7276 100644 --- a/i18n/zh-Hant/ai-chat.md +++ b/i18n/zh-Hant/ai-chat.md @@ -161,7 +161,7 @@ Mozilla 只為某些 Llama 和 Mistral 模型提供 llamafile,而可用的第 - 社群評論和使用情況統計 - 模型檔案旁的「Safe」徽章(僅限 Hugging Face) - 核對 checksum(核對和)[^1] - - 在 Hugging Face 上,您可以按一下模型檔案,並在其下方尋找 **Copy SHA256** 按鈕,以找到雜湊值。 您應該將此 checksum 與您下載的模型檔案之 checksum 進行比對。 + - 在 Hugging Face 上,您可以按一下模型檔案,並在其下方尋找 **Copy SHA256** 按鈕,以找到雜湊值。 您應該將此 checksum 與您下載的模型檔案之 checksum 進行比對。 A downloaded model is generally safe if it satisfies all the above checks. diff --git a/i18n/zh-Hant/android/index.md b/i18n/zh-Hant/android/index.md index c52cec4b..575c8f77 100644 --- a/i18n/zh-Hant/android/index.md +++ b/i18n/zh-Hant/android/index.md @@ -38,7 +38,7 @@ schema: 購買 Android 手機時,該設備的預設作業系統通常綁入非 Android 開源專案的應用程式與服務,成為侵入性整合。 其中許多應用程式-- 甚至是提供基本系統功能的撥號器等應用程式-- 都需放到 Google Play 服務進行侵入式整合,且 Google Play 服務需要存取檔案、聯絡人儲存、通話記錄、簡訊、位置、攝影機、麥克風以及設備上的許多內容的權限,這樣基本系統程式和其他應用程式才能運行。 這些應用程式和服務增加了設備的攻擊面,成為 Android 各種隱私問題的來源。 -這個問題可以透過使用另一種 Android 發行版(通常稱為 _客製化 ROM_)來解決,這種套件不會有這種入侵性的整合。 不幸的是,許多自定義 Android 發行版常常違反 Android 安全模型,不支援重要的安全功能,如 AVB 、回滾保護、韌體更新等。 有些發行版提供 [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) 版本的構建,這種版本可透過 [ADB](https://developer.android.com/studio/command-line/adb) 暴露 root,並需要 [更寬鬆的](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug\&type=code) SELinux 政策以允許除錯功能,這會進一步增加攻擊面和削弱安全模型。 +這個問題可以透過使用另一種 Android 發行版(通常稱為 _客製化 ROM_)來解決,這種套件不會有這種入侵性的整合。 不幸的是,許多自定義 Android 發行版常常違反 Android 安全模型,不支援重要的安全功能,如 AVB 、回滾保護、韌體更新等。 有些發行版提供 [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) 版本的構建,這種版本可透過 [ADB](https://developer.android.com/studio/command-line/adb) 暴露 root,並需要 更寬鬆的 SELinux 政策以允許除錯功能,這會進一步增加攻擊面和削弱安全模型。 理想情況下,在選擇客製 Android 發行版時,應該確保它符合Android 安全模型。 至少,該發行版應該具有生產構建,支援 AVB ,回滾保護,及時韌體和作業系統更新,以及SELinux [強制模式](https://source.android.com/security/selinux/concepts#enforcement_levels) 。 我們推薦的所有 Android 發行版都符合這些標準: diff --git a/i18n/zh-Hant/basics/vpn-overview.md b/i18n/zh-Hant/basics/vpn-overview.md index 6880b03d..a5094ca9 100644 --- a/i18n/zh-Hant/basics/vpn-overview.md +++ b/i18n/zh-Hant/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: 虛擬私用網路將風險從您的ISP 轉移到您信任的第三 虛擬專用網路是將您的網路末端延伸到世界其它地方的一種方式。 +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + ISP 可以看到網路終端設備(例如數據機)的網際網路進出流量。 HTTPS 等加密協議通常應用在網際網路,因此雖無法確切地知道您發布或閱讀的內容,但還是可以了解您所請求訪問的 [網域名](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns)。 使用 VPN 將您對網路的信任轉移到世界上某處的伺服器,甚至可以向 ISP 隱藏這些資訊。 因此, ISP只會看到您已連接到VPN ,而不會看到您正在傳遞的活動。 diff --git a/i18n/zh-Hant/basics/why-privacy-matters.md b/i18n/zh-Hant/basics/why-privacy-matters.md index 9fceff0c..e83443ff 100644 --- a/i18n/zh-Hant/basics/why-privacy-matters.md +++ b/i18n/zh-Hant/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: 在此數位資料被狠狠利用的時代,隱私從未如此重 許多人常把 **隱私**、 **安全**和 **匿名** 這幾個概念搞混。 例如,人們批評各種產品“不私密”,而實際上他們是指這些產品不提供匿名功能。 本網站涵蓋了這三個主題,但重要的是須了解它們之間的區別,以及每個主題何時發揮作用。 +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **隱私** : @@ -56,6 +58,8 @@ description: 在此數位資料被狠狠利用的時代,隱私從未如此重 隱私需要融入到預設使用的[軟體和服務](../tools.md),您不能將大多數應用程式變成自己的隱私。 +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## 來源 - [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards diff --git a/i18n/zh-Hant/device-integrity.md b/i18n/zh-Hant/device-integrity.md index 931fafaa..0a88f90e 100644 --- a/i18n/zh-Hant/device-integrity.md +++ b/i18n/zh-Hant/device-integrity.md @@ -102,7 +102,7 @@ MVT 對掃描 iOS 裝置「最」有用。 Android 儲存的診斷資訊非常 2. 經常觸發 _sysdiagnose_ 記錄日誌並在外部備份。 如果需要,這些日誌可為鑑識調查人員提供寶貴的資料。 - 執行操作過程因型號而異,但可以在較新的手機上按住_電源_ + _音量調高_ + _音量調低_直到感覺到短暫的振動來觸發。 幾分鐘後,帶有時間戳記的 _sysdiagnose_ 日誌將出現在 **設定** > **隱私和安全性** > **分析和改進** > **分析資料** 中。 + 執行操作過程因型號而異,但可以在較新的手機上按住_電源_ + _音量調高_ + _音量調低_直到感覺到短暫的振動來觸發。 幾分鐘後,帶有時間戳記的 _sysdiagnose_ 日誌將出現在 **設定** > **隱私和安全性** > **分析和改進** > **分析資料** 中。 3. 啟用[鎖定模式](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode)。 diff --git a/i18n/zh-Hant/index.md b/i18n/zh-Hant/index.md index b26fd6dd..fcad6b9c 100644 --- a/i18n/zh-Hant/index.md +++ b/i18n/zh-Hant/index.md @@ -71,7 +71,8 @@ schema:
**Privacy Guides** 有一個專門的[社群](https://discuss.privacyguides.net),獨立審查各種*隱私工具*和服務。 我們的每項建議都符合一套嚴格的標準,以確保能為大多數人提供最大價值,並在隱私、安全性和便利性之間取得最佳平衡。 作為非營利**公共慈善機構**的一部分,Privacy Guides 有嚴格的**新聞標準**和政策,以確保我們的推薦沒有利益衝突,而且我們不與可能影響我們的評論和推薦的供應商或聯盟計劃合作。 -[:material-heart:{.pg-red} 支援我們的工作](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **無廣告推薦** @@ -83,77 +84,6 @@ schema:
-### 前三大隱私電子郵件供應商 - -
- -- ![Proton Mail 標誌](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail 是一個注重隱私、加密、安全和易用性的電子郵件服務。 他們自 2013 年起開始營運。 Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: 閱讀完整評論](email.md#proton-mail) - -- ![Mailbox.org 標誌](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org 是一個專注於安全、無廣告的電子郵件服務,並使用 100% 民間供電的環保能源。 他們自 2014 年起開始營運。 Mailbox.org 總部位於德國柏林。 Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: 閱讀完整評論](email.md#mailboxorg) - -- ![Tuta 標誌](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta 標誌](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta(之前稱為 *Tutanota*) 是一項電子郵件服務,透過使用加密技術,著重於安全與隱私。 Tuta 自 2011 年開始營運,總部位於德國漢諾威。 Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: 閱讀完整評論](email.md#tuta) - -
- -
-
-### 最佳 VPN 服務 - -
- -- ![Proton VPN 標誌](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN 標誌](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad 標誌](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### 安全雲端儲存服務 - -
- -- ![Proton Drive 標誌](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit 標誌](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos 標誌](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### 最佳網頁瀏覽器 - -
- -- ![Mullvad 瀏覽器標誌](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy }[Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox 標誌](assets/img/browsers/firefox.svg){ .twemoji loading=lazy }[Firefox](desktop-browsers.md#firefox) -- ![Brave 標誌](assets/img/browsers/brave.svg){ .twemoji loading=lazy }[Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: 更多推薦**隱私工具**](tools.md){ class="md-button md-button--primary" } -[最佳行動瀏覽器](mobile-browsers.md ""){.md-button} [最佳瀏覽器擴充套件](browser-extensions.md ""){.md-button} [DNS 伺服器](dns.md ""){.md-button} [Email 別名服務](email-aliasing.md ""){.md-button} [照片管理工具](photo-management.md ""){.md-button} [電腦作業系統](desktop.md ""){.md-button} - --- ## 關於 Privacy Guides @@ -166,7 +96,7 @@ schema: 在 **WIRED**、**Tweakers.net**、**《紐約時報》**及其他許多刊物中,都被視為隱私與安全知識的可靠來源。 -[:material-information: 更多關於我們是誰](about.md){ class="md-button md-button--primary" } [:material-email: 訂閱我們的電子報(英文版)](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ schema: 許多人混淆了隱私權、安全性和匿名性的概念。 舉例來說,您會看到人們批評各種產品「不具隱私性」,但實際上他們的意思是不提供匿名性。 在本網站中,我們涵蓋了所有這三個主題,但重要的是您必須瞭解它們之間的差異,以及每種主題何時會發揮作用。 -[隱私性 vs 安全性 vs 匿名性](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/zh-Hant/mobile-browsers.md b/i18n/zh-Hant/mobile-browsers.md index a87ecf98..5fb8f20b 100644 --- a/i18n/zh-Hant/mobile-browsers.md +++ b/i18n/zh-Hant/mobile-browsers.md @@ -243,7 +243,7 @@ Brave 的[防護 (Shields)](https://support.brave.com/hc/articles/360022973471-W - [x] 勾選 **一律使用安全連線** -這可以防止您無意間以明文 HTTP 連線到網站。 如今,僅支援 HTTP 的網站已不多見,因此這對您日常瀏覽的影響幾乎沒有影響。 +This prevents you from unintentionally connecting to a website in plain-text HTTP. 如今,僅支援 HTTP 的網站已不多見,因此這對您日常瀏覽的影響幾乎沒有影響。 #### Adblock Plus settings @@ -304,7 +304,7 @@ Cromite contains a customized version of Adblock Plus with EasyList enabled by d - [ ] 停用 **搜尋引擎建議** -此設定會將您在網址列中輸入的內容傳送至 Safari 中設定的搜尋引擎。 停用搜尋建議可讓您更精確地控制您傳送給搜尋引擎供應商的資料。 +此設定會將您在網址列中輸入的內容傳送至 Safari 中設定的搜尋引擎。 Disabling search suggestions allows you to more precisely control what data you send to your search engine provider. #### 主題類別 diff --git a/i18n/zh-Hant/office-suites.md b/i18n/zh-Hant/office-suites.md index 6cad68d2..d3950576 100644 --- a/i18n/zh-Hant/office-suites.md +++ b/i18n/zh-Hant/office-suites.md @@ -48,9 +48,9 @@ cover: office-suites.webp **OnlyOffice** 是一套以雲端為基礎的免費開放原始碼辦公軟體套件,具有廣泛的功能,包括與 Nextcloud 整合。 [:octicons-home-16: 首頁](https://onlyoffice.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="原始碼" } +:octicons-eye-16:{ .card-link title="隱私權政策" } +:octicons-info-16:{ .card-link title=說明文件} +:octicons-code-16:{ .card-link title="原始碼" }
下載 diff --git a/i18n/zh-Hant/os/windows/group-policies.md b/i18n/zh-Hant/os/windows/group-policies.md index 9d3df852..f08976a5 100644 --- a/i18n/zh-Hant/os/windows/group-policies.md +++ b/i18n/zh-Hant/os/windows/group-policies.md @@ -20,8 +20,8 @@ These settings should be set on a brand-new installation of Windows. Setting the #### 裝置防護 - 開啟虛擬化型安全性:**啟用** - - 選取平台安全性層級: **安全開機及 DMA 保護** - - 安全啟動設定: **已啟用** + - 選取平台安全性層級: **安全開機及 DMA 保護** + - 安全啟動設定: **已啟用** #### 網際網路通訊管理 @@ -52,14 +52,14 @@ These settings should be set on a brand-new installation of Windows. Setting the - 關閉自動播放: **已啟用** - 不允許非磁碟區裝置的自動播放: **已啟用** - 設定 AutoRun 的預設行為: **已啟用** - - 預設 AutoRun 行為: **不執行任何 AutoRun 命令** + - 預設 AutoRun 行為: **不執行任何 AutoRun 命令** #### BitLocker 磁碟機加密 在變更以下設定後,您可能需要重新加密作業系統磁碟機。 - 選擇磁碟機加密演算法及金鑰加密強度 (Windows Vista, Windows Server 2008, Windows 7): **已啟用** - - 選取加密方法:**AES-256** + - 選取加密方法:**AES-256** 即使針對 Windows 7 政策設定加密強度,此強度仍適用於較新的 Windows 版本。 @@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b #### 資料收集與預覽組建 - 允許電腦分析處理:**已啟用** - - 選項: **傳送必要的診斷資料** (專業版) 或是 - - 選項: **關閉診斷資料** (企業版或教育版) + - 選項: **傳送必要的診斷資料** (專業版) 或是 + - 選項: **關閉診斷資料** (企業版或教育版) - 限制診斷記錄檔集合: **已啟用** - 限制傾印集合: **已啟用** - 限制用於電腦分析的選擇性診斷資料: **已啟用** - - 選項: **停用 電腦分析 收集** + - 選項: **停用 電腦分析 收集** - 不顯示意見反應通知: **已啟用** #### 檔案總管 @@ -118,7 +118,7 @@ Despite the names of these policies, this doesn't _require_ you to do anything b - 允許 Cortana: **已停用** - 不要在[搜尋] 中搜尋網路或顯示網路搜尋結果:**已啟用** - 設定 [搜尋] 中可分享的資訊:**已啟用** - - 資訊類型:**匿名資訊** + - 資訊類型:**匿名資訊** #### 同步您的設定 @@ -132,4 +132,4 @@ Despite the names of these policies, this doesn't _require_ you to do anything b - 不要傳送其它資料:**已啟用** - 同意 > 設定預設同意: **已啟用** - - 同意層級: **傳送資料前一律詢問** + - 同意層級: **傳送資料前一律詢問** diff --git a/i18n/zh-Hant/real-time-communication.md b/i18n/zh-Hant/real-time-communication.md index e11bd69f..d02b166a 100644 --- a/i18n/zh-Hant/real-time-communication.md +++ b/i18n/zh-Hant/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: 大規模監控](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: 監控資本主義](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -以上是我們對加密**即時通訊軟體**的建議。 +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[通訊網路 :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 加密傳訊軟體 diff --git a/i18n/zh-Hant/tor.md b/i18n/zh-Hant/tor.md index 2f5f5878..6e50cec3 100644 --- a/i18n/zh-Hant/tor.md +++ b/i18n/zh-Hant/tor.md @@ -31,7 +31,7 @@ schema: **Tor** 網路是一組由志願者操作的伺服器,可讓您免費連線,並改善您的隱私權和安全性。 個人和組織還可以通過 Tor 網路與“.onion 隱藏服務”分享資訊,而不會侵犯他們的隱私。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 -[詳細的 Tor 總覽 :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

溫馨提示

diff --git a/i18n/zh/advanced/communication-network-types.md b/i18n/zh/advanced/communication-network-types.md index a28a8157..48f0c2cb 100644 --- a/i18n/zh/advanced/communication-network-types.md +++ b/i18n/zh/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: 即时信息应用程序常用的几种网络架构的概述。 有几种网络架构常用于人与人之间的信息传递。 这些网络可以提供不同的隐私保证,这就是为什么在决定使用哪种应用程序时,应该考虑你的 [威胁模型](../basics/threat-modeling.md)。 -[推荐的即时通讯工具](../real-time-communication.md ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 集中式网络 diff --git a/i18n/zh/advanced/tor-overview.md b/i18n/zh/advanced/tor-overview.md index d1072949..d8439290 100644 --- a/i18n/zh/advanced/tor-overview.md +++ b/i18n/zh/advanced/tor-overview.md @@ -8,6 +8,8 @@ description: Tor是一个免费使用的去中心化网络,专为尽量隐私 [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. 如果使用得当,该网络可以实现隐私且匿名地浏览和通信。 由于Tor流量难以阻止和跟踪,因此Tor是一种有效的审查规避工具。 +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} + Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. 这会混淆流量的来源,并且连接路径中的任何服务器都无法看到流量来自和流向的完整路径,这意味着即使您用于连接的服务器也无法打破您的匿名性。 [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } diff --git a/i18n/zh/basics/vpn-overview.md b/i18n/zh/basics/vpn-overview.md index 7942c23c..57ced1fc 100644 --- a/i18n/zh/basics/vpn-overview.md +++ b/i18n/zh/basics/vpn-overview.md @@ -7,6 +7,8 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} + Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). Using a VPN hides even this information from your ISP, by shifting the trust you place in your network to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing through it. diff --git a/i18n/zh/basics/why-privacy-matters.md b/i18n/zh/basics/why-privacy-matters.md index 779a597c..57e53b6f 100644 --- a/i18n/zh/basics/why-privacy-matters.md +++ b/i18n/zh/basics/why-privacy-matters.md @@ -12,6 +12,8 @@ description: 在数据被大量利用的现代,你的隐私从未这样重要 许多人会混淆 **隐私**、 **安全**和 **匿名** 的概念。 例如,你会看到有人批评各种产品 "不私密",但他们的意思其实是这些产品不提供匿名性。 在本网站上,我们这三个主题都会介绍,但重要的是,你要了解它们之间的区别,以及每一个主题何时发挥作用。 +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} + **隐私** : @@ -56,6 +58,8 @@ description: 在数据被大量利用的现代,你的隐私从未这样重要 隐私是我们使用的[软件和服务](../tools.md)中应该自带的东西,你无法强行让大多数你使用应用程序变得隐私。 +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } + ## 资料来源 - [隐私为什么重要](https://amazon.com/dp/0190939044)(2021),Neil Richards著 diff --git a/i18n/zh/index.md b/i18n/zh/index.md index 80ed8e62..69d66092 100644 --- a/i18n/zh/index.md +++ b/i18n/zh/index.md @@ -71,7 +71,8 @@ Trying to protect all your data from everyone all the time is impractical, expen
**Privacy Guides** has a dedicated [community](https://discuss.privacyguides.net) independently reviewing various *privacy tools* and services. Each of our recommendations comply with a strict set of criteria to ensure they provide the most value to most people, and provide the best balance of privacy, security, and convenience. As part of a non-profit **public charity**, Privacy Guides has strict **journalistic standards** and policies to ensure our recommendations are free of conflict of interest, and we do not partner with providers or affiliate programs that could sway our reviews and recommendations. -[:material-heart:{.pg-red} Support Our Work](https://donate.magicgrants.org/privacyguides){ .md-button .md-button--primary } +[:material-heart:{.pg-red} Support Our Work](about/donate.md){ class="md-button md-button--primary" } +
- [x] **Ad-Free Recommendations** @@ -83,77 +84,6 @@ Trying to protect all your data from everyone all the time is impractical, expen
-### Top 3 Private Email Providers - -
- -- ![Proton Mail logo](assets/img/email/protonmail.svg){ .lg .middle .twemoji loading=lazy } **Proton Mail** - - --- - - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG is based in Geneva, Switzerland. The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free. - - [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) - -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .lg .middle .twemoji loading=lazy } **Mailbox.org** - - --- - - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. 他们自2014年以来一直在运作。 Mailbox.org总部位于德国柏林。 Accounts start with up to 2 GB storage, which can be upgraded as needed. - - [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) - -- ![Tuta logo](assets/img/email/tuta.svg#only-light){ .lg .middle .twemoji loading=lazy }![Tuta logo](assets/img/email/tuta-dark.svg#only-dark){ .lg .middle .twemoji loading=lazy } **Tuta** - - --- - - Tuta (formerly *Tutanota*) is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011 and is based in Hanover, Germany. Free accounts start with 1 GB of storage. - - [:octicons-arrow-right-24: Read Full Review](email.md#tuta) - -
- -
-
-### Best VPN Services - -
- -- ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ .twemoji loading=lazy } [Proton VPN](vpn.md#proton-vpn) -- ![IVPN logo](assets/img/vpn/mini/ivpn.svg){ .twemoji loading=lazy } [IVPN](vpn.md#ivpn) -- ![Mullvad logo](assets/img/vpn/mullvad.svg){ .twemoji loading=lazy } [Mullvad](vpn.md#mullvad) - -
-
- -
-### Secure Cloud Storage Services - -
- -- ![Proton Drive logo](assets/img/cloud/protondrive.svg){ .twemoji loading=lazy } [Proton Drive](cloud.md#proton-drive) -- ![Tresorit logo](assets/img/cloud/tresorit.svg){ .twemoji loading=lazy } [Tresorit](cloud.md#tresorit) -- ![Peergos logo](assets/img/cloud/peergos.svg){ .twemoji loading=lazy } [Peergos](cloud.md#peergos) - -
-
- -
-### Best Web Browsers - -
- -- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji loading=lazy } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji loading=lazy } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji loading=lazy } [Brave](desktop-browsers.md#brave) - -
-
-
- -[:material-format-list-checkbox: More Recommended **Privacy Tools**](tools.md){ class="md-button md-button--primary" } -[Best Mobile Browsers](mobile-browsers.md ""){.md-button} [Top Browser Extensions](browser-extensions.md ""){.md-button} [DNS Servers](dns.md ""){.md-button} [Email Aliasing Services](email-aliasing.md ""){.md-button} [Photo Organization Tools](photo-management.md ""){.md-button} [PC Operating Systems](desktop.md ""){.md-button} - --- ## About Privacy Guides @@ -166,7 +96,7 @@ Established in 2021 due to the difficulty of finding unbiased reviewers in the V As seen in **WIRED**, **Tweakers.net**, **The New York Times**, and many other publications as a reliable source for privacy and security knowledge. -[:material-information: More About Who We Are](about.md){ class="md-button md-button--primary" } [:material-email: Join our Newsletter](https://blog.privacyguides.org/#/portal/signup ""){.md-button} +[:material-information: More About Who We Are](about.md){ class="md-button" }
@@ -184,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. 例如,你会看到有人批评各种产品 "不私密",但他们的意思其实是这些产品不提供匿名性。 在本网站上,我们这三个主题都会介绍,但重要的是,你要了解它们之间的区别,以及每一个主题何时发挥作用。 -[Privacy vs Security vs Anonymity](basics/why-privacy-matters.md#what-is-privacy){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" }
diff --git a/i18n/zh/real-time-communication.md b/i18n/zh/real-time-communication.md index 775117dd..dac8e280 100644 --- a/i18n/zh/real-time-communication.md +++ b/i18n/zh/real-time-communication.md @@ -13,9 +13,9 @@ cover: real-time-communication.webp - [:material-eye-outline: 大规模监控](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} - [:material-account-cash: 监视资本主义](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} -These are our recommendations for encrypted **real-time communication**. +These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[通信网络的类型 :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} ## 可加密的聊天软件 diff --git a/i18n/zh/tor.md b/i18n/zh/tor.md index 24f85766..4c08eafe 100644 --- a/i18n/zh/tor.md +++ b/i18n/zh/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 个人和组织也可以通过Tor网络与".onion隐藏服务"分享信息,而不损害其隐私。 由于Tor流量难以阻止和跟踪,因此Tor是一种有效的审查规避工具。 -[详细的Tor概述 :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button}

Tip